12-15-2010 02:54 PM - edited 03-11-2019 12:22 PM
Hi all,
I have a Cisco ASA 5510 with BASIC Configurations but I can't access internet from the inside interface.
I can ping internet servers from Outside interface but can't ping or browse from the inside.
Below is the basic configuration
Please Urgent help is needed.
It looks like an access-list is required but where?
ASA Version 7.0(8)
!
hostname ZEPASA
domain-name zep-re.com
enable password UF9SYkZdBRjBresV encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
dns-guard
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address x.x.49.37 255.255.255.0
!
interface Ethernet0/1
nameif Inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 10.10.10.1 255.255.255.0
management-only
!
ftp mode passive
same-security-traffic permit inter-interface
pager lines 24
logging asdm informational
mtu Outside 1500
mtu Inside 1500
mtu management 1500
no failover
asdm image disk0:/asdm-508.bin
no asdm history enable
arp timeout 14400
global (Outside) 10 interface
nat (Inside) 10 192.168.1.0 255.255.255.0
route Outside 0.0.0.0 0.0.0.0 x.x.49.33 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
Solved! Go to Solution.
12-15-2010 04:16 PM
As advised earlier, please enable ICMP inspection.
Assuming that you already have global_policy assigned to service-policy:
policy-map global_policy
class inspection_default
inspect icmp
12-16-2010 12:39 AM
You have not applied the global_policy to the service-policy yet.
Please kindly configure the following:
service-policy global_policy global
12-15-2010 03:18 PM
If you don't have any ACL applied to inside interface, you do not need to have any as by default traffic from high security level to low security level is allowed by default.
Just making sure that your inside host is in the same subnet as the ASA inside interface 192.168.1.0/24, and default gateway is 192.168.1.1.
DNS resolution works fine from the inside?
And for ping, please configure "inspect icmp" on your global policy map.
You might want to perform packet capture to see where the traffic is failing.
12-15-2010 03:34 PM
Hi Jennifer
Thanks for the response. DNS works fine from the inside, on the inside PC am using google's DNS server 8.8.8.8..
The default GW of the inside network is 192.168.1.1 and they are on the same subnet which is the inside of the ASA
12-15-2010 03:38 PM
If you are using Google DNS server, that means that you have connectivity to the Internet through the ASA.
What is not working at the moment?
12-15-2010 04:05 PM
DNS settings is on the NIC of the pc that am using to browse.I can't browse and can't ping through the ASA.
Below is the packet capture.
Even though it says the icmp request was denied by an ACL, i don't have any access-list configured on the ASA
\
ZEPASA# packet-tracer input inside icmp 192.168.1.1 0 0 1025 4.2.2.2 detailed
Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 Outside
Phase: 3
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0xa7355a68, priority=500, domain=permit, deny=true
hits=2, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=192.168.1.1, mask=255.255.255.255, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Result:
input-interface: Inside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
ZEPASA# sh acc
ZEPASA# sh access-list
access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)
alert-interval 300
ZEPASA# packet-tracer input inside icmp 192.168.1.1 0 0 1025 4.2.2.2 detailed
Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 Outside
Phase: 3
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0xa7355a68, priority=500, domain=permit, deny=true
hits=3, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=192.168.1.1, mask=255.255.255.255, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Result:
input-interface: Inside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
12-15-2010 04:16 PM
As advised earlier, please enable ICMP inspection.
Assuming that you already have global_policy assigned to service-policy:
policy-map global_policy
class inspection_default
inspect icmp
12-15-2010 04:48 PM
Hi
The traffic is still been droped after enabling icmp inspection
ZEPASA# packet-tracer input inside icmp 192.168.1.2 0 0 1025 4.2.2.2
Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 Outside
Phase: 3
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 4
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map inspection_default
match default-inspection-traffic
policy-map global_policy
class inspection_default
inspect icmp
service-policy global_policy global
Additional Information:
Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type: NAT
Subtype:
Result: DROP
Config:
nat (Inside) 10 0.0.0.0 0.0.0.0
match ip Inside any Outside any
dynamic translation to pool 10 (41.206.49.37 [Interface PAT])
translate_hits = 2, untranslate_hits = 0
Additional Information:
Result:
input-interface: Inside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
12-15-2010 05:10 PM
Can you please perform "clear xlate", seems that you have changed the NAT configuration, and didn't clear xlate after the changes.
12-15-2010 05:22 PM
I have just done that but still unable to ping or browse
12-15-2010 10:01 PM
Does anybody has any idea why i can't ping ,telnet or browse through the ASA with the simple configuration?
Please kindly help.
No traffic from inside is passing to outside.
Below is my current running config
ASA Version 8.0(4)
!
hostname ZEPASA
domain-name zep-re.com
enable password UF9SYkZdBRjBresV encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
dns-guard
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address xx.xx.49.37 255.255.255.248
!
interface Ethernet0/1
nameif Inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 10.10.10.1 255.255.255.0
management-only
!
ftp mode passive
dns domain-lookup Outside
dns server-group DefaultDNS
name-server 8.8.8.8
domain-name zep-re.com
same-security-traffic permit inter-interface
pager lines 24
logging asdm informational
mtu Outside 1500
mtu Inside 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any Outside
asdm image disk0:/asdm-508.bin
no asdm history enable
arp timeout 14400
global (Outside) 10 interface
nat (Inside) 10 0.0.0.0 0.0.0.0
route Outside 0.0.0.0 0.0.0.0 xx.xx.49.33 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authorization command LOCAL
http server enable
http 192.168.0.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet xx.xxx.xxx.xxx 255.255.255.255 Outside
telnet timeout 10
ssh xxx.xxx.xxx.xxx 255.255.255.255 Outside
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
username password gbRIHmn1dUfWvHUp encrypted privilege 15
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns migrated_dns_map_1
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns migrated_dns_map_1
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect icmp
!
prompt hostname context
Cryptochecksum:4e1b73290ca0598c2170c852d5a9d4cb
: end
ZEPASA#
Packet-trace Output
ZEPASA# packet-tracer input inside icmp 192.168.1.4 0 8 3000 8.8.8.8 detailed
Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 Outside
Phase: 3
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xa7348eb8, priority=0, domain=permit-ip-option, deny=true
hits=6, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 4
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map inspection_default
match default-inspection-traffic
policy-map global_policy
class inspection_default
inspect icmp
service-policy global_policy global
Additional Information:
Forward Flow based lookup yields rule:
in id=0xa779e938, priority=70, domain=inspect-icmp, deny=false
hits=3, user_data=0xa779e3c8, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xa73481c8, priority=66, domain=inspect-icmp-error, deny=false
hits=3, user_data=0xa73480f8, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 6
Type: NAT
Subtype:
Result: DROP
Config:
nat (Inside) 10 0.0.0.0 0.0.0.0
match ip Inside any Outside any
dynamic translation to pool 10 (xx.xx.49.37 [Interface PAT])
translate_hits = 7, untranslate_hits = 0
Additional Information:
Forward Flow based lookup yields rule:
in id=0xa738cf38, priority=1, domain=nat, deny=false
hits=6, user_data=0xa736f650, cs_id=0x0, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Result:
input-interface: Inside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
Thanks
Message was edited by: Randy Oppong
12-16-2010 12:39 AM
You have not applied the global_policy to the service-policy yet.
Please kindly configure the following:
service-policy global_policy global
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide