cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
332
Views
0
Helpful
4
Replies

ASA 5505 Inter-VLAN Problem

mrouton72
Level 1
Level 1

I have an ASA 5505 with a Security license at a remote site connected via VPN.  VLAN 1 functions correctly.  In process, of deploying VoIP phones and some web based security cameras.  I have created the necessary VLANs and assigned them to interface 0/5 which is trunked to allowed VLANS inside1,voice20,video30; other interfaces are shutdown.

inside - VLAN1      Security level (100)

VOICE - VLAN20   Security level (90)

VIDEO - VLAN30   Security level (80)

outside - VLAN2     Security level (0)

The interfaces and VLANs are all "up" and I can ping each gateway only from its own interface.  No inter VLAN access or internet access from VOICE or VIDEO interfaces?!  I cannot access the lower level VLANs from the inside VLAN1 (100).  I have already done this config on an ASA 5512 with sub-interfaces and the security levels work perfectly.  On the ASA 5505, the security levels don't seem to be working...what am I missing??  Config is posted below:  Thx in advance!

================================================================================

Result of the command: "sh conf"

!
ASA Version 8.2(5)
!
hostname WH

names
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/5
 switchport trunk allowed vlan 1,20,30
 switchport trunk native vlan 1
 switchport mode trunk
!
interface Vlan1
 description Internal Gateway
 nameif inside
 security-level 100
 ip address 172.16.13.1 255.255.255.0
!
interface Vlan2
 description External Gateway
 nameif outside
 security-level 0
 ip address x.x.x.x 255.255.255.240
!
interface Vlan20
 description VOICE Gateway
 nameif VOICE
 security-level 90
 ip address 172.16.23.1 255.255.255.0
!
interface Vlan30
 description VIDEO Gateway
 nameif VIDEO
 security-level 80
 ip address 172.16.33.1 255.255.255.0
!
ftp mode passive
same-security-traffic permit intra-interface
access-list outside_1_cryptomap extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu VOICE 1500
mtu VIDEO 1500
ipv6 access-list VIDEO_access_ipv6_in deny ip any any
ipv6 access-list inside_access_ipv6_in deny ip any any
ipv6 access-list VOICE_access_ipv6_in deny ip any any
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
nat (VOICE) 1 0.0.0.0 0.0.0.0
access-group inside_access_ipv6_in in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.x 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
http 172.16.13.0 255.255.255.0 inside
http x.x.x.x 255.255.255.255 outside
http x.x.x.x 255.255.255.224 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer x.x.x.x
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh 172.16.13.0 255.255.255.0 inside
ssh 192.168.1.0 255.255.255.0 inside
ssh 192.168.10.0 255.255.255.0 inside
ssh x.x.x.x 255.255.255.255 outside
ssh x.x.x.x 255.255.255.224 outside
ssh timeout 5
console timeout 0
management-access inside
dhcpd address 172.16.13.10-172.16.13.15 inside
dhcpd dns x.x.x.x x.x.x.x interface inside
dhcpd domain harcofittings.com interface inside
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server x.x.x.x source outside prefer
ntp server 192.168.1.21 source inside
webvpn
group-policy GroupPolicy1 internal
group-policy GroupPolicy1 attributes
 vpn-tunnel-protocol IPSec
username admin password .... encrypted privilege 15
username alieng password .... encrypted privilege 15
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
 pre-shared-key *
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny 
  inspect sunrpc
  inspect xdmcp
  inspect sip 
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:871248220b89f6a6d2e8143acdf9ead4

4 Replies 4

jj27
Spotlight
Spotlight

Most likely, the code you're running on the 5512-X does not require NAT/NAT exemption between interfaces on the ASA which is probably why it works there.

You are running 8.2(5) on a 5505 so you will need to NAT exempt the traffic from inside->voice/video and voice/video->inside.

You can accomplish that using your existing nat 0 statement, plus adding a couple more.  Give the following a try:

access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 172.16.23.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 172.16.33.0 255.255.255.0
access-list VOICE_nat0_outbound extended permit ip 172.16.23.0 255.255.255.0 172.16.13.0 255.255.255.0
access-list VOICE_nat0_outbound extended permit ip 172.16.23.0 255.255.255.0 172.16.33.0 255.255.255.0

access-list VIDEO_nat0_outbound extended permit ip 172.16.33.0 255.255.255.0 172.16.13.0 255.255.255.0
access-list VIDEO_nat0_outbound extended permit ip 172.16.33.0 255.255.255.0 172.16.23.0 255.255.255.0

nat (VOICE) 0 access-list VOICE_nat0_outbound
nat (VIDEO) 0 access-list VIDEO_nat0_outbound

Thank you for the quick response...but still no joy.  If I do a packet trace, it will always drop the packet on the default Implicit Deny rule for interface.  I have even added an Explicit Permit Any-Any rule for the interface to over ride it above the implicit Deny rule and it still drops on the implicit Deny rule...how is this possible??

Also, I read about a few other people having this same problem and Cisco TAC told them to upgrade their firmware and that fixed the problem but I cannot officially confirm this...as I do not have SmartNet for this device.  Have you heard of any problems like this with the firmware?

  Well, I have upgraded my firmware from 8.2(5) to 9.2(4) to see if that would resolve my inter-VLAN issue...but no joy.  I had to do some cleanup after the upgrade, ended up deleting all of the NAT rules and new VLAN interfaces and starting over.  I added some Permit Any-Any rules to the interfaces just to get the functionality tested and operational. All the VLANs are on the same physical interface (0/5) which is set to Trunk allowing VLANs 1,20,30 and set to Native 1.  I have checked the "Enable traffic between two or more hosts connected to the same interface" option. I currently, don't have any NAT rules setup between the VLANs.  I did try your rules but no joy.

  I am using some web based security cameras on the VIDEO VLAN30 to test my functionality.  My VIDEO VLAN does not need Internet access.  I just need the ability to access the VIDEO VLAN from the Inside VLAN which should be inherently provided via the Security Levels.

  There is still No inter-VLAN connectivity...and I cannot ping the webcams from the VIDEO interface.  I just don't understand why this is not working properly... Any ideas??  (updated config is posted below).  Thanks in advance!

Result of the command: "sh conf"

!
ASA Version 9.2(4)
!
hostname ASA5505
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain

names
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
 shutdown
!
interface Ethernet0/2
 shutdown
!
interface Ethernet0/3
 shutdown
!
interface Ethernet0/4
 shutdown
!
interface Ethernet0/5
 switchport trunk allowed vlan 1,20,30
 switchport trunk native vlan 1
 switchport mode trunk
!
interface Ethernet0/6
 shutdown
!
interface Ethernet0/7
 shutdown
!
interface Vlan1
 description Internal Gateway
 nameif inside
 security-level 100
 ip address 172.16.13.1 255.255.255.0
!
interface Vlan2
 description External Gateway
 nameif outside
 security-level 0
 ip address x.x.x.x 255.255.255.240
!
interface Vlan20
 description VOICE Gateway
 nameif VOICE
 security-level 90
 ip address 172.16.23.1 255.255.255.0
!
interface Vlan30
 description VIDEO Gateway
 nameif VIDEO
 security-level 80
 ip address 172.16.33.1 255.255.255.0
!
boot system disk0:/asa924-k8.bin
ftp mode passive
same-security-traffic permit intra-interface
object network obj_172.16.13.0_24
 subnet 172.16.13.0 255.255.255.0
object network obj_192.168.1.0_24
 subnet 192.168.1.0 255.255.255.0
object network obj_172.16.33.0_24
 subnet 172.16.33.0 255.255.255.0
access-list outside_1_cryptomap extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 172.16.13.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list VOICE_access_in extended permit ip any4 any4
access-list VOICE_access_in extended deny ip any6 any6
access-list VIDEO_access_in extended permit ip any4 any4
access-list VIDEO_access_in extended deny ip any6 any6
access-list outside_access_in extended deny ip any6 any6
access-list inside_access_in extended permit ip any4 any4
access-list inside_access_in extended deny ip any6 any6
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu VOICE 1500
mtu VIDEO 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-743.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static obj_172.16.13.0_24 obj_172.16.13.0_24 destination static obj_192.168.1.0_24 obj_192.168.1.0_24 no-proxy-arp route-lookup description VA VPN
nat (inside,outside) source dynamic obj_172.16.13.0_24 interface description Internet Access
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
access-group VOICE_access_in in interface VOICE
access-group VIDEO_access_in in interface VIDEO
route outside 0.0.0.0 0.0.0.0 x.x.x.x 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
http 172.16.13.0 255.255.255.0 inside
http x.x.x.x 255.255.255.255 outside
http x.x.x.x 255.255.255.224 outside
no snmp-server location
no snmp-server contact
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec security-association pmtu-aging infinite
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 65.213.218.210
crypto map outside_map 1 set ikev1 transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto ca trustpool policy
crypto ikev1 enable outside
crypto ikev1 policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh stricthostkeycheck
ssh 172.16.13.0 255.255.255.0 inside
ssh 192.168.1.0 255.255.255.0 inside
ssh 192.168.10.0 255.255.255.0 inside
ssh x.x.x.x 255.255.255.255 outside
ssh x.x.x.x 255.255.255.224 outside
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
management-access inside

dhcpd address 172.16.13.10-172.16.13.15 inside
dhcpd dns x.x.x.x x.x.x.x interface inside
dhcpd domain harcofittings.com interface inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server x.x.x.x source outside prefer
ntp server 192.168.1.21 source inside
group-policy GroupPolicy1 internal
group-policy GroupPolicy1 attributes
 vpn-tunnel-protocol ikev1
tunnel-group x.x.x.x type ipsec-l2l
tunnel-group x.x.x.x ipsec-attributes
 ikev1 pre-shared-key *****
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny 
  inspect sunrpc
  inspect xdmcp
  inspect sip 
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:cae4c8e16b67b1355edad8d62966af88

Good news!  I got it working!  The firmware upgrade was the overall fix but apparently when an upgrade is performed for 9.0 or above the xlate rules start blocking everything.  Had to run the "clear configure xlate" command.  No additional NAT rules required, the security levels seems to be working now.

  Thank you for your assistance.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card