cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 
cancel
2737
Views
0
Helpful
6
Replies

Route traffic between interfaces on ASA

dennisshiburi
Level 1
Level 1

Hi all

 

Please see below output for troubleshooting. I have ASA with 3 interfaces, Outside(192.168.88.10 sec-level 0), Inside(172.16.0.1 sec-level 100) and DMZ(10.0.0.1 sec-level 50). from Inside i can reach Outside and vice versa. but i cant reach inside from dmz and vice versa. im looking for a way i can route traffic between these different interfaces. Packet-trace shows packet is allowed, but i still cant reach it

 

 

ASA# packet-tracer input DMZ icmp 10.0.0.2 0 8 172.16.0.2 detailed

Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 172.16.0.0 255.255.255.0 Inside

Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group DMZ_access_in_1 in interface DMZ
access-list DMZ_access_in_1 extended permit ip any4 any4
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f624c30, priority=13, domain=permit, deny=false
hits=3, user_data=0x7d07cac0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=DMZ, output_ifc=any

Phase: 3
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (DMZ,Inside) source static any any unidirectional
Additional Information:
Static translate 10.0.0.2/0 to 10.0.0.2/0
Forward Flow based lookup yields rule:
in id=0x8002cfa0, priority=6, domain=nat, deny=false
hits=0, user_data=0x80005ba8, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=DMZ, output_ifc=Inside

Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7f95f900, priority=0, domain=nat-per-session, deny=true
hits=3060, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=any

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x80031480, priority=0, domain=inspect-ip-options, deny=true
hits=37, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=DMZ, output_ifc=any

Phase: 6
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map inspection_default
match default-inspection-traffic
policy-map global_policy
class inspection_default
inspect icmp
service-policy global_policy global
Additional Information:
Forward Flow based lookup yields rule:
in id=0x808ae3e0, priority=70, domain=inspect-icmp, deny=false
hits=5, user_data=0x808acc78, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0
input_ifc=DMZ, output_ifc=any

Phase: 7
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x80030f20, priority=66, domain=inspect-icmp-error, deny=false
hits=5, user_data=0x80030530, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0
input_ifc=DMZ, output_ifc=any

Phase: 8
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (DMZ,Inside) source static any any unidirectional
Additional Information:
Forward Flow based lookup yields rule:
out id=0x8002d268, priority=6, domain=nat-reverse, deny=false
hits=1, user_data=0x809acdb8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=DMZ, output_ifc=Inside

Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 2264, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_inspect_icmp
snp_fp_translate
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat

Module information for reverse flow ...

Result:
input-interface: DMZ
input-status: up
input-line-status: up
output-interface: Inside
output-status: up
output-line-status: up
Action: allow

 

 

 

Show run:

ASA Version 9.1(5)16
!
hostname ASA
enable password yu67yu678hj7y8 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
names
!
interface Ethernet0
nameif Outside
security-level 0
ip address 192.168.88.10 255.255.255.0
!
interface Ethernet1
nameif DMZ
security-level 50
ip address 10.0.0.1 255.255.255.0
!
interface Ethernet2
nameif Inside
security-level 100
ip address 172.16.0.1 255.255.255.0
!
interface Ethernet3
shutdown
no nameif
no security-level
no ip address
!
ftp mode passive
object network AnyNet_Outbound
subnet 0.0.0.0 0.0.0.0
object network 172_
subnet 172.16.0.0 255.255.255.0
object network 10_
subnet 10.0.0.0 255.255.255.0
object network 192_
subnet 192.168.88.0 255.255.255.0
object network 10
subnet 10.0.0.0 255.255.255.0
access-list Inside_access_in_2 extended permit ip any4 any4
access-list DMZ_access_in_1 extended permit ip any4 any4
access-list Outside_access_in extended permit ip 192.168.88.0 255.255.255.0 any
pager lines 24
mtu Outside 1500
mtu DMZ 1500
mtu Inside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-733.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (any,Outside) source dynamic any interface
nat (Outside,any) source static any AnyNet_Outbound
nat (DMZ,Inside) source static any any unidirectional
access-group Outside_access_in in interface Outside
access-group DMZ_access_in_1 in interface DMZ
access-group Inside_access_in_2 in interface Inside
route Outside 0.0.0.0 0.0.0.0 192.168.88.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication http console LOCAL
http server enable
http 192.168.88.252 255.255.255.255 Outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
anyconnect-essentials
username denniz password 5IhGazyGRWcKbXuP encrypted privilege 15
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map default-policy
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect icmp
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1

6 Replies 6

Francesco Molino
VIP Alumni
VIP Alumni

Hi

 

first of all why are you using nat between dmz and inside?

You don't need them if you just want to route traffic between the 2 zones. Then, you need to allow inter interface communication with the command: same-security-traffic permit inter-interface

 

Then, just a recommendation, don't use any keyword in nat and specify the source zone to not face weird issues (non expected behaviour).


Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Even if I remove all NAT statements, I still can't route between. I tried many config changes 

I agree that the NAT is not needed and may cause confusing results.

Do your inside subnets know to use the ASA as the route for DMZ addresses?

Is the inside ip configured in your asa the default gateway of your inside hosts? Otherwise you'll need to do routing on your core device to point to asa to reach dmz.

Can you share a quick sketch?

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question

Yes. The inside router points DMZ traffic to ASA inside ip. ASA has inside,
DMZ and outside gateways as routes, directly connected

Ok can you run the packet-tracer (after having removed the nat):
- 1st packet-tracer using inside as source with DMZ as destination
- 2nd packet-tracer with the invert.

If the inside router points DMZ traffic to ASA, this means you should have a route back on your ASA to point your inside traffic back to your router and I don't see any inside routes right now. Can you add the correct route to tell ASA how to reach your inside subnets and test again please?

Thanks
Francesco
PS: Please don't forget to rate and select as validated answer if this answered your question
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card