cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
435
Views
0
Helpful
5
Replies

ASA Hairpinning Question

Ryan Fisher
Level 1
Level 1

I have a webserver in my DMZ that I need to access from the inside network, but need to use the internet IP address to reach it.  I can't use DNS rewrite because I'm using Citrix global server load balancing to serve the IP address for DNS, so it needs to access it by the external internet IP address.

I have the same-security-traffic permit intra interface line in the config, and I've tried creating a couple of NATs but none of them seemed to work.

 

static (inside, inside) 10.115.185.199 10.115.185.199 netmask 255.255.255.255

static (dmz, dmz) 10.115.185.199 10.115.185.199 netmask 255.255.255.255

 

DMZ server 172.16.100.19

inet IP NATd to DMZ server: 10.115.185.199 (obviously cleansed)

outside interface IP:  10.115.185.212

internal network 10.100.205.0/24

ASA version 8.2(5)

 

Any help is appreciated!  Hope I've given enough information.

Thanks

5 Replies 5

Akshay Rastogi
Cisco Employee
Cisco Employee

Hi Ryan,

Please try the below configuration:

step1:

 

static (dmz,outside) 101.115.185.199 172.16.100.19 netmask 255.255.255.0

static (dmz,inside)  101.115.185.199 172.16.100.19 netmask 255.255.255.0

 

step2:

allow access-list on outside:

access-list out_in permit tcp any host 172.16.100.19

access-group out_in in interface outside

 

Please let us know if this works for you.

Regards,

Akshay Rastogi

Hi, thanks.  That did work, and I can now access my web server from the inside with the public IP address.  However, I cannot access it from the outside anymore!  I'll post my firewall config.

Also, I decided to do this on my lab firewall first, so my IP addresses have changed slightly:

DMZ server 172.16.35.50 (also doing 172.16.35.60)

inet IP NATd to DMZ server: 10.242.145.227 (obviously cleansed)

outside interface IP:  10.242.245.144

internal network 10.80.1.0/24, 10.90.1.0/24

ASA version 8.2(5)

 

lab-5505asa(config)# sh run
: Saved
:
ASA Version 8.2(5) 
!
hostname lab-5505asa
domain-name 
enable 

names
name 10.36.0.0 OC-Site description OC-Internal
name 10.0.0.0 SD-HQ description PCHS-Internal
dns-guard
!
interface Ethernet0/0
 description inside
!
interface Ethernet0/1
 description outside
 switchport access vlan 2
!
interface Ethernet0/2
 description dmz
 switchport access vlan 4
 speed 100
 duplex full
!             
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.91.1.2 255.255.255.0 
 ospf cost 10
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 10.242.145.144 255.255.255.128 
 ospf cost 10
!
interface Vlan4
 nameif DMZ   
 security-level 50
 ip address 172.16.35.1 255.255.255.0 
 ospf cost 10
!
boot system disk0:/asa825-k8.bin
ftp mode passive
clock timezone PST -8
clock summer-time PDT recurring
dns server-group DefaultDNS
 domain-name 
same-security-traffic permit intra-interface
object-group service DM_INLINE_SERVICE_1
 service-object tcp eq domain 
 service-object udp eq domain 
 service-object udp eq ntp 
object-group service DM_INLINE_TCP_1 tcp
 port-object eq www
 port-object eq https
object-group network DM_INLINE_NETWORK_1
 network-object host 10.90.1.10
 network-object host 10.90.1.11
object-group network DM_INLINE_NETWORK_2
 network-object host 10.242.128.100
 network-object host 10.242.128.101
object-group service DM_INLINE_SERVICE_2
 service-object tcp eq domain 
 service-object udp eq domain 
object-group service DM_INLINE_TCP_2 tcp
 port-object eq ftp
 port-object eq ftp-data
 port-object eq www
 port-object eq https
 port-object eq 3008
 port-object eq 3010
 port-object eq ssh
object-group network DM_INLINE_NETWORK_3
 network-object xxx 255.255.240.0
 network-object xxx 255.255.224.0
object-group service DM_INLINE_TCP_4 tcp
 port-object eq 3268
 port-object eq 3269
 port-object eq ldap
 port-object eq ldaps
object-group network DM_INLINE_NETWORK_6
 network-object host 172.16.35.12
 network-object host 172.16.35.13
object-group service DM_INLINE_TCP_5 tcp
 port-object eq www
 port-object eq https
object-group network DM_INLINE_NETWORK_7
 network-object host 172.16.35.12
 network-object host 172.16.35.13
object-group network DM_INLINE_NETWORK_8
 network-object host 172.16.36.45
 network-object host 172.16.36.46
object-group service DM_INLINE_TCP_6 tcp
 port-object eq 2598
 port-object eq citrix-ica
 port-object eq www
object-group service DM_INLINE_TCP_7 tcp
 port-object eq www
 port-object eq https
object-group service DM_INLINE_TCP_3 tcp
 port-object eq www
 port-object eq https
object-group network DM_INLINE_NETWORK_4
 network-object host 10.242.145.227
 network-object host 10.242.145.228
 network-object host 10.242.145.229
 network-object host 10.242.145.240
 network-object host 10.242.145.241
 network-object host 10.242.145.243
object-group network DM_INLINE_NETWORK_5
 network-object host 172.16.35.12
 network-object host 172.16.35.13
object-group network DM_INLINE_NETWORK_10
 network-object host 172.16.36.15
 network-object host 172.16.36.42
object-group network xenapp_servers
 network-object host 10.90.1.45
 network-object host 10.90.1.46
 network-object host 10.90.5.54
object-group network xendesktop_servers
 network-object host 10.90.1.38
 network-object host 10.90.1.54
 network-object host 10.90.1.68
 network-object host 10.90.1.69
object-group network DM_INLINE_NETWORK_11
 network-object host 172.16.36.10
 network-object host 172.16.36.42
 network-object 10.80.1.0 255.255.255.0
 group-object xenapp_servers
 group-object xendesktop_servers
object-group network DM_INLINE_NETWORK_9
 network-object host 172.16.36.27
 network-object host 172.16.36.31
object-group network DM_INLINE_NETWORK_12
 network-object host xxx
 network-object host xxx
object-group network DM_INLINE_NETWORK_13
 network-object 10.90.10.0 255.255.255.0
 network-object 192.168.80.0 255.255.255.0
 network-object 10.249.0.0 255.255.0.0
object-group network DM_INLINE_NETWORK_14
 network-object 10.90.1.0 255.255.255.0
 network-object 10.90.5.0 255.255.255.0
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
object-group network DM_INLINE_NETWORK_15
 network-object host 10.249.2.15
 network-object host 10.249.2.16
 network-object host 10.249.2.17
 network-object host 10.249.2.21
 network-object 10.249.1.0 255.255.255.0
object-group network DM_INLINE_NETWORK_16
 network-object host 172.16.35.161
 network-object host 172.16.35.162
 network-object host 172.16.35.160
object-group service DM_INLINE_SERVICE_4
 service-object icmp 
 service-object tcp-udp eq domain 
 service-object tcp eq ldap 
object-group network DM_INLINE_NETWORK_17
 network-object host 172.16.35.10
 network-object host 172.16.35.160
object-group network DM_INLINE_NETWORK_18
 network-object host 10.242.145.226
 network-object host 10.242.145.242
object-group network DM_INLINE_NETWORK_19
 network-object host 172.16.35.11
 network-object host 172.16.35.159
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object icmp
object-group network DM_INLINE_NETWORK_20
 network-object host 172.16.35.161
 network-object host 172.16.35.162
object-group network DM_INLINE_NETWORK_22
 network-object host 172.16.35.161
 network-object host 172.16.35.162
 network-object host 172.16.35.160
object-group network DM_INLINE_NETWORK_21
 network-object host 172.16.35.12
 network-object host 172.16.35.13
object-group network DM_INLINE_NETWORK_23
 network-object host 172.16.35.50
 network-object host 172.16.35.60
access-list outside_access_in extended permit ip any host 10.242.145.144 log disable 
access-list outside_access_in extended deny ip object-group DM_INLINE_NETWORK_12 any log disable 
access-list outside_access_in extended permit tcp any host 10.242.145.225 eq 3389 log disable 
access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_18 eq smtp log disable 
access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_TCP_7 log disable 
access-list dmz_access_in extended permit ip any any log disable 
access-list inside_access_in extended deny ip host 10.90.100.25 any log disable 
access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_13 any log disable 
access-list inside_access_in extended permit tcp host 10.90.1.27 host 172.16.35.11 eq smtp log disable 
access-list inside_access_in extended permit tcp host 10.249.2.22 host 172.16.35.159 eq smtp log disable 
access-list inside_access_in extended permit ip 10.80.1.0 255.255.255.0 any log disable 
access-list inside_access_in extended permit tcp host 10.90.1.33 object-group DM_INLINE_NETWORK_3 eq 3101 log disable 
access-list inside_access_in extended permit tcp object-group DM_INLINE_NETWORK_14 any object-group DM_INLINE_TCP_2 log disable 
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 object-group DM_INLINE_NETWORK_1 object-group DM_INLINE_NETWORK_2 log disable 
access-list inside_access_in extended permit udp host 10.90.1.50 any eq ntp log disable 
access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_21 any log disable 
access-list DMZ_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object-group DM_INLINE_NETWORK_20 object-group DM_INLINE_NETWORK_15 log disable 
access-list DMZ_access_in extended permit udp object-group DM_INLINE_NETWORK_22 any eq ntp log disable 
access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_4 object-group DM_INLINE_NETWORK_16 host 10.249.2.100 log disable 
access-list DMZ_access_in extended permit ip object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_11 log disable 
access-list DMZ_access_in extended permit tcp host 172.16.35.160 host 10.249.2.21 eq smtp log disable 
access-list DMZ_access_in extended permit tcp host 172.16.35.10 host 172.16.36.27 eq smtp log disable 
access-list DMZ_access_in extended permit object-group DM_INLINE_SERVICE_1 host 172.16.35.10 host 172.16.36.10 log disable 
access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_19 any eq smtp log disable 
access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_17 any object-group DM_INLINE_TCP_1 log disable 
access-list DMZ_access_in remark rule for cag to owa
access-list DMZ_access_in extended permit tcp host 172.16.35.13 object-group DM_INLINE_NETWORK_9 object-group DM_INLINE_TCP_3 log disable 
access-list DMZ_access_in extended permit tcp host 172.16.35.10 host 172.16.36.10 object-group DM_INLINE_TCP_4 log disable 
access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_NETWORK_10 object-group DM_INLINE_TCP_5 log disable 
access-list DMZ_access_in extended permit tcp object-group DM_INLINE_NETWORK_7 object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_TCP_6 log disable inactive 
access-list slow-down extended permit ip 10.90.0.0 255.255.0.0 any 
access-list slow-down extended permit ip any 10.90.0.0 255.255.0.0 
access-list out_in extended permit tcp any object-group DM_INLINE_NETWORK_23 log disable 
access-list inside_nat0_outbound extended permit ip SD-HQ 255.0.0.0 OC-Site 255.255.0.0 
pager lines 24
logging enable
logging trap debugging
logging asdm warnings
logging host inside 10.90.1.65 6/1470
logging permit-hostdown
mtu inside 1500
mtu outside 1500
mtu DMZ 1500
no failover   
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-713.bin
asdm history enable
arp timeout 14400
global (inside) 2 interface
global (outside) 1 interface
global (DMZ) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 10.80.1.0 255.255.255.0
nat (inside) 1 10.90.1.0 255.255.255.0
nat (inside) 1 10.90.5.0 255.255.255.0
nat (inside) 1 192.168.80.0 255.255.255.0
nat (inside) 1 10.249.0.0 255.255.0.0
nat (DMZ) 1 172.16.35.0 255.255.255.0
static (DMZ,outside) 10.242.145.226 172.16.35.10 netmask 255.255.255.255 dns 
static (DMZ,outside) 10.242.145.228 172.16.35.55 netmask 255.255.255.255 dns 
static (inside,outside) 10.242.145.225 10.90.1.21 netmask 255.255.255.255 dns 
static (inside,DMZ) 172.16.36.31 10.90.1.31 netmask 255.255.255.255 
static (inside,DMZ) 172.16.36.10 10.90.1.10 netmask 255.255.255.255 
static (inside,DMZ) 172.16.36.27 10.90.1.27 netmask 255.255.255.255 
static (inside,DMZ) 172.16.36.15 10.90.1.15 netmask 255.255.255.255 
static (inside,DMZ) 172.16.36.42 10.90.1.42 netmask 255.255.255.255 
static (inside,DMZ) 10.90.1.0 10.90.1.0 netmask 255.255.255.0 
static (inside,DMZ) 10.90.5.0 10.90.5.0 netmask 255.255.255.0 
static (inside,DMZ) 10.80.1.0 10.80.1.0 netmask 255.255.255.0 
static (inside,DMZ) 10.249.2.0 10.249.2.0 netmask 255.255.255.0 
static (inside,DMZ) 10.249.1.0 10.249.1.0 netmask 255.255.255.0 
static (DMZ,outside) 10.242.145.227 172.16.35.50 netmask 255.255.255.255 
static (DMZ,outside) 10.242.145.229 172.16.35.60 netmask 255.255.255.255 
static (DMZ,outside) 10.242.145.240 172.16.35.170 netmask 255.255.255.255 
static (DMZ,outside) 10.242.145.241 172.16.35.171 netmask 255.255.255.255 dns 
static (DMZ,outside) 10.242.145.242 172.16.35.160 netmask 255.255.255.255 
static (DMZ,outside) 10.242.145.243 172.16.35.159 netmask 255.255.255.255 dns 
static (DMZ,outside) 10.242.145.244 172.16.35.13 netmask 255.255.255.255 
static (DMZ,inside) 10.242.145.227 172.16.35.50 netmask 255.255.255.255 
static (DMZ,inside) 10.242.145.229 172.16.35.60 netmask 255.255.255.255 
access-group inside_access_in in interface inside
access-group out_in in interface outside
access-group DMZ_access_in in interface DMZ
!
router eigrp 200
 network SD-HQ 255.0.0.0
 passive-interface default
 no passive-interface inside
!
route outside 0.0.0.0 0.0.0.0 10.242.145.129 1
route inside SD-HQ 255.0.0.0 10.91.1.1 1
route inside 192.168.80.0 255.255.255.0 10.91.1.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL 
aaa authentication enable console LOCAL 
http server enable
http SD-HQ 255.0.0.0 inside
http 10.80.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac 
crypto ipsec transform-set ESP-AES-128-MD5-TRANS mode transport
crypto ipsec transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-AES-192-MD5-TRANS mode transport
crypto ipsec transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-AES-256-MD5-TRANS mode transport
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac 
crypto ipsec transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-MD5-TRANS mode transport
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac 
crypto ipsec transform-set ESP-DES-MD5-TRANS mode transport
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh SD-HQ 255.0.0.0 inside
ssh timeout 60
console timeout 0

threat-detection basic-threat
threat-detection statistics
threat-detection statistics host number-of-rate 3
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 10.90.1.50 source inside prefer
webvpn
username 
username 
!
class-map inspection_default
 match default-inspection-traffic
!             
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect netbios 
  inspect tftp 
  inspect icmp 
  inspect pptp 
  inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily

: end

Hi Ryan,

I reviewed the configuration and i could see that you have configured the wrong Access-list on Outside interfaces. This wrong access-list does not have your traffic allowed from outside.

Wrong access-list :

access-list out_in extended permit tcp any object-group DM_INLINE_NETWORK_23 log disable 

access-group out_in in interface outside

Correct access-list which needs to be configured:

access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_TCP_7 log disable

access-group outside_access_in in interface outside

 

Please let me know if this works.

Regards,

Akshay Rastogi

So, I never saved my config so I just reloaded the firewall to get it back to where it was.  After that, all I ended up putting in it were the two nat statements:

 

static (DMZ,inside) 10.242.145.229 172.16.35.60 netmask 255.255.255.255 
static (DMZ,inside) 10.242.145.227 172.16.35.50 netmask 255.255.255.255

 

and it works.  I think the existing ACL you pointed out

 

access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_TCP_7 log disable

object-group service DM_INLINE_TCP_3 tcp
 port-object eq www
 port-object eq https
object-group network DM_INLINE_NETWORK_4
 network-object host 10.242.145.227
 network-object host 10.242.145.228
 network-object host 10.242.145.229
 network-object host 10.242.145.240
 network-object host 10.242.145.241
 network-object host 10.242.145.243

already covers what I was trying to do so I didn't have to change that at all.  Now everything seems to work the way I want it.

I guess beyond this my only question would be what does the line 

access-group outside_access_in in interface outside

that you wanted me to put in do?  I don't have it in now and it's working, so I'm just curious.

Thanks for all the help!

Hi Ryan,

I am glad this is working now. That command is a way to call the access-list on an interface. An access-list would not match traffic unless we call it on an specific interface.

Therefore when you configure that command, all source coming from Outside Interface for destination IP mentioned in object 'M_INLINE_NETWORK_4' for destination port mentioned in object group 'object-group DM_INLINE_TCP_7' would match that access-list and required action would be performed.

Please let me know if this answers your queries. If this answers your query, I would request you to select the appropriate response as the solution for this thread.

 

Regards,

Akshay Rastogi

Review Cisco Networking for a $25 gift card