cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
276
Views
0
Helpful
5
Replies

Routing Problem

Hello 

When i want to open a website from the public ip on the firewall the internal LAN i cannot open it. 

What`s the problem? Is it not possible to open a connection to a server from the inside to the public IP of the firewall? 

From outside everything is working fine.

Thanks

1 Accepted Solution

Accepted Solutions

Yeah the log is shown because the inside user gets translated to the same public ip address as the destination, resulting in the Source and destination IP address fields to be the same. You can stop this by applying an ACL on your inside interface to block traffic to the public ip address for your inside users.

View solution in original post

5 Replies 5

Rahul Govindan
VIP Alumni
VIP Alumni

No this is not possible by design. You cannot access anything on a far end interface of the ASA when coming in from another interface. This is documented here:

http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/general/asa_91_general_config/admin_management.html#29729

Hmmm but what is the probem?

I open a http request to an public IP.

On the outside interface i made a NAT to the Server inside.

The NAT is working perfect when the package comes from the internet. When i open the http request from the inside interface to the public IP from the NAT i get an unreachable.

So the package from the inside went through NAT comes to the outside Interface and goes back to the NAT to the server inside. 

Am i right? 

Thanks

It is a carryover from its PIX days I believe. Basically the ASA does not allow you to access any resource on any interface if the traffic is sourced from any other interface. These checks happen even before NAT is checked, so it is not a problem with your NAT.

Ok Thanks for the perfect answer. The problem i had is that i alwas have now error messages in the log.

When someone in the network makes a connection to the public ip i had this message.

 Deny IP spoof from (xxx.xxxx.xxxx.xxxx) to xxx.xxx.xxx.xxxx on interface outside

then i only can block the ip from inside to outside or do you have a better idea?

Thanks

Yeah the log is shown because the inside user gets translated to the same public ip address as the destination, resulting in the Source and destination IP address fields to be the same. You can stop this by applying an ACL on your inside interface to block traffic to the public ip address for your inside users.

Review Cisco Networking products for a $25 gift card