v
ASA 5505 Getting Started Guide
78-18003-02
Contents
Example DMZ Network Topology 6-2
An Inside User Visits a Web Server on the Internet 6-4
An Internet User Visits the DMZ Web Server 6-6
An Inside User Visits the DMZ Web Server 6-8
Configuring the Security Appliance for a DMZ Deployment 6-10
Configuration Requirements 6-11
Information to Have Available 6-11
Starting ASDM 6-12
Enabling Inside Clients to Communicate with Devices on the Internet 6-14
Enabling Inside Clients to Communicate with the DMZ Web Server 6-15
Translating Internal Client IP Addresses Between the Inside and DMZ
Interfaces
6-16
Translating the Public Address of the Web Server to its Real
Address
6-19
Configuring Static PAT for Public Access to the DMZ Web Server (Port
Forwarding)
6-21
Providing Public HTTP Access to the DMZ Web Server 6-25
What to Do Next 6-28
CHAPTER
7 Scenario: IPsec Remote-Access VPN Configuration 7-1
Example IPsec Remote-Access VPN Network Topology 7-1
Implementing the IPsec Remote-Access VPN Scenario 7-2
Information to Have Available 7-3
Starting ASDM 7-3
Configuring the ASA 5505 for an IPsec Remote-Access VPN 7-5
Selecting VPN Client Types 7-7
Specifying the VPN Tunnel Group Name and Authentication Method 7-8
Specifying a User Authentication Method 7-9
(Optional) Configuring User Accounts 7-11
Configuring Address Pools 7-12