01-20-2012 10:09 AM - edited 03-11-2019 03:17 PM
I'm having an issue with static one to one nat. Anything I create a static nat for, that server loses connectivity. If I remove the one to one Nat and only try to open ports to those servers, with the access-lists in place the ports do not translate. I've been working on this issue for a few days, the ASA was running 8.2 but I upgraded to 8.3 to try and resolve this. Everything was working fine up until the ISP was shut off, then once it was reactivated, the nat doesn't seem to want to work. Please let me know what else I need to contribute to this post to help in resolving this issue. This is my first post on here.
Solved! Go to Solution.
01-20-2012 02:53 PM
Hello Wolff,
Just to let you know this is not an ASA problem, I mean the ASA is not receiving any messages from the ISP.
Can you confirm with the ISP if everything is well on their site.
Explain to them why its going on here.
Edit: Please confirm that on the ISP side they ARP entries (Mac add of the ASA) for each public ip address you have set-up on your ASA.
Regards,
Julio
01-20-2012 10:23 AM
Hello Wolff,
Please post the object configuration for the nat and the ACLS, the acl config and the nat statement.
Regards,
Julio
01-20-2012 11:46 AM
access-list 101 extended permit tcp any host 192.168.x.c eq smtp
access-list 101 extended permit tcp any host 192.168.x.c eq 587
access-list 101 extended permit tcp any host 192.168.x.c eq imap4
access-list 101 extended permit tcp any host 192.168.x.c eq pop3
access-list 101 extended permit tcp any host 192.168.x.c eq www
access-list 101 extended permit tcp any host 192.168.x.c eq https
access-list 101 extended permit tcp any host 192.168.x.d eq www
access-list 101 extended permit tcp any host 192.168.x.d eq https
access-list 101 extended permit tcp any host 192.168.x.a eq ftp
access-list 101 extended permit tcp any host 192.168.x.a range 2048 3000
access-list 101 extended permit tcp any host 192.168.x.b eq sip
access-list 101 extended permit udp any host 192.168.x.b eq sip
access-list 101 extended permit udp any host 192.168.x.b range 9000 9049
access-group 101 in interface outside
object network obj-192.168.x.a
host 192.168.x.a
object network obj-192.168.x.b
host 192.168.x.b
object network obj-192.168.x.c
host 192.168.x.c
object network obj-192.168.x.d
host 192.168.x.d
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network obj-192.168.x.a
nat (inside,outside) static externalip1
object network obj-192.168.x.b
nat (inside,outside) static externalip2
object network obj-192.168.x.c
nat (inside,outside) static externalip3
object network obj-192.168.x.d
nat (inside,outside) static externalip4
object network obj_any
nat (inside,outside) dynamic interface
The dynamic Nat seems to work fine, but I just spoke to a user onsite and it looks like the ASA just seems to stop Nat completely for a few minutes then starts working again. But anything with the one to one nat doesn't have internet access at all.
01-20-2012 01:12 PM
Hello Wolff,
The configuration is fine, do you have any logs while the issue happens?
We can do captures from the statics one to one:
access-list capin permit tcp host 192.168.x.d any eq 80
access-list capin permit tcp any eq 80 host 192.168.x.d
access-list capout permit tcp host static externalip4 any eq 80
access-list capout permit tcp any eq 80 host static externalip4
capture capin access-list capin interface inside
capture capout access-list capout interface outside
Then try to generate some traffic from host 192.168.x.d to a web site and provide:
sh capture capin
sh capture capout
Regards,
Rate helpful posts
Julio
01-20-2012 01:51 PM
sh capture capin
14 packets captured
1: 14:29:05.969783 192.168.x.d.1070 > 74.125.227.49.80: S 3184866054:3184866054(0) win 65535
2: 14:29:09.029264 192.168.x.d.1070 > 74.125.227.49.80: S 3184866054:3184866054(0) win 65535
3: 14:29:15.046262 192.168.x.d.1070 > 74.125.227.49.80: S 3184866054:3184866054(0) win 65535
4: 14:29:27.081233 192.168.x.d.1071 > 74.125.227.50.80: S 3788740114:3788740114(0) win 65535
5: 14:29:30.143455 192.168.x.d.1071 > 74.125.227.50.80: S 3788740114:3788740114(0) win 65535
6: 14:29:36.160468 192.168.x.d.1071 > 74.125.227.50.80: S 3788740114:3788740114(0) win 65535
7: 14:29:48.195058 192.168.x.d.1072 > 74.125.227.51.80: S 1482165371:1482165371(0) win 65535
8: 14:29:51.257661 192.168.x.d.1072 > 74.125.227.51.80: S 1482165371:1482165371(0) win 65535
9: 14:29:57.274659 192.168.x.d.1072 > 74.125.227.51.80: S 1482165371:1482165371(0) win 65535
10: 14:30:09.309111 192.168.x.d.1073 > 74.125.227.52.80: S 2907081959:2907081959(0) win 65535
11: 14:30:12.371852 192.168.x.d.1073 > 74.125.227.52.80: S 2907081959:2907081959(0) win 65535
12: 14:30:18.388850 192.168.x.d.1073 > 74.125.227.52.80: S 2907081959:2907081959(0) win 65535
13: 14:30:30.423226 192.168.x.d.1074 > 74.125.227.48.80: S 1928456592:1928456592(0) win 65535
14: 14:30:33.376658 192.168.x.d.1074 > 74.125.227.48.80: S 1928456592:1928456592(0) win 65535
14 packets shown
sh capture capout
14 packets captured
1: 14:29:05.969935 externalip4.1070 > 74.125.227.49.80: S 624358576:624358576(0) win 65535
2: 14:29:09.029310 externalip4.1070 > 74.125.227.49.80: S 624358576:624358576(0) win 65535
3: 14:29:15.046292 externalip4.1070 > 74.125.227.49.80: S 624358576:624358576(0) win 65535
4: 14:29:27.081370 externalip4.1071 > 74.125.227.50.80: S 1149315094:1149315094(0) win 65535
5: 14:29:30.143501 externalip4.1071 > 74.125.227.50.80: S 1149315094:1149315094(0) win 65535
6: 14:29:36.160498 externalip4.1071 > 74.125.227.50.80: S 1149315094:1149315094(0) win 65535
7: 14:29:48.195195 externalip4.1072 > 74.125.227.51.80: S 2502567266:2502567266(0) win 65535
8: 14:29:51.257692 externalip4.1072 > 74.125.227.51.80: S 2502567266:2502567266(0) win 65535
9: 14:29:57.274689 externalip4.1072 > 74.125.227.51.80: S 2502567266:2502567266(0) win 65535
10: 14:30:09.309264 externalip4.1073 > 74.125.227.52.80: S 451242494:451242494(0) win 65535
11: 14:30:12.371883 externalip4.1073 > 74.125.227.52.80: S 451242494:451242494(0) win 65535
12: 14:30:18.388880 externalip4.1073 > 74.125.227.52.80: S 451242494:451242494(0) win 65535
13: 14:30:30.423378 externalip4.1074 > 74.125.227.48.80: S 3330073209:3330073209(0) win 65535
14: 14:30:33.376689 externalip4.1074 > 74.125.227.48.80: S 3330073209:3330073209(0) win 65535
14 packets shown
That is trying to browse to Google.
01-20-2012 02:10 PM
Hello Wolff,
The problem is on the ISP site, the packets are traversing the ASA, the ASA is sending them to the outside but then nothing happens, the public ip address you are using may be blocked on the outside or your ISP is not routing properly.
So there is one thing you could do to confirm this.
1- Byppas the ASA, use a PC directly connected to the internet with the ip address of externalip4.
Regards,
Julio
Rate the helpful posts!
01-20-2012 02:25 PM
When we do that, everything works fine on the PC. That's was is so confusing about this. I originally thought it was the ISP as well.
01-20-2012 02:53 PM
Hello Wolff,
Just to let you know this is not an ASA problem, I mean the ASA is not receiving any messages from the ISP.
Can you confirm with the ISP if everything is well on their site.
Explain to them why its going on here.
Edit: Please confirm that on the ISP side they ARP entries (Mac add of the ASA) for each public ip address you have set-up on your ASA.
Regards,
Julio
01-27-2012 07:57 AM
Turns out this was an ISP issue. After several attempts to get them to realize this, they cleared their ARP cache and everything started working again. I appreciate your help in resolving this.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide