03-03-2008 10:31 AM - edited 02-21-2020 01:55 AM
I have 3 inside networks that I would like to route between and also allow for outside access to the internet. 192.168.98.0/24,192.168.99.0/24,192.168.97.0/24
All 3 are defined on a 3560 that has a default route which points to my ASA 5510 inside interface 192.168.100.1. However when I try to ssh from a host on the 192.168.100.0/24 to 192.168.98.0/24 I get this error:
Mar 03 2008 13:11:08: %ASA-4-305006: portmap translation creation failed for tcp src inside:192.168.100.250/34158 dst inside:192.168.98.248/22
and if I try to ssh from the 98 net to the 100 I get:
Mar 03 2008 13:11:47: %ASA-4-106023: Deny tcp src inside:192.168.100.249/22 dst inside:192.168.98.248/32775 by access-group "inside-list-in"
I think I missing two things but I am unsure what they are.
03-04-2008 11:06 AM
Hello,
I belive your problem aside from allowing the traffic needed in your inside ACL is with routing packets back from the interface they arrived.
It's pretty confusing but take a look at this link and you will probably be able to work it out.
Cheers
03-04-2008 11:50 AM
Thanks for the information.. I did correct my ACL's which got rid of the deny's and I did add the corresponding statements to allow the hairpinning, however now a connection does not initiate and I cannot see any messages in the logs so I am not how I can see what is happening..
03-04-2008 07:41 PM
you have a 3560, why not configure ip routing on that and configure logical vlan interfaces on it? or are you applying acl's between subnets?
03-05-2008 04:36 AM
Actually this is exactly what I am doing... I have 3 different subnets on the 3560, 192.168.99.0/24, 192.168.98.0/24, 192.168.97.0/24. However there is also a network 192.168.100.0/24 where the inside interface on the ASA is 192.168.100.1 and some hosts reside. So I would like hosts in 192.168.98.0/24 for example to be able to access the 192.168.100.0/24 network and access the internet.
03-05-2008 06:39 AM
on your switch, have you enter the command "ip routing"?
also, on your switch, is there a default route (NOT default gateway) that points to the inside interface IP of the firewall?
So it sounds like you should have a total of four vlan interfaces right? with IP's of: 192.168.97.x, 192.168.98.x, 192.168.99.x, and 192.168.100.x.
The default gateway's on each host in each subnet should then point to the IP address of their respective vlan interfaces on the switch.
03-05-2008 06:51 AM
the "ip routing" command is in the configuration.
ip route 0.0.0.0 0.0.0.0 192.168.100.1 is also in the configuration
I have 3 vlans and ge0/1 is configured as a layer 3 port, not a switchport with an IP of 192.168.100.2.
On the ASA I have a route line:
route inside 192.168.98.0 255.255.255.0 192.168.100.2 1
03-05-2008 07:14 AM
add the following to your ASA:
route inside 192.168.97.0 255.255.255.0 192.168.100.2 1
route inside 192.168.99.0 255.255.255.0 192.168.100.2 1
alternatively, you could enable routing on each device:
on the switch -
router rip
version 2
no auto-summary
network 192.168.97.0
network 192.168.98.0
network 192.168.99.0
network 192.168.100.0
on the asa:
router rip
version 2
no auto-summary
network 192.168.100.0
03-05-2008 07:27 AM
Just to clarify, at this point and time I am only trying to get the 192.168.98.0/24 network to route to 192.168.100.0/24 or the internet. So I can see your point about needing those routes for the other VLANS... However my issue still appears to be that host 192.168.98.248 cannot get name resolution from a host 192.168.100.250 and thus cannot get out to the web. If I try to ssh to the host it also times out. However in the ASA logs I do not see any deny's...
03-05-2008 09:23 AM
the switchport you made a layer 3 interface, undo. make it a layer 2 interface. assign that interface to the same vlan that host 192.168.100.250 is in. then create a logical vlan interface and assign it IP address 192.168.100.2.
You should still have 4 vlans with each of the following subnets:
192.168.97
192.168.98
192.168.99
192.168.100
Each vlan will have a logical interface in the Ip range stated above, and each logical interface should be the default gateway for each of those subnets. The firewall should be plugged into whatever vlan you've assigned the 192.168.100.x range to.
------------
or...pretend you're starting from scratch...that might make more sense.
------------
create 3 vlans (in addition to VLan 1):
vlan 97
vlan 98
vlan 99
interface vlan 1
ip address 192.168.100.2 255.255.255.0
interface vlan 97
ip address 192.168.97.1 255.255.255.0
interface vlan 98
ip address 192.168.98.1 255.255.255.0
interface vlan 99
ip address 192.168.99.1 255.255.255.0
ip routing
ip route 0.0.0.0 0.0.0.0 192.168.100.1
assign switchports to respective vlans. plug the firewall into vlan 1.
192.168.x.1 should be the default gateway for hosts on each subnet.
don't forget routing between the asa and each subnet, done through one of my previous posts using either RIP or static routes.
03-05-2008 05:16 PM
I did try that however no go..
I believe my issue might be that I have version 7.0(6) and I need 7.2 for hairpinning to be supported...
03-05-2008 06:50 PM
you don't need hairpinning.
all routing would be done on the 3560. the asa only needs to know how to get to each subnet, not route between them.
can you post your configs for the switch and asa?
03-06-2008 12:07 PM
Actually once you pointed out that the 3560 would be doing all the routing it finally clicked... Things are now working.
Now I just need to allow my my 99,98,97 networks access over our VPN tunnel to another site....
thanks for the help
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide