08-21-2019 11:49 AM
Hi everyone, I encounter a problem that really strange and tried different ways can't solve the ASA 5515 9.1 not able to allow traffic from inside to outside.
Any suggest much appreciated. Keith
Here is the sanitized config:
asa# sh run
: Saved
:
ASA Version 9.1(1)
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address x.x.x.10 255.255.255.192
!
interface GigabitEthernet0/1
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.248
!
access-list INSIDE_IN extended permit ip any any
access-list INSIDE_IN extended permit icmp any any
access-list OUTSIDE_OUT extended permit ip any any
access-list OUTSIDE_OUT extended permit icmp any any
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any unreachable outside
icmp permit any echo outside
icmp permit any echo-reply outside
icmp permit any time-exceeded outside
icmp permit any inside
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
!
nat (inside,outside) after-auto source dynamic any interface
access-group OUTSIDE-IN in interface outside
access-group OUTSIDE_OUT out interface outside
route outside 0.0.0.0 0.0.0.0 x.x.x.65 1
route inside 10.57.1.0 255.255.255.0 10.1.1.2 1
...
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect icmp
...
end
ping from my laptop IP: 10.1.1.3 connect to the g0/1:
ping 8.8.8.8
asa# ICMP echo request from inside:10.1.1.3 to outside:8.8.8.8 ID=1 seq=46 len=32
ICMP echo request translating inside:10.1.1.3 to outside:x.x.x.10
ICMP echo request from inside:10.1.1.3 to outside:8.8.8.8 ID=1 seq=47 len=32
ICMP echo request translating inside:10.1.1.3 to outside:x.x.x.10
And no other traffic can go outside.
asa# packet-tracer input inside icmp 10.1.1.3 8 0 8.8.8.8
Everything ALLOW
asa# packet-tracer input outside icmp 8.8.8.8 8 0 10.1.1.3
till here everything ALLOW
Phase: 8
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
nat (inside,outside) after-auto source dynamic any interface
Additional Information:
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
Solved! Go to Solution.
08-21-2019 12:03 PM
Hi,
Can you ping the default gateway (upstream ISP router) from the ASA itself? If that works can you traceroute to 8.8.8.8 and see where it stops.
Your ACL on the outside interface should be configured in the "in" direction, the ACL "OUTSIDE-IN" you appear to have defined does not exist.
access-list INSIDE_IN extended permit ip any any
access-list INSIDE_IN extended permit icmp any any
access-list OUTSIDE_OUT extended permit ip any any
access-list OUTSIDE_OUT extended permit icmp any any
access-group OUTSIDE-IN in interface outside
Also the packer-tracer you ran from outside to inside would not work. You have a dynamic nat not a static 121 nat.
HTH
08-21-2019 11:52 AM
missed: access-group INSIDE_IN in interface inside
08-21-2019 12:03 PM
Hi,
Can you ping the default gateway (upstream ISP router) from the ASA itself? If that works can you traceroute to 8.8.8.8 and see where it stops.
Your ACL on the outside interface should be configured in the "in" direction, the ACL "OUTSIDE-IN" you appear to have defined does not exist.
access-list INSIDE_IN extended permit ip any any
access-list INSIDE_IN extended permit icmp any any
access-list OUTSIDE_OUT extended permit ip any any
access-list OUTSIDE_OUT extended permit icmp any any
access-group OUTSIDE-IN in interface outside
Also the packer-tracer you ran from outside to inside would not work. You have a dynamic nat not a static 121 nat.
HTH
08-21-2019 01:27 PM
Thanks RJI, it works!
In our other office location, I don't have those two Outside_in access-list and it didn't work.
And today my conf has the two access-list needed, as you predicted ;-)
access-list INSIDE_IN extended permit ip any any
access-list INSIDE_IN extended permit icmp any any
access-list OUTSIDE_OUT extended permit ip any any
access-list OUTSIDE_OUT extended permit icmp any any
access-list OUTSIDE-IN extended permit icmp any any
access-list OUTSIDE-IN extended permit ip any any
access-group OUTSIDE-IN in interface outside
access-group OUTSIDE_OUT out interface outside
access-group INSIDE_IN in interface inside
But I made a stupid mistake using the up layer route gateway, not the direct connect one.
Thanks a lot for your help, much appreciated.
Netcruiser
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide