In above figure, single IP address used to share two services running on 2 separate servers in dmz zone. It requires that, when have a ftp connection to 113.22.14.3, the request will be directed to ftp server on 172.16.1.10, and when a ssh connection to the same public address, request will be redirected to ssh server on 172.16.1.15.
Configuration:
2 objects for servers in dmz zone:
ASA84(config)# show run objectnat command for each object
object network SSH-SERVER
host 172.16.1.15
object network FTP-SERVER
host 172.16.1.10
ASA84(config)# show run nataccess list for particular connection
!
object network SSH-SERVER
nat (dmz,outside) static 113.22.14.3 service tcp ssh ssh
object network FTP-SERVER
nat (dmz,outside) static 113.22.14.3 service tcp ftp ftp
ASA84(config)# show run access-liaccess-group to interface
access-list ALLOW-INTERNET-DMZ extended permit tcp any object SSH-SERVER eq ssh
access-list ALLOW-INTERNET-DMZ extended permit tcp any object FTP-SERVER eq ftp
ASA84(config)# show run access-groupVerifying:
access-group ALLOW-INTERNET-DMZ in interface outside
ASA84(config)#
SSH connection from INTERNET host to 113.22.14.3:
FTP connection from INTERNET to 113.22.14.3:
You can see here: 227 Entering Passive Mode (172,16,1,10,288,222). Funny stuff, hah? ;-)
No comments:
Post a Comment