Hi All,
I am new to using Cisco Firewalls and need some help setting up a Cisco ASA 5505 with Security Plus.
Our network has a /19 allocation and we have several mail, web, dns, and other servers all using static public IP’s per NIC and some servers have multiple IP’s per NIC.
I want to protect these servers from attacks, hackings etc from the outside WAN.
This is my network setup:
Our allocation IP: x.x.96.0 /19
255.255.224.0
I am using this so far: x.x.96.1 – x.x.103.254
255.255.248.0
This is what I want to assign my DMZ network
x.x.96.1 – GW
x.x.96.2 – DNS1
x.x.96.3 – Switch1
x.x.96.4 – Switch2
x.x.96.5 – Vigor Router for private LAN, this will also take care of my VPN’s
x.x.96.6 – FTP Server
x.x.96.7 – Web Server1
x.x.96.8 – Web Server2
x.x.96.9 – Cisco ASA 5505 – This is the IP I want to assign this firewall
x.x.97.1 – Email server
x.x.98.1- 100.254 – Email server 2
etc…
All I want to do is have 1 DMZ network and my Vigor router on x.x.96.5 will host my private LAN. I do not want to use private IP’s for my DMZ network as this will take a lot of time reconfiguring the network.
Someone in the Tek Tips Cisco forum told me that I need to allocate a subnet for my DMZ network which is x.x.96.0 255.255.248.0 then create a nonat ACL so that hosts in the DMZ will bypass NAT when going outbound. And then if you need any communication between inside and the DMZ then you'll need to use identity NAT to make it work?
But I am not sure how to set this up can anyone help.
So to summarise I want to:
1. Disable the VPN capabilities of the ASA 5505 Firewall
2. Setup a DMZ network for my servers on the public IP’s
Any help would be great.
Thanks.
I am new to using Cisco Firewalls and need some help setting up a Cisco ASA 5505 with Security Plus.
Our network has a /19 allocation and we have several mail, web, dns, and other servers all using static public IP’s per NIC and some servers have multiple IP’s per NIC.
I want to protect these servers from attacks, hackings etc from the outside WAN.
This is my network setup:
Our allocation IP: x.x.96.0 /19
255.255.224.0
I am using this so far: x.x.96.1 – x.x.103.254
255.255.248.0
This is what I want to assign my DMZ network
x.x.96.1 – GW
x.x.96.2 – DNS1
x.x.96.3 – Switch1
x.x.96.4 – Switch2
x.x.96.5 – Vigor Router for private LAN, this will also take care of my VPN’s
x.x.96.6 – FTP Server
x.x.96.7 – Web Server1
x.x.96.8 – Web Server2
x.x.96.9 – Cisco ASA 5505 – This is the IP I want to assign this firewall
x.x.97.1 – Email server
x.x.98.1- 100.254 – Email server 2
etc…
All I want to do is have 1 DMZ network and my Vigor router on x.x.96.5 will host my private LAN. I do not want to use private IP’s for my DMZ network as this will take a lot of time reconfiguring the network.
Someone in the Tek Tips Cisco forum told me that I need to allocate a subnet for my DMZ network which is x.x.96.0 255.255.248.0 then create a nonat ACL so that hosts in the DMZ will bypass NAT when going outbound. And then if you need any communication between inside and the DMZ then you'll need to use identity NAT to make it work?
But I am not sure how to set this up can anyone help.
So to summarise I want to:
1. Disable the VPN capabilities of the ASA 5505 Firewall
2. Setup a DMZ network for my servers on the public IP’s
Any help would be great.
Thanks.