11-21-2023 03:50 AM - edited 11-21-2023 04:11 AM
I am trying to configure the ASA to allow the Internal Network to access web service provided by DMZ web server which is on the DMZ network. Above is my network diagram.
In My ASA configuration.
Solved! Go to Solution.
11-21-2023 04:03 AM
@Beginnerrr try this:-
packet-tracer input inside tcp 192.168.20.4 1025 192.168.30.200 80
11-21-2023 04:24 AM
@Beginnerrr the packet-tracer output looks ok, it confirms no NAT and the ACL is working. Do the devices in the LAN and DMZ have the ASA IP address configured as the default gateway? Is there a local firewall enabled on the device in the DMZ?
How are you testing communication, by using a web browser to the IP address of the DMZ server or ping? If ping, then you need to explictly allow icmp replies or run the command fixup protocol icmp to enable icmp inspection.
11-21-2023 06:43 AM
@Beginnerrr for external network to access DMZ you would need a static NAT. (1-1 mapping). Typically, we use an address in the same subnet as the outside interface and translate the DMZ server IP to that address. You then also use an ACL to allow inbound traffic from outside to reach the DMZ server on the necessary listening port(s).
11-21-2023 03:55 AM
@Beginnerrr my initial guess is traffic is being NAT translated, do you have an NAT exemption rule in place to ensure traffic from the LAN to the DMZ is not unintentially translated?
You can run packet-tracer from the CLI to simulate the traffic flow from the LAN to the DMZ, provide the full output as this might provide a clue to the problem.
11-21-2023 03:59 AM
@Rob Ingram , I have not configured any NAT commands on this. How do I achieve this?
Could you please advise on how to run packet-tracer?
Can I ask if it is like this?
packet-tracer input internal tcp 192.168.20.4 1025 192.168.30.200 80?
11-21-2023 04:03 AM
@Beginnerrr try this:-
packet-tracer input inside tcp 192.168.20.4 1025 192.168.30.200 80
11-21-2023 04:16 AM
@Rob Ingram, here is the output.
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 2
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 192.168.30.200 using egress ifc dmz
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group internal_web_in in interface inside
access-list internal_web_in extended permit tcp object internal-network object dmz-server eq www
Additional Information:
Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type: QOS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: QOS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 9
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 10
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 1, packet dispatched to next module
Result:
input-interface: inside
input-status: up
input-line-status: up
output-interface: dmz
output-status: up
output-line-status: up
Action: allow
11-21-2023 04:24 AM
@Beginnerrr the packet-tracer output looks ok, it confirms no NAT and the ACL is working. Do the devices in the LAN and DMZ have the ASA IP address configured as the default gateway? Is there a local firewall enabled on the device in the DMZ?
How are you testing communication, by using a web browser to the IP address of the DMZ server or ping? If ping, then you need to explictly allow icmp replies or run the command fixup protocol icmp to enable icmp inspection.
11-21-2023 04:35 AM
Thank to your solution, I was able to find that the firewall is enabled on DMZ web server. I have disabled the firewall and the local LAN is able to access the DMZ.
May I kindly ask on how to configure NAT for this internal and DMZ?
Please advise.
11-21-2023 04:41 AM
@Beginnerrr what kind of NAT? Refer to this guide - http://www.practicalnetworking.net/stand-alone/cisco-asa-nat/
11-21-2023 06:10 AM - edited 11-21-2023 06:16 AM
I am configuring dynamic NAT but as far as I know that there is no need to configure NAT between DMZ and Internal.
but for external network to access DMZ there is a need to configure NAT? How to achieve this? Would it be something like this?
nat (dmz,outside) after-auto source dynamic any interface
11-21-2023 06:43 AM
@Beginnerrr for external network to access DMZ you would need a static NAT. (1-1 mapping). Typically, we use an address in the same subnet as the outside interface and translate the DMZ server IP to that address. You then also use an ACL to allow inbound traffic from outside to reach the DMZ server on the necessary listening port(s).
11-21-2023 04:01 AM - edited 11-21-2023 04:04 AM
Remove the access list you use and check again.
The security level of inside is 100 and it higher than dmz 70 so the traffic will allow without acl.
How internal dns the ip of web?
If you can use IP instead of web name in access.
11-21-2023 04:17 AM
but the Internal network is classified as 100 while DMZ is classified as 70 or 50. I refer to this number in Cisco Academy.
11-21-2023 05:23 AM
Yes that why I suggest removing acl.
11-21-2023 05:33 AM - edited 11-21-2023 06:12 AM
MHM
11-21-2023 04:25 AM
Are you trying to access the server via its IP address or via a FQDN?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide