10-31-2010 09:05 AM - edited 03-11-2019 12:02 PM
Hello,
I am stuck with a routing problem on a ASA 5505 Security Plus firewall.
I have two inside networks. One for guests, one for employees. I need guests to be able to print on printers located on the employee (inside) network.
Of course, I do not want guests to access any other resources on the inside network.
I tried to configure objects to allow routing between interfaces and allow printer access unfortunately with no luck so far.
Actually, I can't even ping the inside interface of firewall from the guest network ...
Any leads on how to proceed would be most welcome.
Thanks,
JF
Technical informations
Firewall firmware :
Cisco Adaptive Security Appliance Software Version 8.3(1)
Device Manager Version 6.3(1)
Interface configuration :
interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan12
nameif guests
security-level 10
ip address 192.168.12.1 255.255.255.0
Last (unsucessful) configuration :
access-list guests_access_in extended permit ip any any
access-group guests_access_in in interface guests
static (inside,guests) 192.168.0.26 192.168.0.26 netmask 255.255.255.255
static (guests,inside) 192.168.12.0 192.168.12.0 netmask 255.255.255.0
Solved! Go to Solution.
11-01-2010 09:05 AM
Excellent, would you please mark this question as resolve so other people can take it as reference?
Cheers
Mike
10-31-2010 05:09 PM
Hello
My name is Mike, I am going to try to help you out over here. Basically what you need to do is to translate (NAT) the higher security level (In order to have control for this). Your version is 8.3 so the static commands that you are using are not going to work.
Here is what you do.
Object network Printer
host
nat (inside,guest) source static Printer Printer
Then you will need the ACL on the guest interface (the one that you have works fine)
access-list guests_access_in extended permit ip any any
access-group guests_access_in in interface guests
If this does not work, please feel free to use the following command
packet-tracer input guest tcp 192.168.12.13 1025 192.168.0.2 40
Once we have traffic flowing we can restrict the traffic to the printer ports.
Cheers
Mike
11-01-2010 06:48 AM
Hello Mike,
Thanks for the support. It really helps !
Thanks to the information provided, we can now connect to the printer but unfortunately we can access the whole inside network.
I suspect we can fix this by replacing "any" by the printer IP in line "access-list guests_access_in extended permit ip any any"
However, there is something much more surprising to me. Adding or removing the NAT rule makes no difference, I can still access the whole inside network from the guest network. Did I miss something ?
Please let me know if you need additional information.
Thanks,
JF
New Configuration details :
ASA Version 8.3(1)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password gh70cYLmUMHW473x encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan12
nameif guest
security-level 10
ip address 192.168.12.1 255.255.255.0
!
interface Vlan13
nameif Galerie
security-level 100
ip address 192.168.13.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 12
!
interface Ethernet0/3
switchport access vlan 13
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
boot system disk0:/asa831-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name default.domain.invalid
object network Printer_1
host 192.168.0.206
description Printer1
access-list guest_access_in extended permit ip any any
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu invite 1500
mtu Galerie 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any invite
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
nat (inside,invite) source static Printer_1 Printer_1
access-group guest_access_in in interface guest
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication enable console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 192.168.12.0 255.255.255.0 guest
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 192.168.0.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.0.33-192.168.0.128 inside
dhcpd dns 89.2.0.1 89.2.0.2 interface inside
dhcpd enable inside
!
dhcpd address 192.168.12.100-192.168.12.150 guest
dhcpd enable invite
!
dhcpd address 192.168.13.100-192.168.13.150 Galerie
dhcpd enable Galerie
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username ***** password ***** encrypted
username ***** attributes
service-type nas-prompt
!
!
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:15e997e61f80fc8a69874cfc08d985b1
: end
11-01-2010 07:00 AM
Hello Jean,
That is true, it is because 8.3 does not have Nat-control anymore, so it is not necessary to have the traffic being natted. You are completely right. The ACL permit ip any any is the one that is giving you access to the entire internal network.
As you rightly pointed, you can change the permit ip any any for the following
access-list guests_access_in extended permit ip any
and then remove the line that you have
no access-list guests_access_in extended permit ip any any
Cheers.
Mike
11-01-2010 08:45 AM
Mike,
Thanks for the quite reply.
We had it working the way we want.
Below is working configuration for anyone going through the same kind of troubles.
Regards,
JF
Result of the command: "show running-config"
: Saved
:
ASA Version 8.3(1)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password EOaGZ9DJcK985tVO encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan12
nameif invite
security-level 10
ip address 192.168.12.1 255.255.255.0
!
interface Vlan13
nameif Galerie
security-level 100
ip address 192.168.13.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 12
!
interface Ethernet0/3
switchport access vlan 13
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
boot system disk0:/asa831-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name default.domain.invalid
object network imprimante_1
host 192.168.0.206
description imprimante 1
object network Acces_internet_anatome
subnet 192.168.0.0 255.255.255.0
description acces internet pour anatome
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network obj_invite
subnet 192.168.12.0 255.255.255.0
object network obj_galerie
subnet 192.168.13.0 255.255.255.0
access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 object imprimante_1
access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 any
access-list inside_to_ouside extended permit ip any any
access-list outside_access_in extended permit ip any any inactive
access-list outside_access_in extended permit icmp any any inactive
access-list inside_access_in extended permit icmp 192.168.0.0 255.255.255.0 any
access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 any
access-list Galerie_access_in extended permit ip 192.168.13.0 255.255.255.0 any
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu invite 1500
mtu Galerie 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any invite
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
!
object network obj_any
nat (inside,outside) dynamic interface
object network obj_invite
nat (invite,outside) dynamic interface
object network obj_galerie
nat (Galerie,outside) dynamic interface
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
access-group guest_access_in in interface invite
access-group Galerie_access_in in interface Galerie
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication enable console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 192.168.12.0 255.255.255.0 invite
http 192.168.0.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 192.168.0.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcp-client client-id interface outside
dhcpd auto_config outside
!
dhcpd address 192.168.0.33-192.168.0.128 inside
dhcpd dns 89.2.0.1 89.2.0.2 interface inside
dhcpd enable inside
!
dhcpd address 192.168.12.100-192.168.12.150 invite
dhcpd dns 89.2.0.1 89.2.0.2 interface invite
dhcpd enable invite
!
dhcpd address 192.168.13.100-192.168.13.150 Galerie
dhcpd enable Galerie
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username ***** password ****** encrypted
username ***** attributes
service-type nas-prompt
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:910861ec3fae1dcc829a0b3e6424ffb1
: end
11-01-2010 09:05 AM
Excellent, would you please mark this question as resolve so other people can take it as reference?
Cheers
Mike
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide