10-09-2019 02:55 AM - edited 10-09-2019 03:16 AM
We are configured Cisco ASA firewall with three network , One Router and a Switch.
One Anti-Virus server are used for antivirus server updated, IP 124.124.124.2 which is connected to Campus Router
*Campus Router Cisco 1841 Interface
Gig0/1 = 124.124.124.1
Gig0/0 = 123.123.123.1
*Cisco ASA 5506 interface
Gig 0/1 (Inside=10.10.10.1 /24)
Gig 0/3 (DMZ = 172.16.1.0/24)
Gig 0/8 (Outside =123.123.123.0/24)
All lasted AntiVirus definition update package are download Server (124.124.124.2) and it is send to DMZ server 172.16.1.100.
All internal endpoint are ping to DMZ server as well as 124.124.124.2 server
DMZ server 172.16.1.100 are ping to internal network as well as 124.124.124.2 server.
But when I ping Update server 124.124.124.2 to DMZ server 172.16.1.100 , Not able to ping
===================Campus Router 1841 Configuration=============
interface GigabitEthernet0/1
IP address 124.124.124.1 255.255.255.0
interface GigabitEthernet1/1
IP address 123.123.123.1 255.255.255.0
Router ospf 1
network 124.124.124.0 255.255.255.0 area 0
network 123.123.123.0 255.255.255.0 area 0
==================ASA 5506 Configuration=====================
interface GigabitEthernet1/1
nameif inside
security-level 100
ip address 10.10.10.1 255.255.255.0
!
interface GigabitEthernet1/8
nameif outside
security-level 0
ip address 123.123.X.X 255.255.255.0
!
object network LAN
subnet 10.10.10.0 255.255.255.0
nat (inside,outside) dynamic interface
object network VLAN-2
subnet 10.20.10.0 255.255.255.0
nat (inside,outside) dynamic interface
object network VLAN-3
subnet 10.30.10.0 255.255.255.0
nat (inside,outside) dynamic interface
object network VLAN-4
subnet 10.40.10.0 255.255.255.0
nat (inside,outside) dynamic interface
!
route outside 0.0.0.0 0.0.0.0 123.123.X.1
!
access-list in-to-internet extended permit ip any any
access-list in-to-internet extended permit icmp any any
!
access-group in-to-internet in interface outside
access-group in-to-internet in interface dmz
!
class-map inspection-default
match default-inspection-traffic
!
policy-map global-policy
class inspection-default
inspect dns
inspect http
inspect icmp
!
service-policy global-policy global
10-09-2019 04:01 AM
10-09-2019 05:26 AM
As per security policy, internet are not allowed in Campus network. Every Morning , We will connect Anti-Virus (124.124.124.2) server to internet and download latest update file. Then Anti-Virus server should be connect to Campus_Router, and all endpoint system are automatically updated.
124.124.124.2 = Anti-Virus Server for latest package download and DMZ server 172.16.1.100 is Anti-Virus server.
**Anti-Virus Update Server 124.124.124.2 gateway is 124.124.124.1 (which is Campus Router IP)
** Router 1841 just configured interface and
Router ospf 1
Network 124.124.124.0 255.255.255.0 area 0
Network 123.123.123.0 255.255.255.0 area 0
***
Below detail will be share ASAP
Can you post "Show ip route" on the Router?
Output of the packet tracer "packet-tracer input OUTSIDE icmp 124.124.124.2 8 0 172.16.1.100 detailed
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide