Question : Cisco PIX 5505 - 2 webserves

Hello

Whau do i config 2 ouside ip addresses with 2 inside webservers.

The ny config is to servers with the new server ip 193.242.107.209 and internal ip 192.168.1.103

Here is my config today, i have one server with one external.

Result of the command: "sh run"

: Saved
:
ASA Version 7.2(4)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
dns-guard
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 193.242.107.242 255.255.255.0
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns domain-lookup inside
dns server-group DefaultDNS
 name-server 194.239.134.83
 name-server 193.162.153.164
 domain-name default.domain.invalid
dns server-group OPENDNS
 name-server 208.67.222.222
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
access-list outside_access_in extended permit tcp any interface outside eq smtp
access-list outside_access_in extended permit tcp any interface outside eq www
access-list outside_access_in extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any interface outside eq pop3
access-list outside_access_in extended permit tcp any interface outside eq 800
access-list outside_access_in extended permit tcp any interface outside eq 366
access-list outside_access_in extended permit tcp any interface outside eq ftp
access-list outside_access_in extended permit tcp any interface outside eq 5500
access-list outside_access_in extended permit tcp any interface outside eq 1200
access-list outside_access_in extended permit tcp any interface outside eq https
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface www 192.168.1.100 www netmask 255.255.255.255
static (inside,outside) tcp interface smtp 192.168.1.100 smtp netmask 255.255.255.255
static (inside,outside) tcp interface 3389 192.168.1.100 3389 netmask 255.255.255.255
static (inside,outside) tcp interface pop3 192.168.1.100 pop3 netmask 255.255.255.255
static (inside,outside) tcp interface 800 192.168.1.100 800 netmask 255.255.255.255
static (inside,outside) tcp interface 366 192.168.1.100 366 netmask 255.255.255.255
static (inside,outside) tcp interface ftp 192.168.1.100 ftp netmask 255.255.255.255
static (inside,outside) tcp interface 5500 192.168.1.100 5500 netmask 255.255.255.255
static (inside,outside) tcp interface 1200 192.168.1.100 1200 netmask 255.255.255.255
static (inside,outside) tcp interface https 192.168.1.100 4282 netmask 255.255.255.255
static (inside,outside) tcp interface domain 192.168.1.100 domain netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 193.242.107.1 255
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.1.2-192.168.1.33 inside
dhcpd enable inside
!

!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect sip
  inspect netbios
  inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:07641908fdbf571278e7c6df89391848
: end
¿

Answer : Cisco PIX 5505 - 2 webserves

Yes, just enter config mode to do it:    

config t
static (inside,outside) 193.242.107.209 192.168.1.103 netmask 255.255.255.255
access-list outside_access_in extended permit tcp any host 193.242.107.209 eq www
exit  


Random Solutions  
 
programming4us programming4us