cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
502
Views
0
Helpful
2
Replies

ASA 8.6 NAT + Routing issue

jtabasz
Cisco Employee
Cisco Employee

I have a ASA 5525 running 8.6.1

My requirement is for server 1 to send web service requests to server 3 and server 4

some relevant config snippets:

object network server_3

 host 10.1.5.6

 nat (inside,dmz) static 192.168.100.6

object network server_4

 host 10.79.100.6

 nat (test1,dmz) static 192.168.100.66

access-list dmz_in extended permit icmp 10.1.7.0 255.255.255.0 192.168.100.0 255.255.255.0

access-list dmz_in extended permit tcp 10.1.7.0 255.255.255.0 192.168.100.0 255.255.255.0 eq 80

access-list dmz_in extended permit tcp 10.1.7.0 255.255.255.0 192.168.100.0 255.255.255.0 eq 443

access-group dmz_in in int dmz

route dmz 10.1.7.0 255.255.255.0 192.168.100.1 1

my service-policy inspects icmp

server 1 cannot ping, port 80 and port 443 to server 3 (security level 0 to security level 100)

server 1 cannot ping, port 80 or port 443 to server 4 (sec level 0 to sec level 50)

server 2 can ping, port 80 and port 443 to server 3 (sec level 0 to sec level 100)

What could possibly cause this behavior?

packet-tracer allows server 1 to get to server 4 via icmp, ports 80 and 443.

On running telnet 192.168.100.6 443 from server 1 I see the hit count increment on the acl

On running telnet 192.168.100.66 443 from server 1 I see the hit count increment on the acl

What could possibly cause this behavior?

2 Replies 2

Pawan Raut
Level 4
Level 4
Do you have below command in Firewall configuration same-security-traffic permit inter-interface

myasa1# sh run | i same
same-security-traffic permit inter-interface

Yes. The requests are meant to enter on a security level 0 interface to reach a server on a security level 50 interface.

My understanding is that there are no rules regarding security levels except that traffic from a lower level interface to a higher needs to be explicitly allowed via ACL.

I'm NAT'ing IPs from 2 different subnets to the same subnet that my ingress port is on. Is there an issue with this? 

THanks for the response,

John

Review Cisco Networking for a $25 gift card