06-07-2017
02:25 PM
- last edited on
03-25-2019
06:00 PM
by
ciscomoderator
I need a bit of a reality check here. I have a 5515x with two outbound connections. One interface is connected to an ISP. The other is connected to a stub network for testing. From inside networks, I can ping through, browse the web, etc using policy based routing to direct flow via the correct interface. However, I cannot connect to the firewall from outside using either icmp or port 443. I have an explicit rule on the interface to allow icmp and the interface is enabled for Anyconnect. Packet traces indicate that both icmp connections to port 443 should work. If I plug a laptop in outside the firewall, I can ping and telnet to port 443. The ISP claims it is not blocking ports or traffic. Regardless, I cannot connect. What could I be missing?
Thanks.
Solved! Go to Solution.
06-07-2017 05:07 PM
Hi
Can you share your config on text file (don't forget to remove all confidential stuff)?
Have you ran packet-tracer command? Can you share the output please?
The command should be :
Packet-tracer input outside icmp 8.8.8.8 8 0 ip-outside-asa
Saying what the cause of the issue is without more information is a bit difficult.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-08-2017 09:50 AM
PBR is not very useful in most uses cases for incoming Internet traffic. If you know the client source address sure you can use it. But this is not normally the case in most situations outside the lab or testbed.
06-07-2017 05:07 PM
Hi
Can you share your config on text file (don't forget to remove all confidential stuff)?
Have you ran packet-tracer command? Can you share the output please?
The command should be :
Packet-tracer input outside icmp 8.8.8.8 8 0 ip-outside-asa
Saying what the cause of the issue is without more information is a bit difficult.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-08-2017 09:41 AM
Thanks to both of you for the input.
It looks like it may be a routing issue of sorts after all. If I'm reading the output correctly, it's pushing the return packets out the external-ISP1 interface rather than external-ISP2 that the ICMP packets originally came in on. (default route is via External-ISP1) How do I make the replies go out the correct interface? Do I need another Policy Based Route? I'm trying to work through the flow logic.
5515x# packet-tracer input external-ISP2 icmp 8.8.8.8 0 0 10.90.7.12
Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 10.211.84.113 using egress ifc external-ISP1
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group External-ISP2_access_in in interface External-Integra
access-list External-ISP2_access_in extended permit icmp any any
Additional Information:
Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type: FLOW-EXPORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 2228722, packet dispatched to next module
Result:
input-interface: External-ISP2
input-status: up
input-line-status: up
output-interface: external-ISP1
output-status: up
output-line-status: up
Action: allow
06-08-2017 09:50 AM
PBR is not very useful in most uses cases for incoming Internet traffic. If you know the client source address sure you can use it. But this is not normally the case in most situations outside the lab or testbed.
06-08-2017 10:11 AM
Thank you for the input; that makes sense. Is there a viable way to host AnyConnect via an interface that is not used as the default route? We're not running any routing protocols, just static routes for internal traffic and next-hop to the ISP's so there is no dynamic routing done by our hardware. At this point, I'm thinking I may need to re-evaluate my plan.
06-08-2017 10:15 AM
SSL VPN (Anyconnect) is almost always served up on the default route interface.
You really cannot effectively do it with dual ISPs except in cases where one is essentially standby and you have an ip sla monitor to swing the default route to it when the primary fails.
Why do you not want to use the current primary ISP connection for SSL VPN?
06-08-2017 10:24 AM
I'm not vested in the idea of serving VPN via the second interface. I'm just trying to relieve some of the load off of the default route interface. I have a couple of other options for separating traffic and will go down that route instead. Simply moving a large enough portion of the outbound desktop/wifi traffic should suffice. With my newly acquired knowledge, seems like a simpler approach. :-)
Thanks again. I appreciate the help.
06-08-2017 10:29 AM
You're welcome.
Please let me know if you have any other questions.
06-08-2017 01:19 AM
It could be routing.
Also note that an "outside access-list in" ACL controls traffic THROUGH the ASA - not traffic TO the ASA.
06-08-2017 08:29 AM
I think routing is OK since internal clients can access outside web pages, etc.
06-08-2017 08:41 AM
Start a packet capture and try to connect. Share what you find here or with your ISP. That should eliminate conjecture.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide