02-06-2013 05:49 AM - edited 03-11-2019 05:56 PM
I have a cisco ASA configured for AnyConnect clients. I also want to pass 443 traffic back to an internal web server, but not sure if I can do this since the AnyConnect clients are already connecting over 443 to the ASA, right?
02-06-2013 06:17 AM
Hi,
You can change the port used for the AnyConnect. Also you can change the port visible to "outside" for the actual server though I would assume that not really a desirable solution in this case.
You could for example change the VPN port tcp/444 or something similiar.
If you try to do Port Forward / Static PAT using the "outside" interface and port TCP/443 you should get a warning like this
ERROR: NAT unable to reserve ports.
Then theres ofcourse option of getting an extra public IP address for the server. Though I'd assume this is out of the question in the current situation?
- Jouni
02-06-2013 06:20 AM
I do have a second public IP address available for use. Just not sure how to configure the ASA to use it.
02-06-2013 06:23 AM
Hi,
Whats the ASA software version you are using?
This can be shown with the command "show version" on the CLI. On the ASDM side it should be visible right on the main windows along other information on your device.
If you can provide the following information
- Jouni
02-06-2013 06:28 AM
Just to give you the basic configuration format for Static NAT and ACL rule to allow the traffic TCP/443
They would be the following for the different software levels
ASA Software 8.2 and below
static (inside,outside)
access-list OUTSIDE-IN permit tcp any host
access-group OUTSIDE-IN in interface outside
ASA Software 8.3 and after
object network WEB-SERVER
host
nat (inside,outside) static
access-list OUTSIDE-IN permit tcp any object WEB-SERVER eq 443
access-group OUTSIDE-IN in interface outside
The actual configuration format in both cases ofcourse depends on your current firewall configurations
- Jouni
02-06-2013 06:29 AM
ASA software version is 9.1(1)
Local IP is 192.168.100.145
Public IP let's say is 98.138.200.111
Source/Destination = inside, outside
Access-List = outside_access_in
02-06-2013 06:35 AM
Hi,
Configuration would in that case be
object network WEB-SERVER
host 192.168.100.145
nat (inside,outside) static 98.138.200.111 dns
access-list outside_access_in permit tcp any object WEB-SERVER eq 443
This should work unless there is some conflicting NAT rule etc.
The "object network" name can be anything you like. Doesnt naturally have to be the one above. Just used it for examples sake.
- Jouni
02-06-2013 06:37 AM
Thank you very much. I'll give it try and report back!
02-06-2013 06:37 AM
Also,
To test the NAT configuration you can use the "packet-tracer" command on the ASA CLI or ASDM
The CLI format for the command could be
packet-tracer input outside tcp 1.2.3.4 1234 98.138.200.111 443
This should give you a (possibly long) output of how ASA would handle such traffic if it entered the "outside" interface.
If the NAT configuration doesnt work, the above commands output should tell us where the problem is.
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide