05-12-2022 08:14 AM
Hi all, as per the attached configuration the subinterfaces (e.g vlan101 and vlan105) are not communicating with each other, But they regularly go on Internet. What is wrong in the attached configuration?
Solved! Go to Solution.
05-12-2022 09:11 AM
05-12-2022 08:26 AM
@riccardodem configure some NAT exemption rules, your traffic between the VLANS is probably being unintentially translated.
05-12-2022 08:43 AM
thanks Rob...any documentation about NAT exemption rules cofiguration?
05-12-2022 09:11 AM
05-13-2022 12:36 AM
I tried without solving to put eg. network vlan104 and vlan105 in communication with these commands:
nat (vlan105,vlan104) source static vlan105 vlan105 destination static vlan104 vlan104
nat (vlan104,vlan105) source static vlan104 vlan104 destination static vlan105 vlan105
Trying to ping from vlan105 to vlan104:
5 (vlan105) to (vlan104) source static vlan105 vlan105 destination static vlan104 vlan104
translate_hits = 4, untranslate_hits = 4
6 (vlan104) to (vlan105) source static vlan104 vlan104 destination static vlan105 vlan105
translate_hits = 0, untranslate_hits = 0
this is the output of sh nat detail:
Manual NAT Policies (Section 1)
1 (vlan101) to (outside) source dynamic any interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: 192.168.178.2/24
2 (vlan102) to (outside) source dynamic any interface
translate_hits = 10451, untranslate_hits = 8647
Source - Origin: 0.0.0.0/0, Translated: 192.168.178.2/24
3 (vlan103) to (outside) source dynamic any interface
translate_hits = 41, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: 192.168.178.2/24
4 (vlan104) to (outside) source dynamic any interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: 192.168.178.2/24
5 (vlan105) to (vlan104) source static vlan105 vlan105 destination static vlan104 vlan104
translate_hits = 5, untranslate_hits = 5
Source - Origin: 192.168.10.0/24, Translated: 192.168.10.0/24
Destination - Origin: 192.168.6.192/27, Translated: 192.168.6.192/27
6 (vlan104) to (vlan105) source static vlan104 vlan104 destination static vlan105 vlan105
translate_hits = 0, untranslate_hits = 0
Source - Origin: 192.168.6.192/27, Translated: 192.168.6.192/27
Destination - Origin: 192.168.10.0/24, Translated: 192.168.10.0/24
7 (vlan105) to (outside) source dynamic any interface
translate_hits = 12, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: 192.168.178.2/24
thanks in advance for the help
05-13-2022 01:20 AM
@riccardodem how are you testing exactly?
Run packet-tracer from the CLI and provide the full output for review
packet-tracert input vlan105 tcp 192.168.10.5 3000 192.168.6.224 80 detail
You should also remove the other dynamic nat rules to section 2 (auto nat).
FYI, You only need one NAT rule to add, not 2. The NAT is bi-directional.
05-13-2022 01:43 AM
I was mistakenly trying to ping from a host on the vlan105 network the gateway of vlan104 with this result
ASA-HLSDN# packet-tracer input vlan105 tcp 192.168.10.50 3000 192.168.6.222 80
Result:
input-interface: vlan105
input-status: up
input-line-status: up
Action: drop
Drop-reason: (no-route) No route to host
it works instead pinging from host of vlan105 to host of vlan104, I will do more tests by removing nat exception to see if the situation changes
packet-tracer command is very usefull!
thanks
05-13-2022 01:46 AM - edited 05-13-2022 01:48 AM
@riccardodem that's because you can only ping the local ASA interface, not ping through the ASA to a far interface IP address.
FYI, you test connectivity be sending traffic through the ASA....you obviously need the NAT rules configured correctly to ensure you aren't unintentially translating.
05-12-2022 08:50 AM
From this post and your previous post, You have two Internet and you want to use it for Anyconnect if I am right ?
https://www.cisco.com/c/en/us/td/docs/security/asa/misc/anyconnect-faq/anyconnect-faq.html
check this doc. it help you in your design.
05-12-2022 08:55 AM
Only one WAN internet connection on port GigabitEthernet0/0. Multiple vlans (subinterfaces) on redundant interfaces, must be natted to WAN and comunicate with each other.
05-12-2022 09:12 AM
Sub interface INSIDE ?
you config bridge group and then assign IP to VLAN ??
the FW either work as Brdige or as router.
05-13-2022 12:41 AM
yes, Asa act also as a router (nat-dhcp-routing):
on gi1/1 WAN to ISP router
on gi1/7 and 1/8 reduntant interface to 2 Cisco switch with 5 vlans (subintefaces)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide