01-17-2011 07:10 AM - edited 03-11-2019 12:36 PM
I have a new ASA 5505 that I set up and is connected to a Comcast Business Class modem. I can ping the Comcast modem but I cannot get traffic to pass in or out. From the firewall I can ping the Public IP Address of the Comcast modem and the internal IPs. The firewall is set up with a Static IP. For security purposes I have masked the public IP address as xxx.xxx.xxx.97 in the config below. Can anyone help me? I have the same config set up on another router with a different Comcast connection with different IPs and it works fine.
ASA Version 8.2(1)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password encrypted
passwd encrypted
names
dns-guard
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.43.20 255.255.255.0
ospf cost 10
!
interface Vlan2
nameif outside
security-level 0
ip address xxx.xxx.xxx.97 255.255.255.252
ospf cost 10
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns server-group DefaultDNS
domain-name default.domain.invalid
same-security-traffic permit inter-interface
access-list inbound extended permit tcp host xxx.xxx.xxx.97 eq 3389 any
access-list inbound extended permit tcp any host xxx.xxx.xxx.97 eq 3389
access-list inbound extended permit tcp interface outside eq 3389 host 192.168.43.219
access-list inbound extended permit tcp host xxx.xxx.xxx.97 eq www any
access-list inbound extended permit icmp any any
access-list inbound extended permit tcp any host xxx.xxx.xxx.97 eq www
access-list inbound extended permit tcp host xxx.xxx.xxx.97 eq https any
access-list inbound extended permit tcp any host xxx.xxx.xxx.97 eq https
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any outside
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 3389 192.168.43.219 3389 netmask 255.255.255.255
access-group inbound in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.43.19 1
route inside 192.168.0.0 255.255.0.0 192.168.43.20 1
route inside 192.168.0.0 255.255.255.0 192.168.43.20 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:05:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
http server enable
http 192.168.43.0 255.255.255.0 inside
http 192.168.42.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 192.168.42.0 255.255.255.0 inside
telnet 192.168.43.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh 0.0.0.0 0.0.0.0 outside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.43.21-192.168.43.52 inside
!
no threat-detection basic-threat
no threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 1500
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect icmp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:ec32a7e8f27c30aa1dc6d9df9b86d607
: end
ciscoasa#
01-17-2011 07:25 AM
Hi,
The problem that I see is the default route:
route outside 0.0.0.0 0.0.0.0 192.168.43.19 1
You're pointing the default gateway to the outside interface but to the inside IP.
You might want to change that to the outside IP.
Federico.
01-17-2011 07:35 AM
Thanks for your reply.
The 192.168.43.19 addresses is the internal IP Address of the Comcast modem. I have another ASA5505 set up with the internal IP of a different Comcast and it does work. I will try it an let you know.
01-17-2011 07:43 AM
I don't believe it, but it worked. You are awesome Federico.
01-17-2011 07:43 AM
Make sure this route below is correct.
route outside 0.0.0.0 0.0.0.0 192.168.43.19 1
Config looks good.
If an inside host cannot browse out to the internet I'd check DNS first to see if you get name resolution. If you load google.com by IP address does that work? If not need to see the logs.
conf t
loggin on
loggin buffered 7
exit
sh logg | i x.x.x.x
where x.x.x.x is a host that cannot go outside.
edit: I guess you got it all sorted out.
-KS
01-17-2011 07:48 AM
Glad I could help.
Please consider rating the thread if you found it helpful :-)
Thank you,
Federico.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide