07-27-2012 04:55 AM - edited 03-11-2019 04:35 PM
Hi,
I have CISCO 5510 firewall running with IOS ASA821-k8.bin.
My company has purchased another ASA5510 with IOS ASA843-k8.bin
We need to run both firewalls in Active/Standby mode.
If I upgrade the IOS of old firewall to ASA843-k8.bin the the running configurations does not work properly
It does not pick the network objects and NAT rules as they are configured with OLD IOS and running.
Or if I restore the configurations of old firewall at New ASA the result is worst. Even firewall with new IOS does not show any Access Rule and NAT rule and does not supprt network objects
Any help to solve this issue
Thanks
07-27-2012 09:40 AM
Hi,
The versions are different and the configs ar different.
You search google with the keywords cisco 8.3 asa youtube.
You will get a video showing the steps to configure in ver 8.3.
Sent from Cisco Technical Support Android App
Pls rate useful posts.
07-27-2012 10:22 PM
Hi Mahmood,
Either you can make your bothe ASA's running in ASA 8.25 OS or Upgrade to 8.4.3 OS.
If you make 8.25 then you will not have much congiguration changes. But if you make it in to 8.4 there are few changes es[ecially with the NAT rules.
Static NAT/PAT
Pre-8.3 NAT | 8.3 NAT |
Regular Static NAT static (inside,outside) 192.168.100.100 10.1.1.6 netmask 255.255.255.255 | object network obj-10.1.1.6 |
Regular Static PAT static (inside,outside) tcp 192.168.100.100 80 10.1.1.16 8080 netmask 255.255.255.255 | object network obj-10.1.1.16 |
Static Policy NAT access-list NET1 permit ip host 10.1.2.27 10.76.5.0 255.255.255.224 static (inside,outside) 192.168.100.100 access-list NET1 | object network obj-10.1.2.27 host 10.1.2.27 |
Pre-8.3 NAT | 8.3 NAT |
Regular Dynamic PAT nat (inside) 1 192.168.1.0 255.255.255.0 | object network obj-192.168.1.0 |
Regular Dynamic PAT nat (inside) 1 10.1.2.0 255.255.255.0
| object network obj-10.1.2.0 |
Regular Dynamic PAT-3 nat (inside) 1 0 0 | object network obj_any |
Dynamic Policy NAT object-group network og-net-src | object network obj-192.168.100.100 |
Policy Dynamic NAT (with multiple ACEs) access-list ACL_NAT permit ip 172.29.0.0 255.255.0.0 | object network obj-172.29.0.0 object network obj-192.168.2.0 object network obj-192.168.3.0 object network obj-192.168.4.0 nat (inside,outside) source dynamic obj-172.29.0.0 obj-192.168.100.100 |
Outside NAT global (inside) 1 10.1.2.30-1-10.1.2.40 | object network obj-10.1.2.27 |
NAT & Interface PAT together nat (inside) 1 10.1.2.0 255.255.255.0 | object network obj-192.168.100.100_192.168.100.200 |
NAT & Interface PAT with additional PAT together nat (inside) 1 10.0.0.0 255.0.0.0 global (outside) 1 192.168.100.1-192.168.100.200 global (outside) 1 interface global (outside) 1 192.168.100.210 | object network obj-192.168.100.100_192.168.100.200 |
Static NAT for a Range of Ports Not Possible - Need to write multiple Statements or perform a Static one-to-one NAT | (in) (out) 10.1.1.1-------ASA----- --xlate-------> 10.2.2.2 Original Ports: 10000 - 10010 Translated ports: 20000 - 20010
service tcp source range 10000 10010
service tcp source range 20000 20010
host 10.1.1.1 object network server-xlate host 10.2.2.2
|
76551 Views
This you need to take care. So that there will not be any issues.
Please do rate for the helpful posts.
By
Karthik
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide