09-27-2012 09:42 PM - edited 03-11-2019 05:00 PM
Hello,
I add the below configuration in our ASA config so I can use the ISP2 to browse the internet using port 80 & 443 only.
route ISP1 0 0 1.1.1.2 // Default route pointing to ISP1
route ISP2 0 0 2.2.2.2 2 // Default route with Metric 2 via ISP2
static (ISP2,inside) tcp 0.0.0.0 80 0.0.0.0 80
static (ISP2,inside) tcp 0.0.0.0 443 0.0.0.0 443
sysopt noproxyarp inside
nat (inside) 1 0 0
global (ISP1) 1 interface
global (ISP2) 1 interface
The above config works well BUT I have some problem, the USERS cannot access anymore the application servers in DMZ using port 80 & 443. Could it be the static NAT? Or do I need to add a new ACL for ISP 2?
I appreciate any feedback. Thank you.
09-27-2012 10:39 PM
Hello
It will be definitely to play with NAT andf ACL.
If you have a seperate public IP address to NAT the DMZ server, then you can do following
static (inside,ISP2) tcp
access-list outside_in extended permit tcp any host
access-group outside_in in interface outside
Now If you dont have seperate public IP and you do want to use ISP2 interface IP to forward the packet to inside then
static (inside,outside) tcp interface http
access-list outside_in extended permit tcp any interface outside eq 80
access-group outside_in in interface outside
do the same for port 443 as well
Please rate all helpful posts
Harish.
09-27-2012 11:07 PM
Hi Harish,
Thank you for your reply.
I don't have a separate public IP for the DMZ servers.
For your second recommendation, it didn't work. We have multiple servers with different IP's that needs http and https.
The static nat limits only to 1 server, but still didn't work.
Still trying to figure out here.
Restie
09-27-2012 11:16 PM
are your sevrs in DMZ or inside ? I was under imression that the servers are in inside, could you post the ASA configuration
?
09-27-2012 11:38 PM
all the servers are in DMZ. please see attched diagram in attachments.
I'm trying NAT exemption now as per Karsten.
Thank you Harish.
09-27-2012 11:43 PM
ok.. in that case that nat has to be constructed a sbelow
static (dmz,outside) tcp interface http
access-list outside_in extended permit tcp any interface outside eq 80
access-group outside_in in interface outside
but I think this is not possible if you have multiple servers with same service but possible with multiple servers with different service
for example 192.168.100.1 - FTP, 192.168.100.2 - SMTP etc...
Harish.
09-27-2012 11:03 PM
At least you need a translation-rule from the inside to the DMZ because you have a nat-statement on the inside interface. Have you tried to configure NAT-exemption for the insede->DMZ-traffic?
Sent from Cisco Technical Support iPad App
10-01-2012 10:58 PM
Hi Karsten,
Thank you for your reply. I added the below command.
access-list 110 permit ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.0.0
nat (inside) 0 access-list 110
But still i can't access the servers port 80 & 443.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide