08-17-2023 09:48 PM
Hi all,
We recently acquired a CISCO 1010 FTD running version 7.2.4.1-43 to replace our current ASA 5505.
The inside interface is configured as switchport trunk mode and associated with 5 different VLANs, everything is working fine, all devices connected to the switchport trunk interface in different VLANs are able to connect to the internet.
The issue started after configuring a Remote Access VPN, when the inside network is added in the accepted network under NAT exempt, devices to this network are not able to open any website. I am able to ping the url, and any external IP but browsing is not working while VPN client using Anyconnect can connect, browse internet and also can reach any device on the network that is specified in the accepted network under NAT exempt.
Hoping anyone can help.
Thank you,
Ivhanez12
08-17-2023 10:17 PM
The NAT exempt rule should only apply for inside networks to the RA VPN address pool.
Can you share a screenshot the NAT rule you added? (or "show running-config nat" output from the cli)
08-17-2023 11:35 PM - edited 08-17-2023 11:39 PM
Hi Marvin,
Thank you for your advice, here is the running NAT config:
firepower# show running-config nat
nat (inside,outside) source static NGFW-Remote-Access-VPN|natIpv4Grp NGFW-Remote-Access-VPN|natIpv4Grp destination static NGFW-Remote-Access-VPN|natIpv4PoolGrp NGFW-Remote-Access-VPN|natIpv4PoolGrp no-proxy-arp route-lookup
nat (inside,outside) source dynamic InsideNetwork interface
nat (wifi,outside) source static WiFiNetwork interface
nat (insideremote,outside) source static InsideRemoteNetwork interface
nat (dmz,outside) source static DMZNETWORK interface
nat (dvr,outside) source static DVRrange interface service _|NatOrigSvc_97c7413d-3785-11ee-80b2-f387e7d515a6 _|NatMappedSvc_97c7413d-3785-11ee-80b2-f387e7d515a6
nat (outside,outside) source dynamic VPN_IP_RANGE interface
firepower#
I also Attached the VPN profile.
I highlighted in RED the NAT exempt config wherein any network that I add in there are not able to browse any website.
connection is timing out.
08-18-2023 03:41 AM
Does FDM allow you to include your multiple inside interfaces? If not, you might just want to built NAT rules manually for each of the different protect VLANs using the NAT configuration vs. doing it under the RA VPN wizard. The wizards sometimes have limitations for more complex use cases.
08-18-2023 07:18 AM
Hi Marvin,
is it in the NAT exempt inside network section in the wizard? Yes it does allow me, however when I add them, they will not be able to browse any website,. but If I will not add them the VPN client will not be able to reach them.
08-24-2023 08:49 AM
Just an update on this issue, I remove all inside interfaces and re- add it back again the re-deploy the changes. At first it gives me a deployment failed message then there is an option for full deployment. After selecting the full deployment, the VPN are now working as expected. all devices connected to VLans in the inside interface can now browse any site.
Thank You!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide