0% found this document useful (0 votes)
292 views2 pages

NAT Virtual IP ASA Cisco

The document outlines the steps to configure single-address static NAT for a web server and mail server: 1) configure network objects to map internal IPs to external static IPs for HTTP, HTTPS, SMTP, and POP3 services, 2) create an access control list to permit corresponding traffic flows, and 3) apply the access control list to the outside interface.

Uploaded by

Johnny Quispe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
292 views2 pages

NAT Virtual IP ASA Cisco

The document outlines the steps to configure single-address static NAT for a web server and mail server: 1) configure network objects to map internal IPs to external static IPs for HTTP, HTTPS, SMTP, and POP3 services, 2) create an access control list to permit corresponding traffic flows, and 3) apply the access control list to the outside interface.

Uploaded by

Johnny Quispe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

The steps are similar for single-address static NAT configuration:

1. Configure network objects


object network WebServer-HTTP
host [Link]
nat (inside,outside) static [Link] service tcp 80 80
!
object network WebServer-HTTPS
host [Link]
nat (inside,outside) static [Link] service tcp 443 443
!
object network MailServer-SMTP
host [Link]
nat (inside,outside) static [Link] service tcp 25 25
!
object network MailServer-POP3
host [Link]
nat (inside,outside) static [Link] service tcp 110 110
2. Configure Access-Control Lists to permit the traffic flows. This Access-Control List
access-list OutsideToInside permit tcp any host [Link] eq 80
access-list OutsideToInside permit tcp any host [Link] eq 443
access-list OutsideToInside permit tcp any host [Link] eq 25
access-list OutsideToInside permit tcp any host [Link] eq 110
3. Apply the Access-Control List to the outside interface with an access-group statement.
access-group OutsideToInside in interface outside

You might also like