09-20-2016 01:37 AM - edited 03-12-2019 01:17 AM
Dear Team,
I have ASA Firewall 5515-X Firepower ver 9.2.Currently we planning to move our existing ASA 5510 to ASA 5515-X ver 9.2.We are using two different subnets of same ISP.The same setup was working fine ASA 5510 ver 8.2.But when we deployed with new Firewall 5515-X ver 9.2,its not working.
Currently we use two different subnets 195.39.178.xx series and 62.150.xx.xx series of Public IP.When i use 195.39.178.series of IP(outside) i can reach internet from inside to outside.But when i use 62.150.x.x(outside) series ip,i cannot reach internet.
Please provide me solution for the problem as well as let me know any inputs required from my side.
Thanks in advance
09-20-2016 08:58 PM
Hi jafrulla1986,
How are you testing the traffic when trying to use the interface 62.150.x.x? is this supposed to be a backup interface?
You can attach the following information:
sh run route
sh route
sh run nat
Hope this info helps!!
Rate if helps you!!
-JP-
09-24-2016 09:23 PM
Hi JP Miranda,
Please find the attached output.We use different subnet as 195.x.x.x series as well as 62.150.x.x series.Traffic can reach internet when i use 195.x.x.x series ip for natting.But when i use 62.150.x.x ,i cant reach internet.Currently i have ASA 5510 series in production,which works fine.But when i replace with new ASA 5515-x Firepower ver 9.2,its not working .
Please let me know any other info required.
09-24-2016 09:44 PM
Hi jafrulla1986,
I believe this is a nat issue and also a routing issue, you can use the following nat:
object network Outside1nat
subnet 0.0.0.0 0.0.0.0
nat (inside,outside1) dynamic interface
Make sure you remove this one first:
no nat (inside,Outside1) source static TEST TEST-VIP
Also for the routing considering this route you are only allowing traffic using Outside1 when going to 62.150.4.x, so if you are expecting the Outside1 to work for internet traffic you need to create a default route to the Outside1 next hop:
route Outside1 0.0.0.0 0.0.0.0 62.150.4.x
Also in order to test the backup interface you need to change the metric of the Outside route to a higher metric so the Outside1 is going to take precedence.
Normally in this type of scenario what you need is an IPSLA to monitor the link on Outside so when this one is down the Outside1 is going to take over:
IPSLA config:
http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118962-configure-asa-00.html
Hope this info helps!!
Rate if helps you!!
-JP-
09-24-2016 10:05 PM
Dear JP Miranda,
Thanks for response.I will explain scenario of my setup.We running some services in 62.150.x.x and 195.39.x.x series.Please find the attached one for our exiting firewall config.
When i use same config in new firewall,its work fine when i use nat ip in 195.39.series.But if use 62.150.x.x series for nat ip,i am not able to reach internet.
So i changed my scenario to use to two different interface for outside,one for 195.39.x.x series and another one for Outside1 for 65.150.x.x.
My scenario is what ever the nat ip,(either 195.39.x.x or 62.150.x.x)i use,i should reach internet.
Note: we use old subnet 62.150.x.x as it got fulled,we bought another subnet 195.39.x.x series.
Condition is that i should reach inside to outside vice versa as well as DMZ to outside vice versa when i use any set of above mentioned ips.
In my scenario,we use both static as dynamic nat as well as.
Please help me to fix issue.Please let me know any other info required.
09-24-2016 10:08 PM
Hi JP Miranda,
Note:Both subnets are from same ISP.We dont hv any backup ISP.
09-25-2016 08:11 PM
Hi jafrulla1986,
I was checking your old and new config and they are kind of different, when you are saying both interfaces are pointing to the same ISP i guess that is fine but you can't have all your traffic going through 2 different interfaces that is the reason why i pointed this out as a backup interface. So if you check your old config you can see only one default route on the outside interface:
route Outside 0.0.0.0 0.0.0.0 195.39.x.x 1
Now this default route represents a route that is going to be used as long as you don't have any other route more specific so is going to work for internet traffic without any problem, when you created a new interface with a different IP not part of the subnet 195.39.x.x this one is not going to be reachable until you create a route pointing to the default gateway on the 62.150.4.2.
The whole point here is that you can have both interfaces working as long as you are specific about the destination of the traffic but if you are expecting this 2 interfaces to give you internet traffic at the same time that is not going to be possible, that is the reason why i pointed out a backup interface with IPSLA so you can have the 195.19.x.x working as primary and as soon as this one goes down the 62.150.x.x is going to take over all the traffic.
Keep in mind i am understanding that you are expecting to route internet traffic through 2 different interfaces at the same time using a default route pointing to 0.0.0.0 0.0.0.0 to the next hop.
Hope this info helps!!
Rate if helps you!!
-JP-
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide