Website Domain Registration and Website Hosting - Host a Website Tonight
GoWebsite.com provides Domain Registration
Website Hosting, On-Line Shopping Carts,
Blog Hosting, Email Accounts, Security Certificates,
Merchant Accounts & other Website Products.
Free setup! Speak with us anytime: 480-624-2500

Adding IP Addresses to Cisco ASA 5505 Hardware Firewall Device Manager

Some of the information in this article is advanced material we make available as a courtesy. Please be advised that you are responsible for properly following the procedures below. Customer Support cannot assist with these topics.

Translation rules must be added for all new IP addresses. When the Cisco ASA 5505 hardware firewall is installed, the translation rules for existing IP addresses are created automatically.

For each new IP address, you create two static translation rules, one outside traffic and one for inside traffic.

NOTE: For this example, we will use 22.33.44.55 to represent the new IP address. It is assumed that the next available internal IP address is 10.0.0.2.

To Add an IP Address to the Cisco ASA 5505 Firewall

  1. In a Web browser, navigate to https://[your firewall management IP address]/

    NOTE: Depending on which Cisco ASDM version you have installed, several options might display. If so, click Run ASDM Applet.

  2. You may receive a number of security certificate warnings. If you accept the certs and save them as "Trusted," you avoid warnings in the future.
  3. When prompted, enter your User name and Password, and then click OK. You are prompted to log in twice.

    NOTE: Your browser must have Java enabled allow pop-ups from your management IP.

  4. In the Device Manager toolbar, click Configuration.
  5. Click Firewall.
  6. On the left, click NAT.
  7. Under Configuration > Firewall > NAT Rules, click + Add, and then select Add Static NAT Rule.
  8. The remaining steps depend on which information displays:

If you are presented with:

ORIGINAL
Interface: inside
Source:
TRANSLATED
Interface: outside
Use IP Address:

(If you are not presented with this, click here.)

Make the following changes, and then click OK:

  • ORIGINAL
    • Interface — Select inside.
    • Source — Type 10.0.0.2.
  • TRANSLATED
    • Interface — Select outside.
    • Use IP Address — Type 22.33.44.55.

Now you need to add a second static NAT rule.

  1. Under Configuration > Firewall > NAT Rules, click + Add, and then select Add Static NAT Rule.
  2. Complete the on-screen fields, and then click OK:
    • ORIGINAL
      • Interface — Select outside.
      • Source — Type 22.33.44.55.
    • TRANSLATED
      • Interface — Select inside.
      • Use IP Address — Type 10.0.0.2.
  3. Click Apply.
  4. Close the Firewall Device Manager, and then click Save.
  5. Add the internal IP address to your server. For more information, click here.

If you are presented with:

REAL ADDRESS
Interface: inside
IP Address:
Netmask: 255.255.255.255
STATIC TRANSLATION
Interface: outside
IP Address:

Make the following changes, and then click OK:

  • REAL ADDRESS
    • Interface — Select inside.
    • IP Adress — Type 10.0.0.2.
    • Netmask — Type 255.255.255.255.
  • STATIC TRANSLATION
    • Interface — Select oustide.
    • IP Address — Type 22.33.44.55.

Now you need to add a second static NAT rule.

  1. Click OK.
  2. Under Configuration > Firewall > NAT Rules, click + Add, and then select Add Static NAT Rule.
  3. Complete the on-screen fields, and then click OK:
    • REAL ADDRESS
      • Interface — Select outside.
      • IP Adress — Type 22.33.44.55.
      • Netmask — Type 255.255.255.255.
    • STATIC TRANSLATION
      • Interface — Select inside.
      • IP Address — Type 10.0.0.2.
  4. Click Apply.
  5. Close the Firewall Device Manager, and then click Save.
  6. Add the internal IP address to your server.

Now you must add the internal IP address to your server. The process differs depending on your server's operating system.

Linux

For Fedora/CentOS

  1. At root, copy "/etc/sysconfig/network-scripts/ifcfg-eth0
    to
    /etc/sysconfig/network-scripts/ifcfg-eth0:0.
  2. Edit /etc/sysconfig/network-scripts/ifcfg-eth0:0, changing the IP to the new internal IP, and changing DEVICE to eth0:0.
  3. Restart the network service using this command:
    service network restart
    .

For Ubuntu

  1. Edit /etc/network/interfaces.
  2. Add the following lines to the bottom of the file:
    # The secondary network interface
    auto eth0:0
    iface eth0:0 inet static
    address 10.0.0.2
    netmask 255.255.255.0
  3. Restart the network service using the following command:
    /etc/init.d/networking restart

Windows

In the Advanced section of your TCP/IP Settings, add the new internal IP using 255.255.255.0 as the netmask.

NOTE: We monitor IP address allocation. Attempting to add IP addresses to your server that you did not purchase violates your terms of service agreement and may result in the suspension of your account.

Domain Registration Domain Registration
Pay less for website domain names. Register your own .com, .net or .org for as low as $10.00 per year. (Plus ICANN fee of 18¢ per domain.) A free Email Account is included.
Website Hosting Website Builder
For as little as $3.89 per month you can build your Website online with Website Builder using our easy to use professional templates.
Play Video - Demo
Shopping Cart Software Quick Shopping Cart
Build and run your own successful online store in minutes! You're just five easy steps away!
Play Video
Website Hosting Website Hosting
Everything you need to give your Website the high-performance home it deserves!  Protect transactions and customer data with a
SSL Certificate