03-28-2022 11:13 AM
Hi,
Have Cisco Firepower 1200 /ASDM and inside Ethernet 2 (inside) has 192.168.1.x IP address by default for the management purposes.
Question:
a) Is this port (Ethernet 2) and remaining other ports (Ethernet 3 - Ethernet
b) Can I leave Ethernet 2 (inside) as it is with it's default IP addressing scheme, or there is some other best practices?Firepower, Cisco Adaptive Security Appliance (ASA), Other Network Security Topics
c) How I can use Ethernet ports (3 -
Thanks!
03-29-2022 06:28 AM - edited 03-29-2022 06:29 AM
@Rob Ingram Thanks, see below. I was trying to ping 8.8.8.8 and even open a browser to see if I have internet access.
Have enabled ICMP Echo requests for IPv4 on both end-points.
ciscoasa# packet-tracer input Site-A_LAN-P3 tcp 192.168.11.10 3000 8.8.8.8 80
Result:
input-interface: Site-A_LAN-P3
input-status: up
input-line-status: up
Action: drop
Drop-reason: (no-route) No route to host, Drop-location: frame 0x0000562d87f3ff8e flow (NA)/NA
------------------------------------------------------------------------------------------------
ciscoasa# packet-tracer input Site-A_LAN-P4 tcp 192.168.12.10 3000 8.8.8.8 80
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Result:
input-interface: Site-A_LAN-P4
input-status: up
input-line-status: up
Action: drop
Drop-reason: (no-route) No route to host, Drop-location: frame 0x0000562d87f3ff8e flow (NA)/NA
03-29-2022 06:31 AM
@amh4y0001 Drop-reason: (no-route) No route to host - do you have a default route configured?
route outside 0 0 <next hop ip address>
03-29-2022 06:54 AM - edited 03-29-2022 06:57 AM
@Rob Ingram my bad, I have not configured the default route. However, I have configured now, but still no internet access.
ciscoasa# show nat detail
Auto NAT Policies (Section 2)
1 (Site-A_LAN-P3) to (outside) source dynamic Site-A_LAN-P3 interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 192.168.11.0/24, Translated: X.Y.Z.40/28
2 (Site-A_LAN-P4) to (outside) source dynamic Site-A_LAN-P4 interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 192.168.12.0/24, Translated: X.Y.Z.40/28
3 (any) to (outside) source dynamic obj_any interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: X.Y.Z.40/28
ciscoasa# packet-tracer input Site-A_LAN-P3 tcp 192.168.11.10 3000 8.8.8.8 80
Phase: 1
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop x.y.z.33 using egress ifc outside
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Result:
input-interface: Site-A_LAN-P3
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000562d87f37680 flow (NA)/NA
ciscoasa# packet-tracer input Site-A_LAN-P4 tcp 192.168.12.10 3000 8.8.8.8 80
Phase: 1
Type: INPUT-ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
Found next-hop x.y.z.33 using egress ifc outside
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Result:
input-interface: Site-A_LAN-P4
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame 0x0000562d87f37680 flow (NA)/NA
03-29-2022 06:59 AM
@amh4y0001 can you provide your full configuration, remove confidential information (change public IP addresses etc).
03-29-2022 07:07 AM - edited 03-29-2022 07:07 AM
@Rob Ingram do you mean contents of "show running-config"?
03-29-2022 07:09 AM
@amh4y0001 yes please
03-29-2022 07:18 AM - edited 03-29-2022 07:19 AM
Thanks and sorry for the botheration
I am new to ASA, see attached.
03-29-2022 07:23 AM
@amh4y0001 please can the security level of the outside interface
interface Ethernet1/1
nameif outside
security-level 0
then try connecting again
Ensure you can ping 8.8.8.8 from the ASA itself.
03-29-2022 07:30 AM
03-29-2022 07:32 AM
@amh4y0001 from the CLI just run the command "ping 8.8.8.8" and ensure you get a reply.
03-30-2022 01:17 AM
@Rob Ingram yes, successful PING from CLI.
However, on both endpoints, there is no internet (192.168.11.11 and 192.168.12.12)
03-30-2022 01:23 AM
@amh4y0001 I assume the endpoints have a default gateway of the ASA and they can at least ping their local default gateway address?
Can you repeat the packet-tracer commands again, provide the full output.
Also provide the output of "show nat detail" and the running configuration.
03-30-2022 01:29 AM
@Rob Ingram appreciate you reply here.
End points now have Internet access, after configuring the DNS manually on NIC to 8.8.8.8
YES: Local default gateway was accessible.
ciscoasa# show nat detail
Auto NAT Policies (Section 2)
1 (Site-A_LAN-P3) to (outside) source dynamic Site-A_LAN-P3 interface
translate_hits = 165, untranslate_hits = 261
Source - Origin: 192.168.11.0/24, Translated: x.y.z.40/28
2 (Site-A_LAN-P4) to (outside) source dynamic Site-A_LAN-P4 interface
translate_hits = 454, untranslate_hits = 8
Source - Origin: 192.168.12.0/24, Translated: x.y.z.40/28
3 (any) to (outside) source dynamic obj_any interface
translate_hits = 233, untranslate_hits = 1
Source - Origin: 0.0.0.0/0, Translated: x.y.z/28
03-30-2022 02:20 AM
@amh4y0001 ok, good to hear.
Optional, but you also may want an ACL from inside to outside to permit only the required access (http, https, dns etc).
You also may want to remove the other nat rule as it is redundant as you have the more specific rules
object network obj_any
no nat (any,outside) dynamic interface
03-30-2022 02:42 AM
@Rob Ingram Do you think it is worthy to start over with a fresh configuration?
Best practice is to define DNS for each interface or can define for multiple interfaces?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide