01-09-2013 04:49 AM - edited 03-11-2019 05:44 PM
Hi all, I got a ASA5510 and I'm trying to make public a service on a host reacheable through VPN IPSEC.
The VPN works well but not the NAT from outside interface.
I need to send packet into VPN with source IP: SRCNetworkGRIS
The server is published on IP address of outside interface
The remote server is 10.246.100.11
The service (HTTP) must to be published on port 8888 in the outside interface.
Here it's a part of my conf
object network ServerVPN
host 10.246.100.11
object network ServerVPN
nat (OUTSIDE,OUTSIDE) static interface service tcp www 8888
object network SRCNetworkGRIS
subnet 10.232.226.56 255.255.255.248
description SRC Network GRIS PRO
object network obj-10.246.0.0
subnet 10.246.0.0 255.255.0.0
access-group access_in in interface OUTSIDE
access-list access_in extended permit tcp any object ServerVPN eq www
crypto map LAN_map 4 match address OUTSIDE_cryptomap_1
access-list OUTSIDE_cryptomap_1 extended permit ip object SRCNetworkGRIS 10.246.0.0 255.255.0.0
nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0
Anyone can help me to find the issue? from debug I see syn timeout, so maybe the remote host can't reply back to ASA.
Thanks.
01-09-2013 05:21 AM
Hi,
Are you saying that you have the following setup?
If this is the case I would imagine the problem is the return routing for the Web site connection and before that probably the NAT configuration.
When you consider that the source address to this public service can be nearly any public IP address it would mean that the remote site should tunnel all traffic for the Web server to the L2L VPN connection for the return traffic to be forwarded correctly. In the same way the local site should tunnel traffic with any source address to the remote site server
If I understood the situation correctly this is probably what happens when attempting the connection
Can you confirm my original assumption of your network setup?
Could you also share the whole L2L VPN configuration and possibly the whole NAT configuration if possible.
After this we could look into an alternative configuration to establish this connectivity.
- Jouni
01-09-2013 06:03 AM
Yes your assumption is correct.
I think the packet reach the remote server but cannot come back. Now I'm trying to install wireshark to check what's happen in the remote site.
This is the config of the tunnel:
crypto map LAN_map 4 match address OUTSIDE_cryptomap_1
crypto map LAN_map 4 set pfs
crypto map LAN_map 4 set peer remote_ip
crypto map LAN_map 4 set ikev1 transform-set ESP-AES-128-MD5
access-list OUTSIDE_cryptomap_1 extended permit ip object SRCNetworkGRIS 10.246.0.0 255.255.0.0
tunnel-group remote_ip type ipsec-l2l
tunnel-group remote_ip general-attributes
default-group-policy GroupPolicy_remote_ip
tunnel-group remote_ip ipsec-attributes
For the NAT:
nat (any,any) source static otherNetwork1 SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0
nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0
nat (any,any) source static otherNetwork2 SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0
object network ServerVPN
nat (OUTSIDE,OUTSIDE) static interface service tcp www 8888
These are the only nat rules for this network.
01-09-2013 06:17 AM
Wireshark say that I don't come to the remote server.
Maybe the packet is dropped by the remote VPN peer.
I know that I can go only with these IP 10.232.226.56 255.255.255.248 so maybe the NAT don't translate the IP before tunnel it on the VPN.
Any suggestion?
01-09-2013 08:21 AM
Hi,
Think I finally got it but cant confirm it without creating an actual L2L VPN for my current lab setup (which I will only do if you cant get this working with the below steps)
So heres what I did
So here are my configurations
Base Information
object network L2L-VPN-POOL
range 10.10.200.1 10.10.200.200
object network L2L-REMOTE
subnet 10.10.1.0 255.255.255.0
object network WEB-SERVER-LOCAL
host 10.10.1.100
object service WEB-REAL
service tcp destination eq www
object service WEB-NAT
service tcp destination eq 8888
nat (WAN,WAN) 1 source dynamic any L2L-VPN-POOL destination static interface WEB-SERVER-LOCAL service WEB-NAT WEB-REAL
access-list TEST-L2L-CRYPTO extended permit ip object L2L-VPN-POOL object L2L-REMOTE
crypto ipsec ikev1 transform-set AES-256 esp-aes-256 esp-sha-hmac
crypto map CRYPTOMAP 10 match address TEST-L2L-CRYPTO
crypto map CRYPTOMAP 10 set peer 1.1.1.1
crypto map CRYPTOMAP 10 set ikev1 transform-set AES-256
crypto map CRYPTOMAP interface WAN
crypto isakmp identity address
crypto ikev1 enable WAN
crypto ikev1 policy 10
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 28800
tunnel-group 1.1.1.1 type ipsec-l2l
tunnel-group 1.1.1.1 ipsec-attributes
ikev1 pre-shared-key *****
The only means to test this configuration at the moment was to use the "packet-tracer" command to show what the Firewall would do to a packet arriving from WAN to the WAN Interface IP address using port TCP/8888
Base Information
ASA(config)# packet-tracer input WAN tcp y.y.y.y 2054 x.x.x.x 8888
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (WAN,WAN) source dynamic any L2L-VPN-POOL destination static interface WEB-SERVER-LOCAL service WEB-NAT WEB-REAL
Additional Information:
NAT divert to egress interface WAN
Untranslate x.x.x.x/8888 to 10.10.1.100/80
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group WAN-IN in interface WAN
access-list WAN-IN extended permit ip host y.y.y.y any
Additional Information:
Phase: 5
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (WAN,WAN) source dynamic any L2L-VPN-POOL destination static interface WEB-SERVER-LOCAL service WEB-NAT WEB-REAL
Additional Information:
Dynamic translate y.y.y.y/2054 to 10.10.200.120/2054
Phase: 7
Type: VPN
Subtype: encrypt
Result: DROP
Config:
Additional Information:
So with the above you might be able to test your setup. Just define the configurations to use your own "object" or "object-group" and IP addresses or networks.
Some things I would take into consideration judging by your above configurations
Naturally also take precaution if you are going to test this in a production environment. Have a plan to fall back to the old configurations.
Please do rate the answers if you have found the information helpfull and if it does solve your problem please mark the questions as answered. Naturally also ask more if either the configuration doesnt work or if there is something more related to this setup.
- Jouni
01-09-2013 09:21 AM
Hi Jouni, thanks for the posts.
I'll fix the issue (before your mail) by not using the NAT on the object network.
object network ServerVPN
host 10.246.100.11
object service Private_G
service tcp destination eq www
object network SRCNetworkG
subnet 10.232.226.56 255.255.255.248
object network Public2
host x.x.x.x
nat (OUTSIDE,OUTSIDE) source static any SRCNetworkG destination static Public2 ServerVPN service Private_G Private_G
and not
object network ServerVPN
nat (OUTSIDE,OUTSIDE) static interface service tcp www www
nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0
But I don't understand why.
I'll check tomorrow your last post better to see what change from my last config.
Thanks for the support.
Pasqu
01-10-2013 11:20 PM
Hi,
Have you been able to test the above setup I mentioned?
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide