Cisco Cisco ASA 5505 Adaptive Security Appliance 기술 매뉴얼

다운로드
페이지 11
Contents
Introduction
Prerequisites
Requirements
Components Used
Overview
Goals
Access Control List Overview
NAT Overview
Configure
Get Started
Topology
Step 1 - Configure NAT to Allow Hosts to Go Out to the Internet
Step 2 - Configure NAT to Access the Web Server from the Internet
Step 3 - Configure ACLs
Step 4 - Test Configuration with the Packet Tracer Feature
Verify
Troubleshoot
Conclusion
Introduction
This document provides a simple and straightforward example of how to configure Network
Address Translation (NAT) and Access Control Lists (ACLs) on an ASA Firewall in order to allow
outbound as well as inbound connectivity. This document was written with an Adaptive Security
Appliance (ASA) 5510 firewall than runs ASA code version 9.1(1), but this can easily apply to any
other ASA firewall platform. If you use a platform such as an ASA 5505, which uses VLANs
instead of a physical interface, you need to change the interface types as appropriate.
Prerequisites
Requirements
There are no specific requirements for this document.
Components Used
The information in this document is based on an ASA 5510 firewall that runs ASA code version
9.1(1).
The information in this document was created from the devices in a specific lab environment. All of
the devices used in this document started with a cleared (default) configuration. If your network is
live, make sure that you understand the potential impact of any command.