09-27-2019 06:31 AM - edited 02-21-2020 09:31 AM
Hi guys!
I have ASA 5505. My configuration is:
interface Ethernet0/0
description WANPORT
!
interface Ethernet0/1
description DMZPORT
switchport access vlan 2
!
interface Ethernet0/2
shutdown
!
interface Ethernet0/3
description INSIDEPORT03
switchport access vlan 3
!
interface Ethernet0/4
description INSIDEPORT04
switchport access vlan 3
!
interface Ethernet0/5
description INSIDEPORT05
switchport access vlan 3
!
interface Ethernet0/6
description INSIDEPORT06
switchport access vlan 3
!
interface Ethernet0/7
description INSIDEPORT07
switchport access vlan 3
!
interface Vlan1
nameif outside
security-level 0
ip address 10.10.10.84 255.255.255.0
!
interface Vlan2
nameif dmz
security-level 50
ip address 10.17.19.254 255.255.255.0
!
interface Vlan3
nameif inside
security-level 100
ip address 10.17.20.254 255.255.255.0
!
dns domain-lookup outside
dns server-group DefaultDNS
domain-name blablabla.com
object network GW-PC
host 10.17.19.1
object network inside-subnet
subnet 10.17.20.0 255.255.255.0
object network dmz-subnet
subnet 10.17.19.0 255.255.255.0
access-list inside_acl extended permit tcp any object dmz-subnet
access-list inside_acl extended permit icmp any object dmz-subnet
access-list inside_acl extended permit udp any object dmz-subnet
access-list inside_acl extended permit ip any object dmz-subnet
access-list dmz_acl extended permit ip any any
access-list dmz_acl extended permit tcp any any
access-list dmz_acl extended permit udp any any
access-list dmz_acl extended permit icmp any any
access-list rdp_acl extended permit tcp any object GW-PC
object network GW-PC
nat (dmz,outside) static interface service tcp https https
object network dmz-subnet
nat (dmz,outside) dynamic interface
access-group rdp_acl in interface outside
access-group dmz_acl in interface dmz
access-group inside_acl in interface inside
route outside 0.0.0.0 0.0.0.0 10.10.10.1 1
Dmz-Outside connection works good. But In dmz-subnet located server GW-PC with ip address 10.17.99.1 and I need to open access to this server from PC 10.17.20.3 which located in inside-subnet. So, I created access list for this connection:
access-list inside_acl extended permit tcp any object dmz-subnet
access-list inside_acl extended permit icmp any object dmz-subnet
access-list inside_acl extended permit udp any object dmz-subnet
access-list inside_acl extended permit ip any object dmz-subnet
access-group inside_acl in interface inside
also access list for dmz-subnet
access-list dmz_acl extended permit ip any any
access-list dmz_acl extended permit tcp any any
access-list dmz_acl extended permit udp any any
access-list dmz_acl extended permit icmp any any
access-group dmz_acl in interface dmz
But I still can not ping GW-PC 10.17.99.1 from inside-subnet from this PC. Please help. Thank you!
Solved! Go to Solution.
09-27-2019 12:31 PM
Hi! You was right, I just added to the network adapter on my PC GATEWAY=10.17.20.254 (it was empty before) and now I can ping from PC (10.17.20.3/.255.255.0.0/10.17.20.254) the GW-PC (10.17.19.1/255.255.0.0/10.17.19.254). It is no need to add special ACL for connection inside -> dmz.
But now I have new problem. I cannot ping from GW_PC (10.17.19.1/255.255.0.0/10.17.19.254) in dmz _subnet the PC (10.17.20.3/.255.255.0.0/10.17.20.254) in inside_subnet. I have to connect GW-PC -> PC by RPD.
Guys how to allow RDP, TCP, UDP traffic from dmz_subnet to inside_subnet?
09-28-2019 07:39 AM
09-27-2019 07:40 AM
09-27-2019 11:59 AM - edited 09-27-2019 12:31 PM
09-27-2019 09:05 AM
You probably need NAT(inside,dmz) to communicate between Inside <-> DMZ .
Use packet-tracer to troubleshoot.
09-27-2019 09:19 AM
09-27-2019 12:31 PM
Hi! You was right, I just added to the network adapter on my PC GATEWAY=10.17.20.254 (it was empty before) and now I can ping from PC (10.17.20.3/.255.255.0.0/10.17.20.254) the GW-PC (10.17.19.1/255.255.0.0/10.17.19.254). It is no need to add special ACL for connection inside -> dmz.
But now I have new problem. I cannot ping from GW_PC (10.17.19.1/255.255.0.0/10.17.19.254) in dmz _subnet the PC (10.17.20.3/.255.255.0.0/10.17.20.254) in inside_subnet. I have to connect GW-PC -> PC by RPD.
Guys how to allow RDP, TCP, UDP traffic from dmz_subnet to inside_subnet?
09-27-2019 01:25 PM
Troubleshoot with packet tracer
packet-tracer input dmz _subnet tcp 10.17.19.1 123 10.17.20.1 443 detailed
post the output of the packet tracer
09-28-2019 01:26 AM
Guys, I added ACL rules to the ASA config
access-list dmz_acl extended permit ip host 10.17.19.1 host 10.17.20.3
access-list dmz_acl extended permit tcp host 10.17.19.1 host 10.17.20.3
access-list dmz_acl extended permit udp host 10.17.19.1 host 10.17.20.3
access-group dmz_acl in interface dmz
But I still cannot connect from 10.17.20.3 (dmz) to 10.17.19.1 (inside)
Trace log:
Lucky(cfg-call-home)# packet-tracer input dmz tcp 10.17.19.1 123 10.17.20.3 443 detailed
Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 10.17.20.0 255.255.255.0 inside
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group dmz_acl in interface dmz
access-list dmz_acl extended permit ip any any
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcb3ea578, priority=13, domain=permit, deny=false
hits=809, user_data=0xc94fb030, cs_id=0x0, use_real_addr, flags=0x0, pro
tocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=any
Phase: 3
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcb3e0e80, priority=0, domain=inspect-ip-options, deny=true
hits=1219, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=any
Phase: 4
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
object network inside-subnet
nat (inside,dmz) dynamic interface
Additional Information:
Forward Flow based lookup yields rule:
out id=0xcb3c0da8, priority=6, domain=nat-reverse, deny=false
hits=87, user_data=0xc85f9e98, cs_id=0x0, use_real_addr, flags=0x0, prot
ocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=10.17.20.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=inside
Result:
input-interface: dmz
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
Full config from ASA
interface Ethernet0/0
description WANPORT
!
interface Ethernet0/1
description DMZPORT
switchport access vlan 2
!
interface Ethernet0/2
shutdown
!
interface Ethernet0/3
description INSIDEPORT03
switchport access vlan 3
!
interface Ethernet0/4
description INSIDEPORT04
switchport access vlan 3
!
interface Ethernet0/5
description INSIDEPORT05
switchport access vlan 3
!
interface Ethernet0/6
description INSIDEPORT06
switchport access vlan 3
!
interface Ethernet0/7
description INSIDEPORT07
switchport access vlan 3
!
interface Vlan1
nameif outside
security-level 0
ip address 10.10.10.84 255.255.255.0
!
interface Vlan2
nameif dmz
security-level 50
ip address 10.17.19.254 255.255.255.0
!
interface Vlan3
nameif inside
security-level 100
ip address 10.17.20.254 255.255.255.0
!
ftp mode passive
dns domain-lookup outside
dns server-group DefaultDNS
domain-name blablabla.com
object network GW-PC
host 10.17.19 .1
object network inside-subnet
subnet 10.17.20.0 255.255.255.0
object network dmz-subnet
subnet 10.17.19.0 255.255.255.0
access-list inside_acl extended permit tcp any object dmz-subnet
access-list inside_acl extended permit icmp any object dmz-subnet
access-list inside_acl extended permit udp any object dmz-subnet
access-list inside_acl extended permit ip any object dmz-subnet
access-list dmz_acl extended permit ip any any
access-list dmz_acl extended permit tcp any any
access-list dmz_acl extended permit udp any any
access-list dmz_acl extended permit icmp any any
access-list dmz_acl extended permit ip host 10.17.19.1 host 10.17.20.3
access-list dmz_acl extended permit tcp host 10.17.19.1 host 10.17.20.3
access-list dmz_acl extended permit udp host 10.17.19.1 host 10.17.20.3
access-list rdp_acl extended permit tcp any object GW-PC
!
object network GW-PC
nat (dmz,outside) static interface service tcp https https
object network inside-subnet
nat (inside,dmz) dynamic interface
object network dmz-subnet
nat (dmz,outside) dynamic interface
access-group rdp_acl in interface outside
access-group dmz_acl in interface dmz
access-group inside_acl in interface inside
09-28-2019 07:39 AM
09-27-2019 07:34 PM
09-27-2019 07:36 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide