12-26-2017 11:52 AM - edited 02-21-2020 07:02 AM
Here is my current setup
* main location with Firepower 2100 and Internet with DMZ/Servers. Default route for all networks goes to this firewall.
* new location with Firepower 2100 and Internet with DMZ.
Trying to setup a NAT from a DMZ IP Address to an Inside Address. I followed how our main location is setup for an Inside NAT and setup like this:
Type: Auto NAT/Static
Interfaces: Source-Inside , Destination-Outside
Original Source: inside-server-ip
Translated Source: dmz-server-ip
Everything else is untouched. Only problem is it's not working... I troubleshot it from an outside laptop and the traffic gets to the inside server fine but the source IP is the laptop's real IP and so when the server tries to reply to the laptop it goes out our main firewall connection since the default route for all Internet is there.
Some reason I can't think this through... but I need the traffic the server sees to be the interface IP on the Firepower and not the real IP so it will route it back to the other location firewall and out that Internet.
12-26-2017 11:02 PM
I didn't quite follow how your setup is. Is the new site a seperate Firepower 2100 from what is installed at main location?
so you want traffic to flow somthing like the following?
server --> main site FP2100 --> new site FP2100 --> internet
The only way I can think of to make this work is to NAT internet traffic to a private IP on the new site FP2100 to an IP that is routed only toward the new FP2100. Then let NAT do the work.
So you would need to configure twice NAT and not just regular auto-NAT
12-27-2017 03:11 AM
12-27-2017 05:12 AM
If you can do a quick draft of your current setup so I can see how your traffic flows. apparently it seems a reverse route problem. also check what is the default routes for the HQ server.
12-27-2017 11:06 PM - edited 12-27-2017 11:07 PM
The only way to make this work correctly is to NAT the IPs that come from the internet to an IP you have routed to the new site Firepower. for example:
Internet --> new site Firepower --> NAT source to 10.1.1.1 --> HQ Server network --> Server
Server --> HQ server network --> new site Firepower --> NAT destination back to original --> Internet
This way the default route at the HQ network will not cause asynchronous routing.
So your NAT statement at the new site Firepower should look something like this:
Manual NAT Rule
Static
Source Zone - HQ Network
Destination Zone - Outside
Original source - Server IP
Translated Source - New site Firepower public IP interface (or any other public IP routed towards the new site Firepower)
Original destination - 10.1.1.1 (or any other IP that you specify to be used specifically for this traffic)
Translated destination - any
Just be sure that 10.1.1.1 or whatever IP you use for this is routed towards the new site Firepower.
12-28-2017 11:08 AM
12-28-2017 11:48 AM
So you translated the IP of PCs on the internet to the inside interface of the FTD? This I would consider a security risk, if my understanding is correct. I would rather you find an IP that is not in use in your network and use that instead. Then it is easier to restrict what that IP has access to further inside the network.
But that being said, you should also be restricting the ports that internet clients are able to access the server on. for example, if this is a web server be sure to have access control policy rule only allowing port tcp/80 and/or tcp/443 to that specific server and deny access to all others.
12-28-2017 11:51 AM
12-28-2017 11:57 AM
Yes, you can NAT to an unused IP as long as all routing in that IP goes towards the interface that is in the NAT statement. Proxy ARP will handle the rest. But for this to work routing MUST be in place.
12-27-2017 05:28 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide