cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4158
Views
0
Helpful
19
Replies

ASA 5505 9.2 No Internet Access

Bighead81
Level 1
Level 1

Working with an ASA 5505 that is not allowing me to connect to the internet.

I am able to ping desktop PC  inside interface but from the firewall not able to ping outside to 8.8.8.8. 

Ive troubleshooted with outside interface ip DHCP routeset, icmp session,

Any help to correct this would be appreciated.

 

[Internet - virgin modem mode sh2 - Firewall - Switch - PC]

xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain

names
!
interface Ethernet0/0
 description -OUTSIDE CONNECTION TO ISP-
 switchport access vlan 2
 switchport mode access
 no switchport protected
 speed auto
 duplex auto
 delay 10
!
interface Ethernet0/1
 switchport access vlan 200
 switchport protected
 shutdown
!
interface Ethernet0/2
 switchport access vlan 200
 shutdown
!
interface Ethernet0/3
 switchport access vlan 200
 shutdown
!
interface Ethernet0/4
 switchport access vlan 200
 shutdown
!
interface Ethernet0/5
 switchport access vlan 200
 shutdown
!
interface Ethernet0/6
 switchport access vlan 200
 shutdown
!
interface Ethernet0/7
 description -INSIDE CONNNECTION TO SWITCH-
 switchport access vlan 1
 switchport mode access
 no switchport protected
 speed auto
 duplex auto
 delay 10
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.0.254 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute
!

boot system disk0:/asa923-k8.bin

ftp mode passive

object network obj_any
 subnet 0.0.0.0 0.0.0.0

access-list outside_in extended permit icmp any any echo
access-list outside_in extended deny ip any any log

access-list inside_in extended permit ip any any
access-list inside_in extended deny ip any any log

pager lines 24
logging enable
logging monitor warnings
logging asdm informational

mtu inside 1500
mtu outside 1500

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 240

no arp permit-nonconnected

nat (inside,outside) source dynamic obj_any interface

access-group inside_in in interface inside
access-group outside_in in interface outside

route outside 0.0.0.0 0.0.0.0 74.XX.XX.239   1   <ip outside interface>

timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
no snmp-server location
no snmp-server contact
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outside
!
dhcpd address 192.168.0.2-192.168.0.33 inside
!
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
username larias password I8668T9sKGdWDfCW encrypted privilege 15
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map global_policy
 class inspection_default
  inspect icmp
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:2c757df828bc16b3dd0d4d74e28a6917
: end

 

 

DEBUG - Ping 8.8.8.8 from FW

 

6|Feb 08 2015 03:03:46|305011: Built dynamic UDP translation from inside:192.168.0.2/50432 to outside:74.XX.XX.239 /50432
6|Feb 08 2015 03:03:46|302015: Built outbound UDP connection 126 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/50432 (74.XX.XX.239 /50432)
6|Feb 08 2015 03:04:00|305012: Teardown dynamic UDP translation from inside:192.168.0.2/57818 to outside:74.XX.XX.239 /57818 duration 0:02:39
6|Feb 08 2015 03:04:23|302016: Teardown UDP connection 124 for outside:8.8.8.8/53 to inside:192.168.0.2/52833 duration 0:02:08 bytes 215
6|Feb 08 2015 03:04:36|305011: Built dynamic UDP translation from inside:192.168.0.2/50290 to outside:74.XX.XX.239 /50290
6|Feb 08 2015 03:04:36|302015: Built outbound UDP connection 127 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/50290 (74.XX.XX.239 /50290)
6|Feb 08 2015 03:04:39|305011: Built dynamic UDP translation from inside:192.168.0.2/51985 to outside:74.XX.XX.239 /51985
6|Feb 08 2015 03:04:39|302015: Built outbound UDP connection 128 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/51985 (74.XX.XX.239 /51985)
6|Feb 08 2015 03:04:53|302010: 4 in use, 19 most used
6|Feb 08 2015 03:04:54|305012: Teardown dynamic UDP translation from inside:192.168.0.2/52833 to outside:74.XX.XX.239 /52833 duration 0:02:39
6|Feb 08 2015 03:05:10|302016: Teardown UDP connection 125 for outside:8.8.8.8/53 to inside:192.168.0.2/50272 duration 0:02:08 bytes 215
6|Feb 08 2015 03:05:33|305011: Built dynamic UDP translation from inside:192.168.0.2/49447 to outside:74.XX.XX.239 /49447
6|Feb 08 2015 03:05:33|302015: Built outbound UDP connection 129 for outside:8.8.8.8/53 (8.8.8.8/53) to inside:192.168.0.2/49447 (74.XX.XX.239 /49447)
6|Feb 08 2015 03:05:41|305012: Teardown dynamic UDP translation from inside:192.168.0.2/50272 to outside:74.XX.XX.239 /50272 duration 0:02:39
6|Feb 08 2015 03:05:54|302016: Teardown UDP connection 126 for outside:8.8.8.8/53 to inside:192.168.0.2/50432 duration 0:02:08 bytes 215
6|Feb 08 2015 03:06:25|305012: Teardown dynamic UDP translation from inside:192.168.0.2/50432 to outside:74.XX.XX.239 /50432 duration 0:02:39

19 Replies 19

I fully concur with what Appireddy is saying.

 

I feel like your nat command is just floating in your configs and not under that object-group...but his fixes that also.

 

Please try that and report back.

 

Also, I see no pings coming from 192.168.0.2 to 8.8.8.8 on your inside interface.  Why?

Downloaded a fresh IOS and I now see tangible data. 

 

home-fw-1# sh capture CAPIN

346 packets captured

   1: 21:48:55.966853       802.1Q vlan#1 P0 192.168.0.2.138 > 192.168.0.255.138:  udp 212
   2: 21:49:12.089457       802.1Q vlan#1 P0 192.168.0.2.53698 > 8.8.8.8.53:  udp 32
   3: 21:49:12.147300       802.1Q vlan#1 P0 192.168.0.2.56480 > 8.8.8.8.53:  udp 43
   4: 21:49:13.086604       802.1Q vlan#1 P0 192.168.0.2.53698 > 8.8.8.8.53:  udp 32
   5: 21:49:13.146553       802.1Q vlan#1 P0 192.168.0.2.56480 > 8.8.8.8.53:  udp 43
   6: 21:49:14.086528       802.1Q vlan#1 P0 192.168.0.2.53698 > 8.8.8.8.53:  udp 32
   7: 21:49:14.146507       802.1Q vlan#1 P0 192.168.0.2.56480 > 8.8.8.8.53:  udp 43
   8: 21:49:16.087474       802.1Q vlan#1 P0 192.168.0.2.53698 > 8.8.8.8.53:  udp 32
   9: 21:49:16.147468       802.1Q vlan#1 P0 192.168.0.2.56480 > 8.8.8.8.53:  udp 43
  10: 21:49:20.087413       802.1Q vlan#1 P0 192.168.0.2.53698 > 8.8.8.8.53:  udp 32
  11: 21:49:20.147361       802.1Q vlan#1 P0 192.168.0.2.56480 > 8.8.8.8.53:  udp 43
  12: 21:49:24.087809       802.1Q vlan#1 P0 192.168.0.2.137 > 192.168.0.255.137:  udp 50
  13: 21:49:24.837221       802.1Q vlan#1 P0 192.168.0.2.137 > 192.168.0.255.137:  udp 50
  14: 21:49:25.588211       802.1Q vlan#1 P0 192.168.0.2.137 > 192.168.0.255.137:  udp 50
  15: 21:49:35.751700       802.1Q vlan#1 P0 192.168.0.2.62640 > 8.8.8.8.53:  udp 40
  16: 21:49:36.049313       802.1Q vlan#1 P0 192.168.0.2.137 > 192.168.0.255.137:  udp 50
  17: 21:49:36.748832       802.1Q vlan#1 P0 192.168.0.2.62640 > 8.8.8.8.53:  udp 40
  18: 21:49:36.798817       802.1Q vlan#1 P0 192.168.0.2.137 > 192.168.0.255.137:  udp 50
  19: 21:49:37.548830       802.1Q vlan#1 P0 192.168.0.2.137 > 192.168.0.255.137:  udp 50
  20: 21:49:37.748801       802.1Q vlan#1 P0 192.168.0.2.62640 > 8.8.8.8.53:  udp 40
  21: 21:49:39.748771       802.1Q vlan#1 P0 192.168.0.2.62640 > 8.8.8.8.53:  udp 40
  22: 21:49:43.748649       802.1Q vlan#1 P0 192.168.0.2.62640 > 8.8.8.8.53:  udp 40
home-fw-1# sh capture CAPOUT

3 packets captured

   1: 21:50:36.833620       802.1Q vlan#2 P0 10.X.X.1.67 > 255.255.255.255.68:  udp 312
   2: 21:55:52.483175       802.1Q vlan#2 P0 10.X.X.1.67 > 255.255.255.255.68:  udp 301
   3: 21:55:52.516300       802.1Q vlan#2 P0 10.X.X.1.67 > 255.255.255.255.68:  udp 301
3 packets

I have inputted recommended NAT but it allows only "source dynamic any interface" under object-group.  I have translated hits with sh nat but still no working ping.

 

 

 

 

 

 

 

 

 

did you make the NAT changes as suggested? is it working? pls let us know.

change it from

nat (inside,outside) source dynamic NAT_ALL interface

to

nat (inside,outside) source dynamic interface

you don't need to say NAT_ALL in nat statement.

hi

 

i following your step i can access internet a few mins...............

do you have other solution??

thanks

 

Raymond

Raymond Kwok
Level 1
Level 1

i have same problem~~~!!!

 

ASA Version 9.1(2)
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
names
!
interface GigabitEthernet0/0
 nameif outside
 security-level 0
 ip address 192.168.0.101 255.255.255.0
!
interface GigabitEthernet0/1
 nameif inside
 security-level 100
 ip address 192.168.3.254 255.255.255.0
!
interface GigabitEthernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 management-only
 nameif management
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
object network inside_to_outside
 subnet 0.0.0.0 0.0.0.0
pager lines 24
logging asdm informational
mtu management 1500
mtu inside 1500
mtu outside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source dynamic inside_to_outside interface
route outside 0.0.0.0 0.0.0.0 192.168.0.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home reporting anonymous prompt 2
Cryptochecksum:07bc1ae9495d68bfec29ef67ce1f30e9
: end
 

 

i can using console to ping 8.8.8.8

but my inside network cannot access internet~~~~~~~

 

anyone can help me~~~

thanks

Review Cisco Networking for a $25 gift card