10-05-2019 06:35 AM
We have configured total three VLAN . Internal vlan computer are reached at Cisco ASA internal interface IP address. mean I am able to ping internal IP address 10.100.100.1 from vlan 2 system (10.10.10.100) but not able to ping outside IP address from internal VLAN system.
Internal VLAN detail
VLAN 2 =10.10.10.0/24
VLAN 3 =10.20.10.0/24
VLAN 4 =10.30.10.0/24
10-05-2019 07:33 AM
10-05-2019 09:36 AM
You cannot ping an ASA interface which is not the ingress interface. So you can only ping the ASA interface on which the ICMP traffic enters.
10-07-2019 12:57 AM
I have Cisco ASA 5506 Firewall and total three Cisco 34XX Switch,
1) Cisco ASA interface Gig1/8 is connected to ISP Router , Cisco ASA 5506 interface Gig 1/1 is connected to Master switch interface Gig 0/1. and two more Tower switch Tower-1 and Tower-2 , both are connected to master switch
Cisco ASA interface Gig 1/8= IP Address 123.123.X.X /29
Cisco ASA Interface Gig1/1 = IP Address 10.10.10.1/24
Master Switch interface Gig 0/1 = IP Address 10.10.10.2/24
We are configured total three Internal VLAN detail
VLAN-2 =10.20.10.0/24
VLAN-3 =10.30.10.0/24
VLAN-4 =10.40.10.0/24
Inter-VLAN function are working properly, I can access Inter-VLAN environment properly.
I can access network from VLAN-2 computer IP address 10.20.10.1/24 to Cisco ASA interface IP address 10.10.10.1
I can access network from VLAN-2 computer IP address 10.20.10.1/24 to other computer IP address 10.30.10.1
I can't access from VLAN-2 computer IP address 10.20.10.1/24 to internet.
10-07-2019 01:13 AM - edited 10-07-2019 01:15 AM
Which ASA interface is in the 10.20.10.0/24 network? You only mention Gig1/1, Gig1/8 and Mgmt switch.
It would be helpful if you posted your full running configuration (remember to remove any public IPs, usernames and passwords).
10-08-2019 01:13 PM
All device configuration are share here
10-07-2019 01:32 AM
10-08-2019 12:54 PM
All device configuration are here
==========================Cisco ASA Firewall====================
ASA
interface GigabitEthernet1/1
nameif inside
security-level 100
ip address 10.10.10.1 255.255.255.0
!
interface GigabitEthernet1/8
nameif outside
security-level 0
ip address 123.123.123.2 255.255.255.0
!
object network LAN
subnet 10.10.10.0 255.255.255.0
!
route outside 0.0.0.0 0.0.0.0 123.123.123.1 1
!
access-list in-to-internet extended permit ip any any
access-list in-to-internet extended permit icmp any any
!
access-group in-to-internet in interface outside
access-group in-to-internet in interface dmz
object network LAN
nat (inside,outside) dynamic interface
!
class-map inspection-default
match default-inspection-traffic
!
policy-map global-policy
class inspection-default
inspect dns
inspect http
inspect icmp
!
service-policy global-policy global
!
==========================Master-Switch =====================
master
interface FastEthernet0/1
no switchport
ip address 10.10.10.2 255.255.255.0
!
interface FastEthernet0/24
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface range GigabitEthernet0/1-2
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface Vlan2
ip address 10.20.10.1 255.255.255.0
!
interface Vlan3
ip address 10.30.10.1 255.255.255.0
!
interface Vlan4
ip address 10.40.10.1 255.255.255.0
!
access-list 110 permit ip 10.20.10.0 0.0.0.255 any
access-list 110 permit udp 10.20.10.0 0.0.0.255 any
access-list 110 permit udp any eq bootps any
access-list 110 permit icmp 10.20.10.0 0.0.0.255 any
!
access-list 111 permit ip 10.30.10.0 0.0.0.255 any
access-list 111 permit udp 10.30.10.0 0.0.0.255 any
access-list 110 permit udp any eq bootps any
access-list 111 permit icmp 10.30.10.0 0.0.0.255 any
!
access-list 112 permit ip 10.40.10.0 0.0.0.255 any
access-list 112 permit udp 10.40.10.0 0.0.0.255 any
access-list 110 permit udp any eq bootps any
access-list 112 permit icmp 10.40.10.0 0.0.0.255 any
==========================Tower-Switch (Access Switch)=======================
interface range FastEthernet0/5-9
description 'For IT_Department'
switchport access vlan 2
switchport mode access
!
interface range FastEthernet0/10-14
description 'For Sale_Department'
switchport access vlan 3
switchport mode access
!
interface range FastEthernet0/15-19
description 'For Purchase_Department'
switchport access vlan 4
switchport mode access
!
interface range GigabitEthernet0/1-2
switchport trunk encapsulation dot1q
switchport mode trunk
!
10-08-2019 02:20 PM
If this is the full configuration of all your devices then you are missing a default route on the Master-Switch pointing to 10.10.10.1
You are also missing a NAT statment for the 10.20.10.0/24, 10.30.10.0/24 and 10.40.10.0/24 networks. The NAT statment you have only matches the 10.10.10.0/24 network. So on the ASA you need to add three more NAT statments. Or you can creat an object that matches on any IP (0.0.0.0 0.0.0.0) and create a NAT for that.
Config for ASA:
object network LAN
subnet 10.20.10.0 255.255.255.0
nat (inside,outside) dynamic interface
object network LAN
subnet 10.30.10.0 255.255.255.0
nat (inside,outside) dynamic interface
object network LAN
subnet 10.40.10.0 255.255.255.0
nat (inside,outside) dynamic interface
Configuration for Master-Switch:
ip route 0.0.0.0 0.0.0.0 10.10.10.1
10-09-2019 12:34 AM
10-10-2019 02:24 PM
All changes has been done but still facing problem
10-10-2019 11:08 PM
For testing purpose , I configure network environment into Cisco packet Tracer. Please find Attachment
Public IP address are changed into attached file.
Tested:-
1. InterVLAN are working fine.
2. LAN and DMZ are communicate properly.
3. DMZ AV server are ping to Live AV server properly.
problem is:
1. LAN network computer not able to communicate to Live AV server (124.124.124.2) . It is use for download AV package for update LAN computer.
2. Live AV server are not able to ping to DMZ server for daily AV update.
10-10-2019 11:33 PM
We need to see you full running configuration (remember to remove any public IPs, usernames and passwords).
Also I am unable to open the file you attached. Could you post it as a .pcap file please.
10-11-2019 12:45 AM
Hi,
Your configuration is good but you are using ASA 5506 in PT and It is having some bug with NAT. NAT is not working ASA 5506 in PT. You can use the same configuration on Cisco ASA 5505 and it will work.
We faced the same NAT issue on 5506 with many users.
10-11-2019 02:01 AM
Just testing purpose ,Configure into PT. Actually My network used ASA 5510. We are not able to solve my problem which is mention here
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide