Hot Downloads

Welcome, Guest
Username: Password: Remember me

TOPIC: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside

Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside 6 years 1 month ago #35718

  • mky2
  • mky2's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
Hello,

I have a ASA 5510 and I want to provide a rule for exchange ,
All user want to access to internet
I want to create a rule while I provide a object and in object ip address bloked by asa,

Because users use its ip address at same time.

can you help me please. whan I can I do,
The administrator has disabled public write access.

Re: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside 6 years 1 month ago #35720

  • S0lo
  • S0lo's Avatar
  • Offline
  • Moderator
  • Posts: 1577
  • Thank you received: 7
  • Karma: 3
I'm not sure I understand the question here. Are you trying to block a certain IP address/range from reaching a certain destination IP? Please explain a bit more.
Studying CCNP...

Ammar Muqaddas
Forum Moderator
www.firewall.cx
The administrator has disabled public write access.

Re: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside 6 years 1 month ago #35724

  • mky2
  • mky2's Avatar
  • Offline
  • New Member
  • Posts: 2
  • Karma: 0
Excuse me ? sorry I dont want to block any ip address.
I want to define a a nat for one ip adress as a services. when I use ip address in a object (for examle : a local ip address forum host)

ASA was bloked it.
The administrator has disabled public write access.

Re: Cisco ASA 5510 Objeck IP Bloked By ASA whe I use ip inside 6 years 1 month ago #35732

  • S0lo
  • S0lo's Avatar
  • Offline
  • Moderator
  • Posts: 1577
  • Thank you received: 7
  • Karma: 3
If I understand it well, you need a static NAT, some thing like this:

[code:1]static (inside,outside) 100.1.1.1 192.168.1.1 netmask 255.255.255.255[/code:1]

Replace 100.1.1.1 with the public IP of the server. And the 192.168.1.1 with the private IP. You also need an ACL to allow outside traffic to get it in, like this:

[code:1]access-list ACL1 extended permit ip any host 100.1.1.1
access-group ACL1 in interface outside[/code:1]

Again replace 100.1.1.1 with the public IP of the server.
Studying CCNP...

Ammar Muqaddas
Forum Moderator
www.firewall.cx
The administrator has disabled public write access.
Time to create page: 0.078 seconds

CCENT/CCNA

Cisco Routers

  • SSL WebVPN
  • Securing Routers
  • Policy Based Routing
  • Router on-a-Stick

VPN Security

  • Understand DMVPN
  • GRE/IPSec Configuration
  • Site-to-Site IPSec VPN
  • IPSec Modes

Cisco Help

  • VPN Client Windows 8
  • VPN Client Windows 7
  • CCP Display Problem
  • Cisco Support App.

Windows 2012

  • New Features
  • Licensing
  • Hyper-V / VDI
  • Install Hyper-V

Linux

  • File Permissions
  • Webmin
  • Groups - Users
  • Samba Setup