The Cisco ASA 5510 is a hardware security appliance for enterprise-level computer networks. Among other functions, a Cisco ASA 5510 can operate as a firewall that makes only some hosts behind the firewall visible from the open Internet --- and performs Network Address Translation (NAT) for them. Even if an ASA 5510 has a single network interface on the Internet side, the administrator can still assign multiple public IP addresses to that interface. Each public IP address can get mapped by NAT to a host behind the firewall, or to the configuration interface of the Cisco ASA 5510.
Things You'll Need
Cisco ASA 5510 Configuration to Recognize Multiple Public IP Addresses
One. Connect your computer to the ASA 5510 using the console cable. Invoke the terminal emulator on the computer with parameters:
+ 9600 baud
+ 8 data bits
+ no parity
+ 1 stop bit
+ no flow control.
Two. Press "Enter" to see the "hostname>" prompt from the ASA 5510. Execute the command "enable" (without quotes) to get into privileged mode. You will have to enter the administrator password.
Three. Enter the configuration commands using the command line, one by one and pressing "Enter" after each one. The "static" configuration command maps external addresses to internal addresses (Static NAT). The concrete sequence of commands depends on your situation. For example, if you want to configure the ASA 5510 to use public IP addresses 43.76.91.1 and 45.176.30.74 for internal hosts 192.168.100.1 and 192.168.100.3, respectively, enter these commands:
interface Ethernet0/0
nameif outside
security-level 0
static (inside,outside) 43.76.91.1 192.168.100.1
static (inside,outside) 45.176.30.74 192.168.100.3
The ASA 5510 is now configured for multiple public IP addresses.
More Cisco ASA and Firewall Tips you can visit: http://blog.router-switch.com/category/reviews/cisco-firewalls-security/
Things You'll Need
- Administrator access to the ASA 5510
- Console cable for the ASA 5510
Cisco ASA 5510 Configuration to Recognize Multiple Public IP Addresses
One. Connect your computer to the ASA 5510 using the console cable. Invoke the terminal emulator on the computer with parameters:
+ 9600 baud
+ 8 data bits
+ no parity
+ 1 stop bit
+ no flow control.
Two. Press "Enter" to see the "hostname>" prompt from the ASA 5510. Execute the command "enable" (without quotes) to get into privileged mode. You will have to enter the administrator password.
Three. Enter the configuration commands using the command line, one by one and pressing "Enter" after each one. The "static" configuration command maps external addresses to internal addresses (Static NAT). The concrete sequence of commands depends on your situation. For example, if you want to configure the ASA 5510 to use public IP addresses 43.76.91.1 and 45.176.30.74 for internal hosts 192.168.100.1 and 192.168.100.3, respectively, enter these commands:
interface Ethernet0/0
nameif outside
security-level 0
static (inside,outside) 43.76.91.1 192.168.100.1
static (inside,outside) 45.176.30.74 192.168.100.3
The ASA 5510 is now configured for multiple public IP addresses.
More Cisco ASA and Firewall Tips you can visit: http://blog.router-switch.com/category/reviews/cisco-firewalls-security/