07-18-2011 11:55 AM - edited 03-11-2019 02:00 PM
hi,
Please go thorugh my daigram. ip want to assign 10.34.249.34,10.34.249.35,10.34.249.36 ip address directly to servers and this server would be accesable from 20.20.20.20 HQ router.
and if server want to go to internet then it would use 192.168.100.1 bsnl access internet.
Please help me , i have not yet configured.
Please help me..
Regards
Pawan
07-18-2011 07:18 PM
Hi Pawan,
No issues with that, you would need the following config, let say e0/2 interface is named "juniper", then:
lets say you want to access the servers from there real ip only:
static (inside,juniper) 10.34.249.34 10.34.249.34
static (inside,juniper) 10.34.249.35 10.34.249.35
static (inside,juniper) 10.34.249.36 10.34.249.36
and for internet access:
nat (inside) 1 10.34.249.0 255.255.255.0
global (bsnl) 1 interface
thats it,
-Varun
07-18-2011 09:44 PM
Thnx sir.
please tell me, what will the gateway of server.
07-18-2011 09:55 PM
The gateway for the server would be the ASA inisde interface or if the switch is an L3 switch, it would be the switch interface.
Hope this helps
Thanks,
-Varun
07-18-2011 10:58 PM
Sir,
it is not working..
Server to juniper and juniper to server:shows request time out.
server to bsnl modem: show request time out.
please find the config below, and suggest me.
Thanks
pawan
!
interface Ethernet0
nameif outside
security-level 0
ip address 192.168.100.200 255.255.255.0
!
interface Ethernet1
nameif inside
security-level 100
ip address 192.168.5.1 255.255.255.0
!
interface Ethernet2
nameif juniper
security-level 0
ip address 10.34.249.50 255.255.255.0
!
interface Ethernet3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet4
shutdown
no nameif
no security-level
no ip address
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
access-list outside-in extended permit icmp any any
access-list outside-in extended permit ip any any
access-list 101 extended permit ip any host 10.34.249.35
pager lines 24
mtu outside 1500
mtu juniper 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 10.34.249.0 255.255.255.0
static (inside,juniper) 10.34.249.35 10.34.249.35 netmask 255.255.255.255
static (inside,juniper) 10.34.249.36 10.34.249.36 netmask 255.255.255.255
access-group outside-in in interface outside
access-group 101 in interface juniper
route outside 0.0.0.0 0.0.0.0 192.168.100.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
!
!
prompt hostname context
Cryptochecksum:00000000000000000000000000000000
: end
07-18-2011 11:34 PM
Take captures for both the traffics:
access-list cap permit ip host 10.34.249.35 host 192.168.100.1
access-list cap permit ip host 192.168.100.1 host 10.34.249.35
access-list cap permit ip host 192.168.100.1 host 192.168.100.200
access-list cap permit ip host 192.168.100.200 host 192.168.100.1
cap capo access-list cap interface outside
cap capin access-list cap interface inside
for server to inside:
add the following:
global (juniper) 1 interface
access-list 101 extended permit icmp any any
access-list cap1 permit ip host 10.34.249.35 host 20.20.20.20
access-list cap1 permit ip host 20.20.20.20 host 10.34.249.35
access-list cap1 permit ip host 10.34.249.50 host 20.20.20.20
access-list cap1 permit ip host 20.20.20.20 host 10.34.249.50
cap capjun access-list cap1 interface juniper
cap capi access-list cap1 interface inside
After doing this config, initiate pings and then collect these captures.
Check the logs on the ASA, why it is denying traffic.
https://supportforums.cisco.com/docs/DOC-17345#comment-8416
Thanks,
Varun
07-19-2011 12:01 AM
ASA# sh capture
capture cap type raw-data [Capturing - 0 bytes]
capture capo type raw-data access-list cap interface outside [Capturing - 0 bytes]
capture capin type raw-data access-list cap interface inside [Capturing - 0 bytes]
capture capjun type raw-data access-list cap1 interface juniper [Capturing - 0 bytes]
capture capi type raw-data access-list cap1 interface inside [Capturing - 0 bytes]
07-19-2011 12:10 AM
route are
ASA# route outside 0.0.0.0 0.0.0.0 192.168.100.1 1
Server# IP=10.34.249.35 DG gateway is: 192.168.5.1
juniper int 10.34.249.0 is directly connted to ASA e2 interface
07-19-2011 02:01 AM
Sir please help me.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide