12-06-2024 01:47 PM
Hi can someone please help troubleshoot our NAT configuration. I am able to ping Google directly from our ASA, however I cannot ping Google from a host located on the INSIDE2 interface (security level 100). We need to be able to reach smtp.office365.com. Please advise, the config is located below.
object network VPN_POOL
subnet 192.168.1.0 255.255.255.0
object network inside
subnet 172.31.0.0 255.255.0.0
access-list OUTSIDE_TO_IN extended permit ip object VPN_POOL any
access-list OUTSIDE_TO_IN extended permit tcp object VPN_POOL any
nat (INSIDE2,outside) source static any any destination static VPN_POOL VPN_POOL no-proxy-arp route-lookup
!
object network VPN_POOL
nat (outside,outside) dynamic interface
object network inside.
nat (inside,outside) dynamic interface
access-group OUTSIDE_TO_IN in interface outside
12-06-2024 01:56 PM
Best way to track down the problem on this case is running Packet-tracer. It will give you if NAT or ACL is the problem.
packet-tracer input outside tcp <INSIDE2 > 1234 <smtp.office365.com> 25
12-06-2024 05:40 PM
nat (inside2,outside) dynamic interface
That only what you need
MHM
12-09-2024 11:54 AM
I have other NAT statements listed below configured. If I add the NAT statement as you suggested will it effect/override the other NAT statement that are currently being translated/untranslated?
KYD-EDI-asa1# sh run nat
nat (inside2,outside) source static any any destination static VPN_POOL VPN_POOL no-proxy-arp route-lookup
!
object network VPN_POOL
nat (outside,outside) dynamic interface
object network inside
nat (inside,outside) dynamic interface
12-09-2024 11:19 PM
To make Me take review of your network
nat (inside2,outside) source static any any destination static VPN_POOL VPN_POOL no-proxy-arp route-lookup <<- this for VPN traffic?
!
object network VPN_POOL
nat (outside,outside) dynamic interface <<- this for RA VPN to access Internet ?
object network inside
nat (inside,outside) dynamic interface <<- this for Internal Host connect to inside interface of ASA ?
so what I suggest
object network inside2
nat (inside2,outside) dynamic interface <<- if above is correct then this NAT will not effect your traffic at all
for FQDN, internal Host connect to inside2 get IP from ASA (ASA work as local dhcp?)
if Yes what is the DNS host use ?
if
1- if DNS is 8.8.8.8 or 8.8.4.4 then you need to allow DNS traffic to pass via ASA
2- if DNS is ASA itself then you need to run dns domain-lookup
MHM
12-10-2024 07:52 AM
Yes we do have RA VPN which is setup and working, however the other NAT is configured but not enabled. The VPN pool object subnet is in the same subnet as the server that needs SMTP communication with the new NAT rule. Will this cause a conflict or should I put the server into another subnet or just create a new object with the same server subnet/host configuration?
12-10-2024 10:34 PM
Yes it will overlapping, why you config VPN Pool same subent as server connect to inside2 ?
MHM
12-09-2024 11:57 AM
Here are the results I couldn't use the FQDN so I used one of Microsoft's public IP's, do you think that could cause an issue not being able to use the FQDN?
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide