Book 2: Cisco ASA Series Firewall ASDM Configuration Guide, 7.1
Configuring Public Servers
Downloads: This chapterpdf (PDF - 71.0KB) The complete bookPDF (PDF - 14.67MB) | The complete bookePub (ePub - 7.44MB) | The complete bookMobi (Mobi - 7.36MB) | Feedback

Table of Contents

Configuring Public Servers

Information About Public Servers

Licensing Requirements for Public Servers

Guidelines and Limitations

Adding a Public Server that Enables Static NAT

Adding a Public Server that Enables Static NAT with PAT

Editing Settings for a Public Server

Feature History for Public Servers

Information About Public Servers

The Public Servers pane enables an administrator to provide internal and external users access to various application servers. This pane displays a list of public servers. internal and external addresses, the interfaces to which the internal or external addresses apply, the ability to translate the addresses, and the service that is exposed. You can add, edit, delete, or modify settings for existing public servers.

Licensing Requirements for Public Servers

 

Model
License Requirement

All models

Base License.

Guidelines and Limitations

This section includes the guidelines and limitations for this feature.

Context Mode Guidelines

Supported in single and multiple context mode.

Firewall Mode Guidelines

Supported in routed and transparent firewall mode.

Adding a Public Server that Enables Static NAT

To add a public server that enables static NAT and creates a fixed translation of a real address to a mapped address, perform the following steps:


Step 1 In the Configuration > Firewall > Public Servers pane, click Add to add a new server.

The Add Public Server dialog box appears.

Step 2 From the Private Interface drop-down menu, select the name of the private interface to which the real server is connected.

Step 3 In the Private IP address field, enter the real IP address of the server (IPv4 only).

Step 4 In the Private Service field, click Browse to display the Browse Service dialog box, choose the actual service that is exposed to the outside, and click OK .

Optionally, from the Browse Service dialog box you can click Add to create a new service or service group. Multiple services from various ports can be opened to the outside. For more information about service objects and service groups, see the “Configuring Service Objects and Service Groups” section in the general operations configuration guide.

Step 5 From the Public Interface drop-down menu, enter the interface through which users from the outside can access the real server.

Step 6 In the Public Address field, enter the mapped IP address of the server, which is the address that is seen by the outside user.

Step 7 (Optional) To enable static PAT, check the Specify if Public Service is different from private service check box .

Step 8 Click OK . The configuration appears in the main pane.

Step 9 Click Apply to generate static NAT and a corresponding access rule for the traffic flow and to save the configuration.

For information about static NAT, see the “Information About Static NAT” section.


 

Adding a Public Server that Enables Static NAT with PAT

To add a public server that lets you specify a real and mapped protocol (TCP or UDP) to a port, perform the following steps:


Step 1 Choose Configuration > Firewall > Public Servers , then click Add .

The Add Public Server dialog box appears.

Step 2 From the Private Interface drop-down menu, choose the name of the private interface to which the real server is connected.

Step 3 In the Private IP address field, enter the real IP address of the server (only IPv4 is supported).

Step 4 In the Private Service field, click Browse to display the Browse Service dialog box

Step 5 Choose the actual service that is exposed to the outside, and click OK .

Optionally, from the Browse Service dialog box, click Add to create a new service or service group. Multiple services from various ports can be opened to the outside. For more information about service objects and service groups, see the “Configuring Service Objects and Service Groups” section in the general operations configuration guide.

Step 6 From the Public Interface drop-down menu, enter the interface through which users from the outside can access the real server.

Step 7 In the Public Address field, enter the mapped IP address of the server, which is the address that the outside user sees.

Step 8 Check the Specify Public Service if different from Private Service check box to enable static PAT.

Step 9 In the Public Service field, enter the mapped protocol (TCP or UDP only), or click Browse to choose a protocol from the list.

Step 10 Click OK .

Step 11 Click Apply to generate static NAT with PAT and a corresponding access rule for the traffic flow, and to save the configuration.

For information about static NAT with port address translation, see the “Information About Static NAT with Port Translation” section.


 

Editing Settings for a Public Server

To edit the settings for a public server, perform the following steps:


Step 1 Choose Configuration > Firewall > Public Servers , choose an existing public server, then click Edit .

The Edit Public Server dialog box appears.

Step 2 Make any necessary changes to the following settings:

    • Private Interface—The interface to which the real server is connected.
    • Private IP Address—The real IP address of the server.
    • Private Service—The actual service that is running on the real server.
    • Public Interface—The interface through which outside users can access the real server.
    • Public Address—The IP address that is seen by outside users.
    • Public Service—The service that is running on the translated address. Click the Information icon to view information about supported public services.

Step 3 Click OK , then click Apply to save your changes.


 

Feature History for Public Servers

Table 9-1 lists each feature change and the platform release in which it was implemented. ASDM is backwards-compatible with multiple platform releases, so the specific ASDM release in which support was added is not listed.

 

Table 9-1 Feature History for Public Servers

Feature Name
Platform Releases
Feature Information

Public Servers

8.3(1)

Public servers provide internal and external users access to various application servers.

We introduced the following screen:

Configuration > Firewall > Public Servers