cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
612
Views
0
Helpful
1
Replies

ASA nat dropping packet on inside "intra-internface"

fredj1234
Level 1
Level 1

Hi,

I'm trying to ping an IP on the subnet I've created 10.1.101.1/24 from network 10.0.0.0/16. I've pasted in output from packet tracer below.

Am I missing something? I don't have any ACL's applied to all interfaces.

ASA# packet-tracer input inside icmp 10.0.0.10 8 0 10.1.101.1

Phase: 1

Type: FLOW-LOOKUP

Subtype:

Result: ALLOW

Config:

Additional Information:

Found no matching flow, creating a new flow

Phase: 2

Type: ROUTE-LOOKUP

Subtype: input

Result: ALLOW

Config:

Additional Information:

in 10.1.101.0 255.255.255.0 inside

Phase: 3

Type: ACCESS-LIST

Subtype:

Result: ALLOW

Config:

Implicit Rule

Additional Information:

Phase: 4

Type: IP-OPTIONS

Subtype:

Result: ALLOW

Config:

Additional Information:

Phase: 5

Type: INSPECT

Subtype: np-inspect

Result: ALLOW

Config:

class-map inspection_default

match default-inspection-traffic

policy-map global_policy

class inspection_default

inspect icmp

service-policy global_policy global

Additional Information:

Phase: 6

Type: INSPECT

Subtype: np-inspect

Result: ALLOW

Config:

Additional Information:

Phase: 7

Type: SSM-DIVERT

Subtype:

Result: ALLOW

Config:

Additional Information:

Phase: 8

Type: NAT

Subtype:

Result: DROP

Config:

nat (inside) 10 access-list nat

match ip inside 10.0.0.0 255.255.0.0 inside any

dynamic translation to pool 10 (No matching global)

translate_hits = 1, untranslate_hits = 0

Additional Information:

Result:

input-interface: inside

input-status: up

input-line-status: up

output-interface: inside

output-status: up

output-line-status: up

Action: drop

Drop-reason: (acl-drop) Flow is denied by configured rule

ASA#

1 Reply 1

fredj1234
Level 1
Level 1

Hi,

I figured it out! Needed bidirectional nonat ACL.

Review Cisco Networking for a $25 gift card