cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
7975
Views
10
Helpful
16
Replies

Problem in ASA 5515 no traffic (information) passing through

JIMYSPEED
Level 1
Level 1

Hello Guys i need a little help

I have configured several ASA 5505 some years ago, now it has fall into my lap an ASA 5515 with the the version 9.1

 Bellow you can find my current setup, can any one check if there is something wrong with it. From the firewall i am able to ping to machines in the outside and inside interfaces. But i am unable to ping from the machine in the inside to the outside and vice-versa. In the rules page i am able to see the hits count when i am pinging and in the output
I can see the icmp connection being started and soon after i see the connection teardown message. And no pings are passing throw. I tried any any rule but still no success, maybe is the NAT or this asa unit is faulty. Any help is appreciated.

 

I really dont know what is wrong in my configuration

 

:
ASA Version 9.1(2)
!
hostname XPTOFW
domain-name XPTO.local
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
names
!
interface GigabitEthernet0/0
 nameif inside
 security-level 100
 ip address 10.7.0.5 255.255.255.0
!
interface GigabitEthernet0/1
 nameif outside
 security-level 0
 ip address 10.195.151.1 255.255.255.0
!
interface GigabitEthernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/4
 shutdown
 no nameif
 no security-level
 no ip address
!
interface GigabitEthernet0/5
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 management-only
 nameif management
 security-level 100
 ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
dns server-group DefaultDNS
 domain-name XPTO.local
same-security-traffic permit intra-interface
object network D4K
 host 190.50.100.76
object network DOC01
 host 10.6.2.29
 description D4K SERVER
object network DOC01_NAT
 host 10.195.151.15
object-group service SQLPorts tcp-udp
 port-object eq 1433
 port-object eq 1434
object-group icmp-type PingGroup
 icmp-object echo
 icmp-object echo-reply
 icmp-object traceroute
access-list outside_access extended permit icmp object D4K object DOC01_NAT object-group PingGroup
access-list outside_access extended permit object-group TCPUDP object D4K object DOC01_NAT object-group SQLPorts
access-list inside_access_in extended permit icmp object DOC01 object D4K object-group PingGroup
access-list inside_access_in extended permit object-group TCPUDP object DOC01 object D4K object-group SQLPorts
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu management 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
!
object network DOC01
 nat (inside,outside) static DOC01_NAT
access-group inside_access_in in interface inside
access-group outside_access in interface outside
route inside 10.6.0.0 255.255.0.0 10.7.0.3 1
route outside 190.50.0.0 255.255.0.0 10.195.151.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 192.168.1.2 255.255.255.255 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny  
  inspect sunrpc
  inspect xdmcp
  inspect sip  
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly 20
  subscribe-to-alert-group configuration periodic monthly 20
  subscribe-to-alert-group telemetry periodic daily
: end
no asdm history enable

_______________________________________

Thanks and Regards

16 Replies 16

If you don't mind can you send me you config? I have been struggling with an ASA for the last two weeks. I cant get a ping reply from my NAT public IP from outside..Mask your PUBLIC IP's if you have to..

Above you can find a sample of my current config, the only difference is that the real one has 100 times more rules, and of course the NAT was changed according to jmattbullen example

Review Cisco Networking for a $25 gift card