cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
676
Views
0
Helpful
7
Replies

ASA 5545 transparent mode does not work

doris.chai
Level 1
Level 1

Hi there ,

i places ASA5545 is os 9.1 in two switches in transparent mode however  it seems some problem in my configuration. 

 

<inside switch1>----------------------------ASA---------------------------<outside switch2>

172.16. 10.10                                172.16.10.9                            172.16.10.1

 

Action i have done

i configured bridge-group and places inside and outside in group

access list permit inside any any

access list permit outside any any

icmp permit any Outside
icmp permit any Inside

route outside 0.0.0.0 0.0.0.0 172.16.10.1

Access-group is assigned  accordingly.

 

Problem description

1. I can ping from ASA to both end

2. I cannot ping from 10.10 to 10.1.

3. i cannot ping from 10.1 to 10.10

4. inside network cannot access anything outside,  inside is not accessible  from outside either.

 

I checked ARP table and it appeared it not updated in time.  Am I missing something, thank you.

          

7 Replies 7

Andre Neethling
Level 4
Level 4

Do you have routes between the routers routing for those 10 networks?

no, there is not 

Hi. How is the traffic routed between the 10.1 and 10.10 ?

 

Apologies....... I just realized that by 10.10 and 10.1 you meant the 2 switches

 

Do you see anything in the logs? Packet tracer?

Can you post your config?

I noticed you have mac learning disabled? Why is that?

yes, the 2 switches

The configuration is as follows

============

Result of the command: "show run"

 

: Saved

:

ASA Version 9.1(2) 

!

firewall transparent

hostname ciscoasa

enable password 2KFQnbNIdI.2KYOU encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface GigabitEthernet0/0

 nameif outside

 bridge-group 1

 security-level 0

!

interface GigabitEthernet0/1

 nameif inside

 bridge-group 1

 security-level 100

!

interface GigabitEthernet0/2

 shutdown

 no nameif

 no security-level

!

interface GigabitEthernet0/3

 shutdown

 no nameif

 no security-level

!

interface GigabitEthernet0/4

 shutdown

 no nameif

 no security-level

!

interface GigabitEthernet0/5

 shutdown

 no nameif

 no security-level

!

interface GigabitEthernet0/6

 shutdown

 no nameif

 no security-level

!

interface GigabitEthernet0/7

 shutdown

 no nameif

 no security-level

!

interface Management0/0

 management-only

 nameif mgt

 security-level 0

 ip address 10.105.2.10 255.255.255.0 

!

interface BVI1

 ip address 172.16.10.9 255.255.255.0 

!

ftp mode passive

clock timezone CST 8

same-security-traffic permit inter-interface

object-group service DM_INLINE_SERVICE_1

 service-object tcp-udp destination eq 3389 

 service-object tcp destination eq 90 

object-group service DM_INLINE_TCPUDP_1 tcp-udp

 port-object range 81 83

 port-object range 90 92

object-group service DM_INLINE_TCPUDP_2 tcp-udp

 port-object eq 8099

 port-object eq 8631

object-group protocol TCPUDP

 protocol-object udp

 protocol-object tcp

object-group network DM_INLINE_NETWORK_1

 network-object host 172.16.32.133

 network-object host 172.16.32.134

object-group network DM_INLINE_NETWORK_2

 network-object host 172.16.54.12

 network-object host 172.16.54.13

object-group protocol DM_INLINE_PROTOCOL_1

 protocol-object ip

 protocol-object udp

 protocol-object tcp

object-group service DM_INLINE_SERVICE_2

 service-object tcp-udp destination eq 1755 

 service-object tcp destination eq ftp-data 

 service-object tcp destination eq rtsp 

 service-object udp destination eq 2640 

 service-object udp destination range 5004 5005 

object-group service DM_INLINE_TCP_1 tcp

 port-object eq 1015

 port-object eq 8081

 port-object eq 81

object-group service DM_INLINE_TCP_2 tcp

 port-object eq 1601

 port-object eq 1701

object-group service DM_INLINE_TCP_3 tcp

 port-object eq 8443

 port-object eq https

object-group service DM_INLINE_TCP_4 tcp

 port-object eq 6991

 port-object eq 8118

 port-object eq 9991

object-group service DM_INLINE_TCP_5 tcp

 port-object eq 6991

 port-object eq 8008

 port-object eq 8118

 port-object eq 8891

 port-object eq 8991

 port-object eq pop3

 port-object eq smtp

 port-object eq sqlnet

access-list inside extended permit ip any any 

access-list inside extended permit icmp any any 

access-list inside extended permit ospf any any 

access-list outside extended permit tcp any any eq www 

access-list outside extended permit icmp any any 

access-list outside extended permit tcp any any eq 8080 

access-list outside extended permit tcp any any eq https 

access-list outside extended permit tcp any any eq telnet 

access-list outside extended permit tcp any any eq ftp 

access-list outside extended permit esp any any 

access-list outside extended permit udp any any eq isakmp 

access-list outside extended permit object-group DM_INLINE_SERVICE_1 any host 172.16.54.156 

access-list outside extended permit object-group TCPUDP any host 172.16.54.89 object-group DM_INLINE_TCPUDP_1 

access-list outside extended permit object-group TCPUDP any host 172.16.54.58 eq 88 

access-list outside extended permit object-group TCPUDP any host 172.16.54.55 object-group DM_INLINE_TCPUDP_2 

access-list outside extended permit object-group TCPUDP any host 172.16.54.52 eq 90 

access-list outside extended permit object-group TCPUDP any host 172.16.54.49 eq 81 

access-list outside extended permit object-group TCPUDP any host 172.16.54.46 eq 8267 

access-list outside extended permit tcp any host 172.16.54.45 

access-list outside extended permit tcp any host 172.16.54.41 eq 81 

access-list outside extended permit tcp any host 172.16.54.39 object-group DM_INLINE_TCP_1 

access-list outside extended permit tcp any host 172.16.54.38 eq 9000 

access-list outside extended permit tcp any host 172.16.54.37 eq 81 

access-list outside extended permit tcp any host 172.16.54.34 eq 8000 

access-list outside extended permit tcp any host 172.16.54.31 eq 8001 

access-list outside extended permit tcp any host 172.16.54.32 eq 8001 

access-list outside extended permit object-group DM_INLINE_SERVICE_2 any host 172.16.54.30 

access-list outside extended permit tcp any host 172.16.54.29 eq 8088 

access-list outside extended permit tcp any host 172.16.54.28 object-group DM_INLINE_TCP_2 

access-list outside extended permit tcp any host 172.16.54.21 object-group DM_INLINE_TCP_3 

access-list outside extended permit tcp any host 172.16.54.14 eq 3210 

access-list outside extended permit tcp any host 172.16.54.13 object-group DM_INLINE_TCP_4 

access-list outside extended permit object-group TCPUDP host 172.16.32.151 host 172.16.54.13 eq 1521 

access-list outside extended permit tcp any host 172.16.54.12 object-group DM_INLINE_TCP_5 

access-list outside extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_2 

access-list outside extended permit ospf any any 

access-list outside extended permit udp any any 

pager lines 24

logging enable

logging asdm informational

mtu outside 1500

mtu inside 1500

mtu mgt 1500

no failover

icmp unreachable rate-limit 1 burst-size 1

icmp permit any outside

icmp permit any inside

no asdm history enable

arp timeout 14400

no arp permit-nonconnected

access-group outside in interface outside

access-group inside in interface inside

access-group inside global

route outside 0.0.0.0 0.0.0.0 172.16.10.1 1

timeout xlate 3:00:00

timeout pat-xlate 0:00:30

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

user-identity default-domain LOCAL

http server enable

http 0.0.0.0 0.0.0.0 mgt

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

crypto ipsec security-association pmtu-aging infinite

crypto ca trustpool policy

telnet 0.0.0.0 0.0.0.0 mgt

telnet timeout 5

ssh 0.0.0.0 0.0.0.0 mgt

ssh timeout 5

ssh key-exchange group dh-group1-sha1

console timeout 0

!

tls-proxy maximum-session 1000

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

mac-learn outside disable

mac-learn inside disable

arp-inspection outside enable no-flood

arp-inspection inside enable no-flood

!

class-map inspection_default

 match default-inspection-traffic

class-map notimeout

 description sqlnet no timeout

 match port tcp eq sqlnet

!

!

policy-map type inspect dns preset_dns_map

 parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

 description SQLnotimeout

 class inspection_default

  inspect dns preset_dns_map 

  inspect ftp 

  inspect h323 h225 

  inspect h323 ras 

  inspect rsh 

  inspect rtsp 

  inspect esmtp 

  inspect sqlnet 

  inspect skinny  

  inspect sunrpc 

  inspect xdmcp 

  inspect sip  

  inspect netbios 

  inspect tftp 

  inspect ip-options 

 class notimeout

  inspect sqlnet 

  set connection timeout embryonic 0:00:00 half-closed 0:00:00 idle 0:00:00 

!

service-policy global_policy global

prompt hostname context 

no call-home reporting anonymous

Cryptochecksum:342a3341204597270a7e4e32b87d341c

: end

johnlloyd_13
Level 9
Level 9

hi,

try to configure routing for your 'inside' local subnets?

route inside 172.16.32.0 <SM> <GW>

route inside 172.16.54.0 <SM> <GW>

Review Cisco Networking for a $25 gift card