cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1548
Views
0
Helpful
1
Replies

Cisco ASA 5505 Base License - not inter-vlan-routing no internet access from inside interface

Rrv_ricardo
Level 1
Level 1

Hello everyone

I setup the ASA nice in my lab after i test the config for outside in (dhcp y static ip) but after I installed and configure with the public IP address I can't go outside or cominicate using inter vlan-routing but I can ping and access to the outside interface using my internet.


I have tried many thins on the forums and read a lot but i does no find the solution.

Maybe the problem is the licence because I have not trunk to make the L3 communication works and vlan1 and vlan 2 be able to communicate.

Waiting for your answers.

here the output from my pings

ping

Interface: inside

Target IP address: 10.0.0.1

Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms

ASA5505# ping

Interface: outside

Target IP address: 66.XX.XX.174

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 66.98.50.174, timeout is 2 seconds:

!!!!!

Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms

ASA5505# ping

Interface: inside

Target IP address: 66.98.50.174

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 66.98.50.174, timeout is 2 seconds:

?????

Success rate is 0 percent (0/5)

ASA5505# ping

Interface: outside

Target IP address: 10.0.0.1

Type escape sequence to abort.

Sending 5, 100-byte ICMP Echos to 10.0.0.1, timeout is 2 seconds:

?????

Success rate is 0 percent (0/5)

So inter-vlan routing is not wowrking after I have to use the followings commands to see if there any change but not results

same-security-traffic permit inter-interface

same-security-traffic permit intra-interface

policy-map global_policy

class inspection_default

inspect icmp

exit

exit

service-policy global_policy global



Here it is the output from the config.

ASA Version 8.2(5)

!

hostname ASA5505

enable password XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX encrypted

passwd XXXXXXXXXXXXXXXX.XXXXXXXXXXXXXXXXXXXXXXXXX encrypted

names

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

ip address 10.0.0.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 66.XX.XX.174 255.255.255.248

!

ftp mode passive

pager lines 24

mtu inside 1500

mtu outside 1500

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

global (outside) 10 interface

nat (inside) 10 10.0.0.0 255.255.255.0

route outside 0.0.0.0 0.0.0.0 66.XX.XX.169 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication ssh console LOCAL

aaa authentication http console LOCAL

http server enable

http 0.0.0.0 0.0.0.0 outside

http 10.0.0.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

telnet timeout 5

ssh 10.0.0.0 255.255.255.0 inside

ssh 0.0.0.0 0.0.0.0 outside

ssh timeout 5

console timeout 0

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

username XXXX password XXXXXXXXXX encrypted privilege 15

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect ip-options

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny

  inspect esmtp

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip

  inspect xdmcp

!

service-policy global_policy global

prompt hostname context

no call-home reporting anonymous

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:0c8a226f7c4a8d5a03e6fcd821893898

: end

1 Reply 1

Anthony.Herman
Level 1
Level 1

What you are describing is normal behavior...

Review Cisco Networking products for a $25 gift card