Commands to clear dynamic items when making config changes on ASA
Please forgive me if this is not a good section to ask this question. Last Friday i was making multiple changes to an ASA 5508, and had trouble with what i believe was a NAT issue. However, i had made several routing and interfaces changes at this time as well. I had full connectivity and 90% of what i wanted to do was working, but ended up rebooting all of the equipment to revert to their saved configurations, mainly because i found that the connected PC's were not taking the IP of the outside interface and instead reverting to the IP of one of the interfaces on the SD-WAN equipment we are using.
Part of my troubleshooting was to disable a bunch of NAT rules that i thought might be causing conflicts, effectively reducing the config to mirror what i know is working on the ASA we are moving some services from. After disabling the extra rules, i ran the "clear xlate" command, yet the IP of the PC's was still showing the SD-WANs IP.
Ive been looking through the running config from that day and have not been able to find why, after reducing the NAT rules to the known-working basics, confirming routing, and setting all access rules to allow any IP that night, why it still would not show the correct IP.
Aside form "clear xlate", are there some other commands i should be entering on the ASA, the 9300 series switches, or the PC's themselves, after making major configuration changes like this?
@Jesserony it's likely the traffic was unintentially translated by another NAT rule. In this instance you can run packet-tracer (CLI or ASDM) to simulate the traffic flow, this will indicate which NAT rule is being matched. You can then run "show nat detail" which will show the order of the NAT rules, you just need to ensure your new NAT rule is above the rule the traffic is matching.
Radius server configuration for 802.1X
Server radius test1
Address ipv4 10.1.1.1
Server radius test2
Address ipv4 10.1.1.2
aaa group server radius TEST-gr
server name test1
server name test2
Umbrella’s cloud-delivered firewall (CDFW) is a cool features that provides Firewall Services in the Cisco Umbrella Cloud without the need to deploy on-premises firewall devices and visibility and control for internet traffic across all branch offices. To...
SymptomsDownloadable ACL (dACL) does not take effect on the IOS-XE Network Access DevicesDiagnosisCreating redirection ACL on the IOS-XE device failed to redirect the specified traffic for captive portal redirectionSolutionEnable device tracking, Below is...
Multiple Cisco Security Technologies in a single book : ASA Firepower, WSA, Umbrella, ISE and VPN with 100 percent 100 practical scenarios with 70 Labs to cover important topics of the Cisco SCOR Exam. The best part is ISE with interesting scenarios wi...