cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
315
Views
0
Helpful
2
Replies

Can't access port mapping other than ASA interface addresses

weiyong wu
Level 1
Level 1

sho ver

Cisco Adaptive Security Appliance Software Version 9.1(6)10
Device Manager Version 7.5(2)

Compiled on Fri 11-Sep-15 16:44 PDT by builders
System image file is "disk0:/asa916-10-smp-k8.bin"
Config file at boot was "startup-config"

ASA5512 up 9 days 1 hour

Hardware: ASA5512, 4096 MB RAM, CPU Clarkdale 2793 MHz, 1 CPU (2 cores)
ASA: 2048 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 4096MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB

Encryption hardware device : Cisco ASA-55xx on-board accelerator (revision 0x1)
Boot microcode : CNPx-MC-BOOT-2.00
SSL/IKE microcode : CNPx-MC-SSL-PLUS-0020-B1
IPSec microcode : CNPx-MC-IPSEC-MAIN-0026
Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4


0: Int: Internal-Data0/0 : address is 64f6.9dc2.e1a2, irq 11
1: Ext: GigabitEthernet0/0 : address is 64f6.9dc2.e1a6, irq 10
2: Ext: GigabitEthernet0/1 : address is 64f6.9dc2.e1a3, irq 10
3: Ext: GigabitEthernet0/2 : address is 64f6.9dc2.e1a7, irq 5
4: Ext: GigabitEthernet0/3 : address is 64f6.9dc2.e1a4, irq 5
5: Ext: GigabitEthernet0/4 : address is 64f6.9dc2.e1a8, irq 10
6: Ext: GigabitEthernet0/5 : address is 64f6.9dc2.e1a5, irq 10
7: Int: Internal-Data0/1 : address is 0000.0001.0002, irq 0
8: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
9: Int: Internal-Data0/2 : address is 0000.0001.0003, irq 0
10: Ext: Management0/0 : address is 64f6.9dc2.e1a2, irq 0

Licensed features for this platform:
Maximum Physical Interfaces : Unlimited perpetual
Maximum VLANs : 50 perpetual
Inside Hosts : Unlimited perpetual
Failover : Disabled perpetual
Encryption-DES : Enabled perpetual
Encryption-3DES-AES : Enabled perpetual
Security Contexts : 0 perpetual
GTP/GPRS : Disabled perpetual
AnyConnect Premium Peers : 2 perpetual
AnyConnect Essentials : Disabled perpetual
Other VPN Peers : 250 perpetual
Total VPN Peers : 250 perpetual
Shared License : Disabled perpetual
AnyConnect for Mobile : Disabled perpetual
AnyConnect for Cisco VPN Phone : Disabled perpetual
Advanced Endpoint Assessment : Disabled perpetual
UC Phone Proxy Sessions : 2 perpetual
Total UC Proxy Sessions : 2 perpetual
Botnet Traffic Filter : Disabled perpetual
Intercompany Media Engine : Disabled perpetual
IPS Module : Disabled perpetual
Cluster : Disabled perpetual

This platform has a Base license.

Can't access port mapping other than ASA interface addresses,why?

Roughly configured as follows
=============================================
!
interface GigabitEthernet0/0
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/1
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/2
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3
no nameif
no security-level
no ip address
!
interface Redundant1
member-interface GigabitEthernet0/0
member-interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 101.1.1.2 255.255.255.248
!
interface Redundant2
member-interface GigabitEthernet0/2
member-interface GigabitEthernet0/3
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.252
!
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
!
object network TO-INTERNET
subnet 192.168.0.0 255.255.0.0
object network test
host 192.168.0.1
!
access-list acl extended permit ip any any
access-list acl extended permit tcp any any
access-list acl extended permit icmp any any
access-list acl extended permit udp any any
!
icmp permit any outside
icmp permit any inside
!
object network TO-INTERNET
nat (inside,outside) dynamic interface
object network test
nat (inside,outside) static 101.1.1.3
!
access-group acl in interface outside
access-group acl in interface inside
route outside 0.0.0.0 0.0.0.0 101.1.1.1
route inside 192.168.0.0 255.255.0.0 10.1.1.2
!

if i change
object network test
nat (inside,outside) static 101.1.1.3
to
object network test
nat (inside,outside) static interface service tcp 23 23

i can access service 23,why?

2 Replies 2

Syed Taukir
Level 1
Level 1

Hi

Can you go to the non-working config and take packet trace

packet-tracer input outside tcp 1.1.1.1 12345 101.1.1.3 23 detail

Also initiate a request and take a capture

capture capin interface outside ip any host 101.1.1.3

capture capout  interface inside ip any host 192.168.0.1

show capture capin

show capture capout

Please send the outputs.

Boris Uskov
Level 4
Level 4

Also, please, send the output of the command:
show running-config all sysopt 

I'd like to see if "no sysopt noproxyarp outside" is configured.

Review Cisco Networking products for a $25 gift card