<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA  5505 to allow 2nd network segment through mpls in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237854#M348796</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; also to test your configured rules for the servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to take one of the WI public IP addresses as an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.2.3.4 12345 12.227.190.163 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source IP 1.2.3.4 and source port 12345 are just random ones selected for the test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I however dont see a problem with your configuration that you provided originally related to the server Static NAT and ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 05 Jun 2013 13:55:34 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-06-05T13:55:34Z</dc:date>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237836#M348770</link>
      <description>&lt;P&gt;I have been having a heck of a time trying to configure my 5505 to allow the second segment on my network to use the internet.&lt;/P&gt;&lt;P&gt;Office 1 has a fiber internet connection, and all traffic flows fine.&lt;/P&gt;&lt;P&gt;Office 2 had gotten it's internet from AT&amp;amp;T, via a network based firewall injecting a default route into the mpls cloud.&lt;/P&gt;&lt;P&gt;both offices connunicate to each other through the mpls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we added the fiber to office 1, we had the mpls people change the default internet route to the inside address of the 5505 and things worked fine.&lt;/P&gt;&lt;P&gt;when AT&amp;amp;T attempted to remove the NBF defaut route, and inject the 5505's address as default, things didn't go so well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AT&amp;amp;T claims that it is within my nat cmmands on the 5505, but won't tell me anything else.&amp;nbsp; I assume that they are correct, and I assume that I am not good enough with the 5505 ASDM to tell it what to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Office 1 uses 10.10.30.xx addresses and Office 2 uses 10.10.10.xx - the 5505 inside interface is 10.10.30.2 the internal interfaces of the mpls are 10.10.30.1 and 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know what other information you would need, but am stuck here at Office 1 until I can get this working.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:52:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237836#M348770</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2019-03-12T01:52:07Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237837#M348771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be possible to get some simple drawing of the current problematic topology?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jun 2013 23:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237837#M348771</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-01T23:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237838#M348772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Attached are a PDF file showing the old to new diagrams, and a txt file showing my current ASA configuration.&lt;/P&gt;&lt;P&gt;If there is anything else you need, I will be happy to send it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 15:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237838#M348772</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-02T15:12:45Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237839#M348773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still not quite sure about the sites connectivity where the ASA resides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though one thing that caught my eye is that you are using the mask /16 in the ASA "inside" interface. If the ASA is supposed to route traffic destined to 10.10.10.0/24 to somewhere else then this mask will cause problems atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA will think that the hosts 10.10.10.x are directly connected to its "inside" interface and will try to ARP for their MAC address rather than forward traffic somewhere. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the static routes configured on the ASA seem strange. They only use host mask /32. Naturally these routes arent in use at the moment since the ASA "inside" interface is /16. You might want to consider changing the mask to /24 unless I understood something about the network setup incorrectly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 15:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237839#M348773</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-02T15:25:21Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237840#M348774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA sits on the switch in the PA office (the same one that the PA users are connected to) this switch has the PA MPLS router (10.10.30.1) attached to it as well. so traffic from 10.10.10.xx comes along through the MLS to 10.10.30.1, which decides if it needs to go to a 10.10.30.x server, or to the internet via 10.10.30.2 (the ASA) so the only traffic that the ASA "should" see is internet traffic. Unless this 57 year old IT guy is just way out in left field with these "newfangled" devices &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A few years ago, we had the opposite situation, all PA traffic came to WI through the MPLS and out to the internet via an AT&amp;amp;T DIA - but that was all managed by AT&amp;amp;T and didn't require me to maintain my own firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I probably should have popped for something a little more expensive than the ASA 5505 but my budget was tight at the time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The two objects "bloomsburg /24" and "cottagegrove /24" aren't actually used anywhere in the ACL's I had put them in in an attempt to follow a comment from an AT&amp;amp;T tech&amp;nbsp; The Inside network was defined as subnet 255.255.0.0 because I assumed that would be necessary to allow both 10.10.10.x and 10.10.30.x traffic.&amp;nbsp; I may have messed that up in the original configuration, but as it sits now - the PA office can "talk" with both the internet, and with the WI network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 16:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237840#M348774</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-02T16:19:25Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237841#M348775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm where the hosts on PA network 10.10.30.0/24 get their IP addresses from?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it from the PA 3900 or the PA ASA? Though more interested in which of the devices is acting as the default gateway for the PA network 10.10.30.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 17:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237841#M348775</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-02T17:04:48Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237842#M348776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the hosts wont get the IP addresses from the ASA as I can see that the ASA is not configured for DHCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So either the PA 3900 is acting as a DHCP server or you have an internal DHCP server in the PA network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 17:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237842#M348776</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-02T17:05:50Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237843#M348778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry - yes the PA 3900 is the DHCP for 10.10.30.x subnet and the WI 2800 provides it for the 10.10.10.x subnet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 18:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237843#M348778</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-02T18:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237844#M348780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, so IF I have not understood anything wrong (which is still possible &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;), it would seem to me that the network mask of the ASA is atleast one reason that will cause problems for WI LAN if they try to use the Internet through the ASA5505 on the PA site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I would presume will happen when a host on the WI LAN initiates a connection to the Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;WI PC 10.10.10.10 sends a TCP SYN to initiate/open a TCP connection with a Web server on the Internet&lt;/LI&gt;&lt;LI&gt;The TCP SYN gets forwarded to the default gateway of the PC which is 10.10.10.1&lt;/LI&gt;&lt;LI&gt;The TCP SYN packet traverses the ISP MPLS network all the way to the PA Site&lt;/LI&gt;&lt;LI&gt;The PA Site 3900 has a default route probably towards PA ASA 10.10.30.2&lt;/LI&gt;&lt;LI&gt;TCP SYN gets forwarded from the PA 3900 to the PA ASA according to the above mentioned default route on the PA 3900&lt;/LI&gt;&lt;LI&gt;TCP SYN arrives on the ASA and gets forwarded to the Internet&lt;/LI&gt;&lt;LI&gt;TCP SYN,ACK from the Web server arrives on the ASA&lt;/LI&gt;&lt;LI&gt;ASA will ARP for the MAC address of the WI PC IP address of 10.10.10.10 because it thinks that the host is directly connected to the ASAs "inside" interface because of the "inside" interfaces large /16 network mask which contains addresses between 10.10.0.0 - 10.10.255.255&lt;/LI&gt;&lt;LI&gt;The ARP request sent from the ASA never receives a reply since the WI PC isnt directly connected&lt;/LI&gt;&lt;LI&gt;PA ASA will never be able to forward the traffic to the WI PC which is trying to open the connection to the Internet because of the above mentioned problem. Therefore the TCP connection from WI PC never succeeds and timeouts.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you might ask, why does the connections between the PA and WI LAN work. To my understanding is that because the traffic from the PA hosts gets first forwarded to the PA 3900 then they have a working route to the WI LAN. The same way the WI LAN has a working route towards the PA LAN since the ASA isnt not involed in anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PA Internet connection naturally works as the 10.10.30.0/24 hosts are directly connected to the ASA so the above mentioned ARP will not fail on their part and traffic is forwarded just fine between the PA LAN and the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to my understanding the solution to this problem would be to change the PA ASA "inside" subnet mask from 255.255.0.0 to 255.255.255.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are unsure of the of this change I would suggest you do it when there is low network use (so you can revernt the change) Naturally if you are on the PA LAN then you can probably access the Console connection if something were to go wrong. I cant see any configurations on the PA ASA which would imply that you configure the device remotely through the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I made sense and hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 18:25:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237844#M348780</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-02T18:25:14Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237845#M348782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow, thanks for making the syn packet walkthrough so easy to understand.&amp;nbsp; I can make that change in PA easily, as I am here in PA for the week.&amp;nbsp; But having done that, what would the syn step by step be for a 10.10.10.x request for the internet?&amp;nbsp; Would I need to put something in the ASA to tell it where to look for the 10.10.10.x subnet? and would that be the PA 3900 (10.10.30.1)? or the WI 2800 (10.10.10.1)?&amp;nbsp; The 3900 already "knows" how to get to the 2800, so ... thinking aloud here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, I will make the subnet change on the ASA, and ask AT&amp;amp;T to re-do their changes.&amp;nbsp; I should know if this works Monday evening, as that is the soonest that I can get both the AT&amp;amp;T MPLS tech and the AT&amp;amp;T NBF tech to set up dual tickets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll let you know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 18:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237845#M348782</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-02T18:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237846#M348783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would presume that the ASA would need a route pointing towards the PA 3900 LAN interface IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.10.10.0 255.255.255.0 10.10.30.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will have to say that as I dont know exactly how the PA 3900 to WI 2800 link is implemented I will have to presume how they have done it or how we would do it at our ISP where I work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I presume to be the case when the ASA is supposed to handle both of the LAN networks Internet connectivity is this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;WI 2800 has an interface to both WI LAN and WI WAN.&lt;/LI&gt;&lt;LI&gt;The WI WAN interface leads to the ISP Core where the ISP handles the routing between these 2 locations&lt;/LI&gt;&lt;LI&gt;The ISP Core has a route for both the WI LAN and PA LAN and also a default route pointing towards the PA Site which eventually at PA 3900 points towards the PA ASA LAN interface IP address of 10.10.30.2&lt;/LI&gt;&lt;LI&gt;The PA 3900 router also has PA LAN and PA WAN link&lt;/LI&gt;&lt;LI&gt;The PA WAN interface leads to the ISP Core the same way as the WI WAN link above&lt;/LI&gt;&lt;LI&gt;The PA 3900 probably also has a separate link that handles the actual Internet connection for the PA Site (and after the change also for WI site)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I am not sure about is how the ISP has handled the PA 3900 configuration. I mean they have had to separate the actual Internet WAN link and the WAN link heading to the WI site. Since you can really have the default route pointing towards the PA Site at the same time when you provide the default route towards the Internet. Most common way this is done would probably to use a VRF (basically creates another routing table on the router) But I would imagine this is not something you should have to worry about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the only thing you should do is change the PA ASA "inside" interface network mask from 255.255.0.0 -&amp;gt; 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am afraid I cant give you an 100% sure answer on this as I dont know the setup between the sites. And I imagine you dont have access to the PA 3900 and WI 2800 either to provide those configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct to assume that currently the WI Site uses Internet directly through its ISP link as the last time you (or rather the ISP) tried to route the WI traffic through the PA Site the Internet connections failed from the WI site but the WI &amp;lt;-&amp;gt; PA traffic was fine?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 19:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237846#M348783</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-02T19:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237847#M348785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I will make the changes and let you know.&lt;/P&gt;&lt;P&gt;Yes your assumption in your last paragraph is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 19:49:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237847#M348785</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-02T19:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237848#M348786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Was just sent this drawing of what we are trying to do.&lt;/P&gt;&lt;P&gt;It may help you to visualize things better&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 22:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237848#M348786</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-02T22:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237849#M348788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we look at the picture section that describes the PA network, does it actually have 2 physical routers or that single 3900 router with 2 separate GigabitEthernet interface and other interfaces to provide the WAN connectivity? (EDIT: Actually now that I look at it, it does mention the Gi0/0 port twice so I guess we are talking about 2 separate routers)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not that it matters actually...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its starting to seem to me that the network is built pretty much as I expected it would have been and the above matter I ask just rather clarifies the way the ISP has implemented the connectivity between the LANs and the WAN link on the PA site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it would seem to me that what I have suggested should be the solution to the problem with the WI Internet connectivity through PA Site and that is changing the network mask on the ASA so that the ASA doesnt think that the WI is actually directly connected network (and naturally adding the route to the ASA to tell where to find the WI LAN network). This should atleast be one problem with the setup. Naturally there might be something else, but not related to normal routing atleast if the ISP correctly specifies the default route. (I guess its now still pointing towards their own firewalls in the MPLS core network of theirs)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the network mask change solves the problem I would keep an eye on one possible future problem on the PA site. Currently your hosts on the PA site have the router as the default gateway and this is the best choice at this point. If we presume that you were to change the ASA to be the default gateway of the PA site you would run into connectivity problems between PA and WI site (without additional ASA configurations). This