09-28-2017 12:46 AM - edited 02-21-2020 06:23 AM
Hi,
I have an ASA5506 with basic config, my router is set to bridge mode and i have configured a PPOE for the outside interface,but still cannot access to internet
can any one help ?
this is the configuration of the Firewall
: Saved
:
:
: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
: Written by enable_15 at 09:20:34.239 UTC Wed Sep 27 2017
!
ASA Version 9.7(1)4
!
hostname ciscoasa
enable password $sha512$5000$gUKACY2Vbq3GXu9B0j8f0g==$H0qA91AJbz82daxO8EetVw== pbkdf2
names
!
interface GigabitEthernet1/1
nameif outside
security-level 0
pppoe client vpdn group tunigros
ip address pppoe
!
interface GigabitEthernet1/2
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface GigabitEthernet1/3
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/5
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/6
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/7
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/8
shutdown
no nameif
no security-level
no ip address
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
!
ftp mode passive
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network Laptop1
host 192.168.1.6
object network LAPTOP
host 192.168.1.5
object-group network Authorized_USERS
network-object object Laptop1
object-group service DM_INLINE_SERVICE_1
service-object tcp-udp destination eq www
service-object tcp destination eq https
object-group service DM_INLINE_SERVICE_2
service-object tcp-udp destination eq www
service-object tcp destination eq https
object-group protocol DM_INLINE_PROTOCOL_1
protocol-object icmp
protocol-object icmp6
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group Authorized_USERS any
access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_2 any any
access-list inside_access_in extended permit ip object-group Authorized_USERS any
access-list inside_access_in extended deny ip any any
access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any
access-list outside_access_in extended permit tcp any object-group Authorized_USERS eq 3389
access-list codifet_splittunelACL standard permit 192.168.1.0 255.255.255.0
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
no failover
no monitor-interface service-module
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
object network obj_any
nat (any,outside) dynamic interface
object network LAPTOP
nat (inside,outside) static interface service tcp 3389 3389
access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpoint _SmartCallHome_ServerCA
no validation-usage
crl configure
crypto ca trustpool policy
crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a
308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30
183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a
quit
telnet timeout 5
no ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
vpdn group tunigros request dialout pppoe
vpdn group tunigros localname tu18174@adslpro.gnet.tn
vpdn group tunigros ppp authentication chap
vpdn username tu18174@adslpro.gnet.tn password adsl store-local
dhcpd auto_config outside
!
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
dynamic-access-policy-record DfltAccessPolicy
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home reporting anonymous
Cryptochecksum:47455e0fcca100021a9e54eff33fde19
Solved! Go to Solution.
09-28-2017 05:29 AM
Hi,
Could you add setroute to the interface GigabitEthernet1/1 config:
ip address pppoe setroute
Also can you confirm if the modem is in bridge mode, you can verfify it by dialing the bridged connection from windows laptop/desktop.
Regards,
Kias
09-28-2017 01:48 AM
Hi,
Try to run debug pppoe {event | error | packet
And share the logs.
09-28-2017 05:29 AM
Hi,
Could you add setroute to the interface GigabitEthernet1/1 config:
ip address pppoe setroute
Also can you confirm if the modem is in bridge mode, you can verfify it by dialing the bridged connection from windows laptop/desktop.
Regards,
Kias
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide