11-14-2010 01:55 AM - edited 03-11-2019 12:09 PM
Hi @ all,
first of all i have to say i was dissapointed in Cisco changing whole NAT configuration Style radicaly. It took me ages to convert the old statements from my preavious working configuration. Anyway. (maybe its just about my incompetence)
Info:
I have a Cisco ASA 5510 running 8.3(2) which should replace an existing firewall. I did initial configuration with Pre-8.3 Version without the following issue.
Interace Ethernet 0/0 ist connected to a ADSL Modem of the Provider who provides the static IP Adress over pppoe
Interface Ethernet 0/1 is connected with staic IP to a Backup ADSL Router for backup internet access of our internal network
Interface Ethernet 0/2 and 0/3 are conected to the internal switches implemented in a Redundant interface configuration
For Internet Access backup i use the SLA monitor to track the outside getaway of the ISP if this fails 3 times the routes gonna be changed to the ethernet 0/1
PPPoE configuration
vpdn group VTX_ADSL2+ request dialout pppoe
vpdn group VTX_ADSL2+ ppp authentication chap
vpdn group VTX_ADSL2+ localname XXXXXXX
vpdn username XXXXXX password XXXXXX
Interface Ethernet 0/0
ip address pppoe setroute (also tryed ip address XXX.XXX.XXX.XXX 255.255.255.255 pppoe setroute)
pppoe client vpdn group VTX_ADSL2+
SLA configuration:
sla monitor 100
type echo protocol ipIcmpEcho XXX.XXX.XX.52 interface outside
num-packets 3
frequency 10
exit
sla monitor schedule 100 life forever start-time now
track 1 rtr 100 reachability
Route configuration:
route outside 0.0.0.0 0.0.0.0 XX.XXX.XXX.52 1 track 1
route outside 0.0.0.0 0.0.0.0 XXX.XXX.XXX.51 1 track 1
route outside_backup 0.0.0.0 0.0.0.0 10.10.5.1 254
NAT configuration:
nat (outside,inside_192.168.1.0_24) 1 source static obj_outside_host_smtp_xxx.xxxxx.xx obj_outside_host_smtp_xxx.xxxxx.xxdestination static interface obj_inside_server_kolab2 service obj_service_smtp obj_service_smtp unidirectional
nat (outside,inside_192.168.1.0_24) 2 source static obj_outside_host_smtp_yyyy.xxxxx.xx obj_outside_host_smtp_yyyy.xxxxx.xx destination static interface obj_inside_server_kolab2 service obj_service_smtp obj_service_smtp unidirectional
nat (outside,inside_192.168.3.0_24) 3 source static any any destination static interface obj_inside_steuerung_camera_mobotix service obj_service_avira_smc_nat obj_service_http unidirectional
nat (outside,inside_192.168.1.0_24) 4 source static any any destination static interface obj_inside_steuerung_netlinx service obj_service_netlinx_studio obj_service_netlinx_studio unidirectional
nat (outside,inside_192.168.1.0_24) 5 source static any any destination static interface obj_inside_server_kolab2 service obj_service_https obj_service_https unidirectional
nat (outside,inside_192.168.1.0_24) 6 source static any any destination static interface obj_inside_server_kolab2 service obj_service_pop3_ssl obj_service_pop3_ssl unidirectional
nat (inside_192.168.1.0_24,outside) 7 source static obj_inside_network_192.168.1.0_24 obj_inside_network_192.168.1.0_24 destination static grp_outside_vpn_networks grp_outside_vpn_networks
nat (any,outside) 8 source dynamic any interface
nat (any,outside_backup) 9 source dynamic any interface
Target of nat is following:
Rule 1: Incoming Traffic to Outside from Source obj_outside_host_smtp_xxx.xxxxx.xx with SMTP should be forwarde to internal Mailserver
Rule 2: Same as Rule 1 just form other source host
Rule 3: Incoming Traffic to Outside from any source adress on port 7000 should be forwardet to internal camera for http accesss
Rule 4: Incoming Traffic to Outside from any source adress on port 1319 should be forwardet to internal netlinxcontroller 1319
Rule 5: Incoming Traffic to Outside from any source adress on port 443 should be forwardet to internal mailserver 443
Rule 6: Incoming Traffic to Outside from any source adress on port 995 should be forwardet to internal mailserver 995
Rule 7: incoming Traffic to Inside interface from internal servernetwork for destination of vpn network pools should remain original
Rule 8: NAT roule for Internetaccess
Rule 9: NAT roule for internet access on backup line
Problem:
All NAT config ist well testet with packet-tracer an working fine. The Problem ist when then Ethernet 0/0 goes down or losses connection to the provieder, and the routes gonna be changed to backup. The NAT is killing itself anyhow.
If i shutdown the ethernet 0/0 interface i have to wait about 5-10 minutes an geting following form console:
(x.x.x.x) ist outside static IP Adress
WARNING: mapped-address XXX.XXX.XXX.XXX/25-0 ovelap with existing static NAT.
ERROR: NAT Policy is not downloaded
ERROR: NAT Policy is not downloaded
ERROR: NAT Policy is not downloaded
ERROR: NAT Policy is not downloaded
ERROR: NAT Policy is not downloaded
after that rule 1 - 5 disapear in the configuration.
I have to delete whole NAT and reconfigure it to make it working again.
Same thing happens if i reboot the ASA.
i spend ages figuring out the Problem but i could not fix it.
I hope you guys can help me. Rollout of the asa should be next weekend. so i am a little bit busy.
EDIT: I also tried to shutdown pppoe on lab. If the interface does not pppoe it just works fine. The ASA seems to have problem with the PPPoE not ready and killing NAT entry witch include the interface statement for outside interface
11-14-2010 04:01 AM
debug nat shows:
nat: next policy seems to be wrong in installing divert elements
nat: next policy seems to be wrong in installing divert elements
nat: next policy seems to be wrong in installing divert elements
nat: next policy seems to be wrong in installing divert elements
nat: next policy seems to be wrong in installing divert elements
11-18-2010 08:18 AM
Also, here is the config guide for that:
http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/ip.html#wp1090243
Regards,
prapanch
02-23-2015 08:28 AM
Hi Andreas,
i know, this topic is 4 years old, but i am still facing this issue.
everytime my asa is reconnecting to the provider with pppoe, i loose all NAT config that hast the Outside Interface as a destination IP.
Was there ever a solution for you?
I tried to trick the asa with a Rule made the opposite around, and use "both directions". but than it does not reserv the port for forwarding :/
so nat rule 3 is not working. but looking right in asdm...
Nat rule 4 is working but disappears every night.
nat (inside,outside2) source static sn_VIT_Internal_Network sn_VIT_Internal_Network destination static sn_VIT_Schottweg_Network sn_VIT_Schottweg_Network route-lookup
nat (inside,outside2) source static sn_VIT_Internal_Network sn_VIT_Internal_Network destination static NETWORK_OBJ_192.168.92.108_30 NETWORK_OBJ_192.168.92.108_30 no-proxy-arp route-lookup
nat (inside,outside2) source static ip_VIT_OpenVPN interface service 1194_udp 1194_udp
nat (outside2,inside) source static any any destination static interface ip_VIT_OpenVPN service 1194_udp 1194_udp unidirectional
!
nat (inside,outside2) after-auto source dynamic any interface
VIT-FW01# sh nat
Manual NAT Policies (Section 1)
1 (inside) to (outside2) source static sn_VIT_Internal_Network sn_VIT_Internal_Network destination static sn_VIT_Schottweg_Network sn_VIT_Schottweg_Network route-lookup
translate_hits = 10318, untranslate_hits = 10339
2 (inside) to (outside2) source static sn_VIT_Internal_Network sn_VIT_Internal_Network destination static NETWORK_OBJ_192.168.92.108_30 NETWORK_OBJ_192.168.92.108_30 no-proxy-arp route-lookup
translate_hits = 866, untranslate_hits = 999
3 (inside) to (outside2) source static ip_VIT_OpenVPN interface service 1194_udp 1194_udp
translate_hits = 0, untranslate_hits = 0
4 (outside2) to (inside) source static any any destination static interface ip_VIT_OpenVPN service 1194_udp 1194_udp unidirectional
translate_hits = 1, untranslate_hits = 12
Manual NAT Policies (Section 3)
1 (inside) to (outside2) source dynamic any interface
translate_hits = 30729, untranslate_hits = 374
02-25-2015 09:49 AM
HI Btewes001
unfortunatley we did not find a solution. Sorry. We discussed with our ISP to give us another contract with PPPoE less authentication so we could make the IP address assignment fix. therefore its not a solution but mora a Workaround.
Seems like this issue is still not adressed with the new ASA software? I no longer work with ASA so i am pretty much no longer in Need for this but hope it may get fixed some day to help other People.
Cheers Andreas
02-26-2015 02:01 AM
Hi,
to bad :/
My problem is, that i can not open a TAC because i dont have a contract with cisco :/
With kind regards,
Bernd
11-18-2010 08:16 AM
Hi Andreas,
I am not sure if you are still facing this issue. Now with your primary link using PPPOE and since you are using the setroute option on it, the configuration for SLA onitoring is slightly different. With the "setroute" keyword added, you can remove the below 2 commands:
route outside 0.0.0.0 0.0.0.0 XX.XXX.XXX.52 1 track 1
route outside 0.0.0.0 0.0.0.0 XX.XXX.XXX.51 1 track 1
and add the command "pppoe client route track 1" in the eth0/0 configuration mode.
Let me know if this helps.
Regards,
Prapanch
11-18-2010 11:39 PM
Hi Prapanch,
thanks for you reply. There is no problem with the sla. I also tried it your way before with no change of the problem. The route backup works fine.
I allready contacted Cisco TAC. It seems there is a minor problem with this.
I ll keep you guys up to date if they got the reason an the fix for it.
Regards,
Andreas
11-19-2010 09:47 AM
Thank you for keeping the CSC community up to date Lukas. That is the spirit behind it, members collaborate and helping each other in order to reach to the solutions they need.
Rgs,
PK
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide