This video helped me a lot when I was creating a DMZ port. Just quick question, I'm on ASA 7.13(1), and then I was trying to add remaining ports to internal lan, but I no longer see "Switch port option" as shown ( around 7:05 of this video). How can I add ports on internal network now? thank you very much for your video and help
That's a pretty old version of the ASA software. I'm not sure if the switchport option was available in that version. The video is based on 8.4(3)9 and it's nearly 11 years old. Try searching on "asa 7.13(1) switchport" and see if you find anything. Good luck!
Great video Don, would be great to see what your CLI kungfu created in the ASDM. Especially for those of us still back on 8.2 or earlier where 8.3+ CLI commands don't always translate.
Sure. It would work well for something like that. Just put the access point in a separate VLAN. Give it a lower security level than the office VLAN and a higher security level than the Internet VLAN. You'll probably also need to set up PAT from the Wi-Fi VLAN to the Internet.
Yeah I have version 8.2(5). I set up a mock DMZ but I cannot figure out how to get access to the web server I set up in the DMZ from the outside. I can access it from the inside and access the host in the outside interface from the DMZ with RDP. I am not connecting to the internet though so I don't think NAT applies.
thanks for the video.. Sir please guide me up... I brought a new Firewall ASA CISCO 5510 for our office, but the problem is I can't able to connect my dvr cctv camera into our WAN access showing "UPNP Failed. please open UPNP" even do I already enabled the UPNP in the router and open port number in our firewall 5510 for both tcp/udp
can we use DMZ to separate inside LAN and WIFI connection ? ( let assume I dont want WIFI users in our office to be able to access our storage or other resources inside the LAN)
The answers to your questions are beyond what can be done in this forum. Start by checking out my video on Cisco ASA Initial Setup, then spend some time at the Cisco website looking at example configurations. (Make sure you're looking at the sample configs for your particular software version.) Search on the term "port address translation" for more information about PAT.
Yeah I have version 8.2(5). I set up a mock DMZ but I cannot figure out how to get access to the web server I set up in the DMZ from the outside. I can access it from the inside and access the host in the outside interface from the DMZ with RDP. I am not connecting to the internet though so I don't think NAT applies.
Your explanation is so clear and to the point
It doesn't get better than this!!! thanks for sharing!!!
As this example would apply to a public IP, everything would be equal to or exchange.
Thank you very much for your answer.
Great Video!!!
This video helped me a lot when I was creating a DMZ port. Just quick question, I'm on ASA 7.13(1), and then I was trying to add remaining ports to internal lan, but I no longer see "Switch port option" as shown ( around 7:05 of this video). How can I add ports on internal network now? thank you very much for your video and help
That's a pretty old version of the ASA software. I'm not sure if the switchport option was available in that version. The video is based on 8.4(3)9 and it's nearly 11 years old. Try searching on "asa 7.13(1) switchport" and see if you find anything. Good luck!
It would be nice to see the config at the end from the ASDM...
Great video Don, would be great to see what your CLI kungfu created in the ASDM. Especially for those of us still back on 8.2 or earlier where 8.3+ CLI commands don't always translate.
Sure. It would work well for something like that. Just put the access point in a separate VLAN. Give it a lower security level than the office VLAN and a higher security level than the Internet VLAN. You'll probably also need to set up PAT from the Wi-Fi VLAN to the Internet.
Yeah I have version 8.2(5). I set up a mock DMZ but I cannot figure out how to get access to the web server I set up in the DMZ from the outside. I can access it from the inside and access the host in the outside interface from the DMZ with RDP. I am not connecting to the internet though so I don't think NAT applies.
Thank you for sharing, great video indeed
You're welcome. I'm glad you like it. Thanks for your comment.
thanks for the video.. Sir please guide me up... I brought a new Firewall ASA CISCO 5510 for our office, but the problem is I can't able to connect my dvr cctv camera into our WAN access showing "UPNP Failed. please open UPNP" even do I already enabled the UPNP in the router and open port number in our firewall 5510 for both tcp/udp
why no access-group --- in interface inside? Wont the inside traffic need an ACL to hit the web server?
can we use DMZ to separate inside LAN and WIFI connection ? ( let assume I dont want WIFI users in our office to be able to access our storage or other resources inside the LAN)
The answers to your questions are beyond what can be done in this forum. Start by checking out my video on Cisco ASA Initial Setup, then spend some time at the Cisco website looking at example configurations. (Make sure you're looking at the sample configs for your particular software version.) Search on the term "port address translation" for more information about PAT.
Thanks Dwayne
what exactly configs I have to make on my ASA ? and what is exactly PAT which i have to configure?
it is really informative, thank you
very helpful tutorial
Great video, thanks for sharing.
Great video!
Very good thank you............
I have mail server with Public IP address, how do I allow pop3 and smtp without using static NAT
I have followed this tutorial _exactly_ three times now and these rules for opening port 80 *do not work*!! :/
Check to make sure you're running the same software version as in the video. The video is based on version 8.4(3)9.
Para la versión 8.2(5) como seria??
Yeah I have version 8.2(5). I set up a mock DMZ but I cannot figure out how to get access to the web server I set up in the DMZ from the outside. I can access it from the inside and access the host in the outside interface from the DMZ with RDP. I am not connecting to the internet though so I don't think NAT applies.