cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2698
Views
0
Helpful
5
Replies

ASA 5505 not allowing connections

I have a new ASA 5505 that I set up and is connected to a Comcast Business Class modem. I can ping the Comcast modem but I cannot get traffic to pass in or out. From the firewall I can ping the Public IP Address of the Comcast modem and the internal IPs. The firewall is set up with a Static IP. For security purposes I have masked the public IP address as xxx.xxx.xxx.97 in the config below. Can anyone help me? I have the same config set up on another router with a different Comcast connection with different IPs and it works fine.

ASA Version 8.2(1)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password encrypted
passwd encrypted
names
dns-guard
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.43.20 255.255.255.0
ospf cost 10
!
interface Vlan2
nameif outside
security-level 0
ip address xxx.xxx.xxx.97 255.255.255.252
ospf cost 10
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns server-group DefaultDNS
domain-name default.domain.invalid
same-security-traffic permit inter-interface
access-list inbound extended permit tcp host xxx.xxx.xxx.97 eq 3389 any
access-list inbound extended permit tcp any host xxx.xxx.xxx.97 eq 3389
access-list inbound extended permit tcp interface outside eq 3389 host 192.168.43.219
access-list inbound extended permit tcp host xxx.xxx.xxx.97 eq www any
access-list inbound extended permit icmp any any
access-list inbound extended permit tcp any host xxx.xxx.xxx.97 eq www
access-list inbound extended permit tcp host xxx.xxx.xxx.97 eq https any
access-list inbound extended permit tcp any host xxx.xxx.xxx.97 eq https
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any outside
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 3389 192.168.43.219 3389 netmask 255.255.255.255
access-group inbound in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.43.19 1
route inside 192.168.0.0 255.255.0.0 192.168.43.20 1
route inside 192.168.0.0 255.255.255.0 192.168.43.20 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:05:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.43.0 255.255.255.0 inside
http 192.168.42.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 192.168.42.0 255.255.255.0 inside
telnet 192.168.43.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.43.21-192.168.43.52 inside
!

no threat-detection basic-threat
no threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum 1500
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny 
  inspect sunrpc
  inspect xdmcp
  inspect sip 
  inspect netbios
  inspect tftp
  inspect icmp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:ec32a7e8f27c30aa1dc6d9df9b86d607
: end

ciscoasa#

5 Replies 5

Hi,

The problem that I see is the default route:

route outside 0.0.0.0 0.0.0.0 192.168.43.19 1

You're pointing the default gateway to the outside interface but to the inside IP.

You might want to change that to the outside IP.

Federico.

Thanks for your reply.

The 192.168.43.19 addresses is the internal IP Address of the Comcast modem. I have another ASA5505 set up with the internal IP of a different Comcast and it does work. I will try it an let you know.

I don't believe it, but it worked. You are awesome Federico.

Kureli Sankar
Cisco Employee
Cisco Employee

Make sure this route below is correct.

route outside 0.0.0.0 0.0.0.0 192.168.43.19 1

Config looks good.

If an inside host cannot browse out to the internet I'd check DNS first to see if you get name resolution. If you load google.com by IP address does that work? If not need to see the logs.

conf t

loggin on

loggin buffered 7

exit

sh logg | i x.x.x.x

where x.x.x.x is a host that cannot go outside.

edit: I guess you got it all sorted out.

-KS

Glad I could help.

Please consider rating the thread if you found it helpful :-)

Thank you,

Federico.

Review Cisco Networking for a $25 gift card