Allowing inside traffic to outside on ASA 5505

cisco-asanetworkingrouting

We have an ASA 5505 with an inside interface 10.22.33.0/24 and outside x.x.x.x/26. The inside ip's are obviously private and the outside ip's are public.

I've been able to set up a nat rule to route all requests to one of the public addresses to server1 with a private address 10.22.33.5. By adding this rule it allows server1 to get out to the internet too which is handy. So far so good.

What I'm struggling to do is to allow all inside ip's to get out to the internet. Does anyone know how I can achieve this?

Best Answer

If using the Cisco ASDM, you have an option to use the "Startup Wizard" while retaining your current configuration.

From the main ASDM window, select "Wizards" and "Startup Wizard..."

Choose "Modify existing configuration"... enter image description here

Step through the screens until you get to "Address Translation" page. For your setup, you want to use Port Address Translation (PAT). Use the firewall's outside interface IP. That means that all traffic not explicitly given a static NAT mapping (like your server) will be sourced out of the firewall's outside interface IP. You may need to delete your existing NAT rule before this will work. Re-add it after running the wizard.

Also see this tutorial.