Cisco 515E - PIX Restricted Bundle Getting Started Manual page 39

Security appliance
Hide thumbs Also See for 515E - PIX Restricted Bundle:
Table of Contents

Advertisement

Chapter 2
Scenario: DMZ Configuration
Configuring the Security Appliance for a DMZ Deployment
Click Apply to save the configuration changes to the configuration that the
Step 7
security appliance is currently running.
Clients on both the private and public networks can now resolve HTTP requests
for content from the DMZ web server, while keeping the private network secure.
Although the destination address specified is the private address of the DMZ web
Note
server (10.30.30.30), HTTP traffic from any host on the Internet destined for the
public address 209.165.200.226 is permitted through the security appliance. The
address translation (209.165.200.226 to 10.30.30.30) allows the traffic to be
permitted. For information about creating the translation rule, see the
"Configuring NAT for Inside Clients to Communicate with the DMZ Web
Server" section on page
2-12.
PIX 515E Security Appliance Getting Started Guide
2-23
78-17645-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 515e

Table of Contents