10-04-2012 03:30 AM - edited 03-11-2019 05:04 PM
I have a very simple setup
I/F inside(100) DMZ(50) outside(0)
Inside hosts have NAT access to outside
DMZ host's have static nat and are accessible from outside - www, dns queries etc
However:
Hosts in DMZ cannot access the internet.
packet-tracer indicates that traffic routes via the inside i/f and is dropped ! the def route is Outside- see attached file.
I have attached the sho run NAT and sho run route outputs. ( I can't seem to past text on here)
Any help appreciated
Thanks
Solved! Go to Solution.
10-04-2012 04:14 AM
Hi,
This is probably due to NAT configurations as they can define the ingress/eggress interface in the new software
So from what I gather you have the following NAT configurations
I would do the configurations like this
Basic PAT
object-group network PAT-SOURCE-NETWORKS
description PAT source networks
network-object x.x.x.x y.y.y.y
network object a.a.a.a b.b.b.b
nat (any,Outside) after-auto source dynamic PAT-SOURCE-NETWORKS interface
Where
The above PAT configuration basicly does the following
Static NAT
object network STATIC
host x.x.x.x
nat (Inside,Outside) static y.y.y.y dns
Where
On a final note I would personally not do any NAT between your local ASA interfaces.
In the new 8.4 softwares you dont need NAT for traffic between your local interface. Any traffic that doesnt have NAT statements will go through the ASA unNATed. So your LAN network can connect to your DMZ with the DMZ actual IP address and so on.
The packet-tracer says that the following NAT rule is applied to the traffic you are testing
nat (Inside,DMZ) source static any any
To me it seems that this configuration is not needed.
- Jouni
10-04-2012 04:14 AM
Hi,
This is probably due to NAT configurations as they can define the ingress/eggress interface in the new software
So from what I gather you have the following NAT configurations
I would do the configurations like this
Basic PAT
object-group network PAT-SOURCE-NETWORKS
description PAT source networks
network-object x.x.x.x y.y.y.y
network object a.a.a.a b.b.b.b
nat (any,Outside) after-auto source dynamic PAT-SOURCE-NETWORKS interface
Where
The above PAT configuration basicly does the following
Static NAT
object network STATIC
host x.x.x.x
nat (Inside,Outside) static y.y.y.y dns
Where
On a final note I would personally not do any NAT between your local ASA interfaces.
In the new 8.4 softwares you dont need NAT for traffic between your local interface. Any traffic that doesnt have NAT statements will go through the ASA unNATed. So your LAN network can connect to your DMZ with the DMZ actual IP address and so on.
The packet-tracer says that the following NAT rule is applied to the traffic you are testing
nat (Inside,DMZ) source static any any
To me it seems that this configuration is not needed.
- Jouni
10-04-2012 04:57 AM
Jouni
Thanks - that worked a treat !
Bob
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: