- Posts: 2
- Thank you received: 0
Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside
14 years 3 weeks ago #35718
by mky2
Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside was created by mky2
Hello,
I have a ASA 5510 and I want to provide a rule for exchange ,
All user want to access to internet
I want to create a rule while I provide a object and in object ip address bloked by asa,
Because users use its ip address at same time.
can you help me please. whan I can I do,
I have a ASA 5510 and I want to provide a rule for exchange ,
All user want to access to internet
I want to create a rule while I provide a object and in object ip address bloked by asa,
Because users use its ip address at same time.
can you help me please. whan I can I do,
14 years 2 weeks ago #35720
by S0lo
Studying CCNP...
Ammar Muqaddas
Forum Moderator
www.firewall.cx
Replied by S0lo on topic Re: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside
I'm not sure I understand the question here. Are you trying to block a certain IP address/range from reaching a certain destination IP? Please explain a bit more.
Studying CCNP...
Ammar Muqaddas
Forum Moderator
www.firewall.cx
14 years 2 weeks ago #35724
by mky2
Replied by mky2 on topic Re: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside
Excuse me ? sorry I dont want to block any ip address.
I want to define a a nat for one ip adress as a services. when I use ip address in a object (for examle : a local ip address forum host)
ASA was bloked it.
I want to define a a nat for one ip adress as a services. when I use ip address in a object (for examle : a local ip address forum host)
ASA was bloked it.
14 years 2 weeks ago #35732
by S0lo
Studying CCNP...
Ammar Muqaddas
Forum Moderator
www.firewall.cx
Replied by S0lo on topic Re: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside
If I understand it well, you need a static NAT, some thing like this:
[code:1]static (inside,outside) 100.1.1.1 192.168.1.1 netmask 255.255.255.255[/code:1]
Replace 100.1.1.1 with the public IP of the server. And the 192.168.1.1 with the private IP. You also need an ACL to allow outside traffic to get it in, like this:
[code:1]access-list ACL1 extended permit ip any host 100.1.1.1
access-group ACL1 in interface outside[/code:1]
Again replace 100.1.1.1 with the public IP of the server.
[code:1]static (inside,outside) 100.1.1.1 192.168.1.1 netmask 255.255.255.255[/code:1]
Replace 100.1.1.1 with the public IP of the server. And the 192.168.1.1 with the private IP. You also need an ACL to allow outside traffic to get it in, like this:
[code:1]access-list ACL1 extended permit ip any host 100.1.1.1
access-group ACL1 in interface outside[/code:1]
Again replace 100.1.1.1 with the public IP of the server.
Studying CCNP...
Ammar Muqaddas
Forum Moderator
www.firewall.cx
Time to create page: 0.121 seconds