would be because while the ASA would see the connections coming from the PA hosts towards WI hosts, the ASA wouldnt however see the connections/packets coming from WI hosts to PA hosts as the PA router would directly send the packets to the PA hosts wihtout forwarding the traffic to the ASA (Because the PA router already sees the PA network directly connected and therefore forwards traffic directly to hosts)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe I shouldnt talk more, better to get an existing problem out of the way &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully you get this thing to work on the next try &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Please do remember to mark a reply as the correct answe if you have found some reply to be the correct answer (after you have tested the network change the next time) and/or rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how it went.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jun 2013 22:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237849#M348788</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-02T22:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237850#M348789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the PA office has two seperate AT&amp;amp;T routers - one for the MPLS and one for the fiber DIA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jun 2013 00:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237850#M348789</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-03T00:56:04Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237851#M348791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dennis,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you yet tried to change the setup again with the ISP? Would be interested in hearing if you managed to get the 2 LAN network working through the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 04:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237851#M348791</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-05T04:11:07Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237852#M348793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried with the suggested changes on Monday night.&amp;nbsp; Internet connectivity from both offices was successfull.&lt;/P&gt;&lt;P&gt;My NAT rules and acl's seem to be off tho, as none of the servers sitting in the WI office could be accessed via their "new" public ip addresses.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 13:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237852#M348793</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-05T13:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237853#M348794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So did you have to revert back to the old setup again? &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your ASA configuration I cant really see the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You confirmed that WI office could now use Internet so we now that routing should be fine between WI LAN and ASA&lt;/LI&gt;&lt;LI&gt;You have configured the Static NAT correctly&lt;/LI&gt;&lt;LI&gt;You have ACL rules attached to the "outside" interface. Whether the ACL Rules are the correct ones I cant say.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first place to look would naturally be the logs and see if connections were getting to your ASA and if they were perhaps being torn down because of SYN Timeout or something similiar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also seems that the public IP address space used is directly connected between the ASA and the ISP router so it should be already in the routing of the ISP and I couldnt imagine why they wouldnt be reached from the Internet. Or was there some rerouting of public IP addresses also involved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems though that the old "inside" interface network mask was the problem with the WI Internet through the ASA originally but there is still something more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please mark a reply as a correct answer since we solved the original problem of connectivity between the LANs. I see no problem with continuing trying to solve the problem with the servers also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 13:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237853#M348794</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-05T13:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237854#M348796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; also to test your configured rules for the servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to take one of the WI public IP addresses as an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.2.3.4 12345 12.227.190.163 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source IP 1.2.3.4 and source port 12345 are just random ones selected for the test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I however dont see a problem with your configuration that you provided originally related to the server Static NAT and ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 13:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237854#M348796</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-05T13:55:34Z</dc:date>
    </item>
    <item>
      <title>ASA  5505 to allow 2nd network segment through mpls</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237855#M348797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HAd to revert back to the old setup as the email server and webserver currently reside in WI so not correctly Natting them stops business flow.&amp;nbsp; Simple answer is just bringing them out to PA, but that would mean more travel for me as my home base is in WI. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your assistance.&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 13:59:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-to-allow-2nd-network-segment-through-mpls/m-p/2237855#M348797</guid>
      <dc:creator>Dennis Newman</dc:creator>
      <dc:date>2013-06-05T13:59:58Z</dc:date>
    </item>
  </channel>
</rss>

