04-09-2021 01:56 AM
We currently have a working tunnel from one of our ASA's to AWS. As we can only have single subnets set in the tunnel due to AWS limitations, our NAT statements have quite wide ranging subnets to catch all the possible combinations.
We have one serer that is required to use the tunnel and now needs internet access.
This is where the issue comes, as soon as we add a specific static NAT for internet access, the AWS flow stops working.
So I am looking for a solution that allows for the tunnel to work and for the server to have just TCP/443 to the internet as well.
04-09-2021 02:11 AM
I assume that the rule you add is placed above the NAT exemption rule, so all traffic from that source is natted behind the ASAs interface IP address?
What NAT exemption rule do you have in place for AWS and what rule have you added that breaks the access to AWS.
Provide the output of "show nat detail".
04-09-2021 05:02 AM
If I have the Tom-DMZ NAT either before or after the 114 line, then the flow AWS to Tom-DMZ fails.
But if I have the Tom-DMZ NAT in the server on Tom-DMZ can get to the internet.
But only 1 ever works at a time
sh nat det | inc 10.0.0.0
114 (Inside) to (outside) source static NETWORK_OBJ_10.0.0.0_9 NETWORK_OBJ_10.0.0.0_9 destination static NETWORK_OBJ_10.x.x.0_21 NETWORK_OBJ_10.x.x.0_21 no-proxy-arp route-lookup
Source - Origin: 10.0.0.0/9, Translated: 10.0.0.0/9
# sh nat det | inc Tom-DMZ
121 (Tom-DMZ) to (outside) source dynamic Tom interface
04-09-2021 05:19 AM
You've got a different source interface in those 2 nat rules.
What is the source IP address of the server and which interface is it actually connected to
Run packet-tracer from CLI, when each of the NAT rules are configured, upload the output for review.
04-09-2021 06:25 AM - edited 04-09-2021 06:26 AM
you've got a different source interface in those 2 nat rules. The tunnel put the inside to outside one in. All interfaces start with 10.
What is the source IP address of the server and which interface is it actually connected to. This is on the Tom-DMZ 10.75.120.
Tom to AWS Tunnel
packet-tracer in Tom-DMZ tcp 10.75.120.xx https 10.150.xx.xx h$
Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop x.x.x.x using egress ifc outside
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group M-ENI-DMZ_access_in in interface Tom-DMZ
access-list M-ENI-DMZ_access_in extended permit object-group xxx-Standard-Internet-Outbound object xxxxxxx any
object-group service xxx-Standard-Internet-Outbound
description: xxx Standard Internet Outbound Ports
service-object tcp destination eq domain
service-object tcp destination eq ftp
service-object tcp destination eq ftp-data
service-object tcp destination eq www
service-object tcp destination eq https
service-object udp destination eq domain
service-object tcp destination eq ssh
Additional Information:
Phase: 3
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (Tom-DMZ,outside) source dynamic Tom interface
Additional Information:
Dynamic translate 10.75.120.xx/443 to xx.xx.xx.xx/48
Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type: FOVER
Subtype: standby-update
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: FLOW-EXPORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (Tom-DMZ,outside) source dynamic Tom interface
Additional Information:
Phase: 9
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 10
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 11
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 247200484, packet dispatched to next module
Result:
input-interface: Tom-DMZ
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow
Tom to Internet
packet-tracer in Tom-DMZ tcp 10.75.120.xx https 8.8.8.8 https
Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop xx.xx.xx.xx using egress ifc outside
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group M-ENI-DMZ_access_in in interface Tom-DMZ
access-list M-ENI-DMZ_access_in extended permit object-group xxx-Standard-Internet-Outbound object xxxxxxx any
object-group service xxx-Standard-Internet-Outbound
description: ISS Standard Internet Outbound Ports
service-object tcp destination eq domain
service-object tcp destination eq ftp
service-object tcp destination eq ftp-data
service-object tcp destination eq www
service-object tcp destination eq https
service-object udp destination eq domain
service-object tcp destination eq ssh
Additional Information:
Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: FOVER
Subtype: standby-update
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type: FLOW-EXPORT
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 247169104, packet dispatched to next module
Result:
input-interface: Tom-DMZ
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow
04-13-2021 01:55 AM - edited 04-13-2021 01:56 AM
Rob. I added two new NAT rules above the inside / outsite one that the Tunnel config had added.
Both Tom / Outside, first for the AWS traffic and the second for the Internet traffic.
All is good now, thanks for your input, it helped push me in the right direction
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide