05-22-2013 12:22 PM - edited 03-11-2019 06:47 PM
Hi Everyone,
IF we have two sites and each site has syslog server.
Site A
Syslog server IP 192.168.50.1
ASA 1
Site B
Syslog server IP 192.168.60.1
ASA2
for redundancy purposes ASA at each site will send all syslog messages to syslog server at its site and also to remote site.
so ASA1 will need to send syslog messages to 192.168.50.1 and 60.1.
Syslog server is at inside interface of ASA.
so need to know if we do static nat on the ASA will this we ok on ASA1 version 8.2*******
static(inside,outside) UDP 200.x.x.1 syslog 192.168.50.1 syslog
static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog
So what config should i do on ASA2 at site 2?
Also if i use public ip for each static NAT then i can not use that IP for any other NAT right?
Thanks
Mahesh
Solved! Go to Solution.
05-22-2013 12:27 PM
Hi Mahesh,
So if I understood you correctly you have the following
If this is correct then I would imagine you can use the Static PAT / Port Forward configuration on each ASA to enable the the remote site ASA to send Syslogs through the public network to the syslog server.
I would consider doing this through L2L VPN connection though so your are not sending Syslog in the public network.
This would naturally include more configurations required BUT if you want to test this setup in some lab setup then I dont see a problem with it for testing purposes. From what I remember from our previous discussions, you have been aquiring ASAs for your own test lab to learn more about the firewalls?
Are we talking abouta lab environment with this Syslog setup OR is this for a real production network?
- Jouni
05-22-2013 12:34 PM
Oh,
And forgot to answer the other question.
You can use a single public IP address to both provide Internet access to LAN users with Dynamic PAT and also configure Static PAT like you have shown in your post.
These dont rule eachother out.
- Jouni
05-22-2013 12:46 PM
Hi,
The configuration you mentioned
static(inside,outside) UDP 200.x.x.1 syslog 192.168.50.1 syslog
static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog
Are Static PAT which in other words means Static Port Address Translation. Or even a more common name used for this type of NAT is Port Forwarding.
So if we take the 2 Static PAT configurations above
Site 1
static(inside,outside) udp 200.x.x.1 syslog 192.168.50.1 syslog
Site 2
static(inside,outside) udp 200.x.x.2 syslog 192.168.60.1 syslog
The above coupled with the needed ACLs on each sites "outside" interfaces would allow you to send Syslog from one site to the Syslog server on the other site. Naturally you also need the "logging" configurations so that the ASA knows where to send the Syslogs.
But I would again have to say that I would personally rather transfer this Syslog traffic through a L2L VPN connection between the sites so the Syslogs wouldnt be visible to anyone else on the public network.
- Jouni
05-22-2013 01:29 PM
Hi,
You dont need 2 Static PAT configurations on both sites. You just need a single Static PAT configuration on each site to enable the local Syslog server to be reached through the Internet.
So if Site 1 has a Syslog server with the IP address of 192.168.50.1 then you configure a Static PAT configuration for that on its local firewall and if the Site 2 has a Syslog server with the IP address of 192.168.60.1 then you configure a Static PAT configuration for that on its local firewall
Are you using the "outside" interface IP address on each site OR do you have spare public IP addresses that can be used only for the Syslog servers?
If you only have the single public IP address of the ASA "outside" interface then you have to use Static PAT. If you have spare IP addresses then you can use Static NAT
Static PAT using the "outside" interface IP address would be configured with
Site 1
static (inside,outside) udp interface syslog 192.168.50.1 syslog netmask 255.255.255.255
Site 2
static (inside,outside) udp interface syslog 192.168.60.1 syslog netmask 255.255.255.255
I think you should probably try sending some logs through the Internet first and when that is working correctly then it will be easier to handle the L2L VPN configurations to support sending the logs through the VPN connection.
With regards to the bidirectionality of the NAT. Notice that we are talking about UDP and sending Syslogs. The other ASA will send Syslogs through the other ASA to the Syslog server there. The UDP traffic only has to go through the remote site ASA and since we are talking about UDP traffic there is no bidirectional traffic in Syslogs case. The Syslog server doesnt need to send anything to the ASA (to my knowledge atleast)
The Static PAT should work just fine for you. As I said, if you have spare public IP address that we can dedicate for each Syslog server on each site THEN you can also use Static NAT.
- Jouni
05-22-2013 02:17 PM
Hi,
Ok, so you say that you have a spare public IP address to be dedicated to ONLY be used for the Syslog server then you can configure Static NAT instead of Static PAT
So the Static NAT configuration would be
static (inside,outside) 200.x.x.x 192.168.50.1 netmask 255.255.255.255
Then you would have to have an ACL rule permitting the inbound Syslog traffic from the remote site
access-list OUTSIDE-IN permit udp host y.y.y.y host 200.x.x.x eq syslog
Where
Presuming ofcourse your current "outside" interface ACL is named OUTSIDE-IN. You naturally use the name of the ACL you have in use.
So the above are the configurations on Site A. This enable Site B ASA to send Syslogs to server at Site A.
For the same to work for Syslogs from Site A ASA to Site B Syslog server you need configurations on Site B ASA also.
static (inside,outside) 200.x.x.x 192.168.60.1 netmask 255.255.255.255
access-list OUTSIDE-IN permit udp host y.y.y.y host 200.x.x.x eq syslog
Where
- Jouni
05-22-2013 11:37 PM
Hi Mahesh,
Yes, ofcourse the public IP addresses are different on the sites. I guess I could have changed the IP addresses a bit in the configuration commands I mentioned. For example 200.x.x.x and 200.y.y.y.
So as I said it would probably be best that you first configure the Static NAT (as you seem to have spare public IP address that you can dedicate to the Syslog server on each site) and configure ACLs that allow the traffic from the other ASAs public IP address.
When the NAT and ACL are configured correctly then you could try adding the "logging" configurations and start confirming that Syslogs from each site arrive to the remote site Syslog server.
When you have confirmed that this configuration is working correctly THEN we could temporarily remove the logging to the remote site and start looking at the L2L VPN configurations required so that you have move the Syslog traffic to the L2L VPN between the 2 sites that you say already existed. So one step at a time.
Do you have enough information to configure the Static NAT for the Syslog server on each site?
When the NAT and ACL are done you should be able to use the command
logging host outside
The ASA might give a warning about the "security-level" value of the interface "outside" but this is to be expected as the ASA warns you that you are about to send Syslog information through an interface behind which the network is not secured by the ASA and in a sense secured.
- Jouni
05-23-2013 09:51 AM
Hi Mahesh,
I will answer here on the forums to your message.
The "logging" command you posted were a bit wrong.
The reason is that the other server is local and is naturally located on the "inside" BUT the other remote site Syslog server would need the interface set to "outside" as its located behind that interface.
My intention was to first get your NAT, ACL and Logging configurations in order for you to be confirm through Internet that the logs were arriving at the remote site server.
As soon as that is working you can temporarily disable the syslog sending to the remote site through "outside" and THEN we can start looking into adding the L2L VPN related configurations so you can have the ASAs send that syslog information to the remote site through a protected L2L VPN Connections.
I just try to keep the configurations changes as simple as possible and confirm that the basics are working before trying something more complicated.
- Jouni
05-23-2013 09:52 AM
Also,
On each ASA you will ofcourse have to use the Remote Syslog server public NAT IP address in the "logging" command.
- Jouni
05-23-2013 10:44 AM
Hi,
The IP addresses you mention in the message sent through the forums might be configured with Static NAT so you should look through your "show run static" on the ASA to find the translations
Or you have use "show run static | inc x.x.x.x" where the "x.x.x.x" is the public IP address
- Jouni
05-23-2013 10:52 AM
Hi Mahesh,
You should really try to post the answers and questions here on the discussion. It gets quite confusing reading the information on 2 different places.
So if I should suggest you which steps to take regarding this Syslog setup configuration
- Jouni
05-23-2013 11:10 AM
Hi,
So you are saying that both sites ASAs have Static NAT for the the sites Syslog server? If this is correct then the Syslog server can be reached from the Internet.
After this you would have to create an ACL rule on the "outside" interface ACL to allow syslog traffic from the remote sites ASAs "outside" interface IP address to the local syslog server public IP address. You would configure ACL rules on both sites to allow the other sites ASA to send Syslog to the public IP address of that sites Syslog server.
When that is done you could enable syslogging on each sites ASA (towards the other sites syslog server)
logging host outside
And if everything is fine, you should be able getting syslog messages from both ASA to both Syslog servers
And as I said before, after we confirm that the logs are going through from each site to the other then we could move this traffic to a L2L VPN connection.
In short these very first steps purpose is to
- Jouni
05-23-2013 10:31 PM
Hi Mahesh,
I had no idea that you have a L2L VPN/GRE connection through some other routers in the network. I presumed that you had a L2L VPN connection between the ASA firewalls directly. This again naturally changes the setup completely.
Does each of your ASA have a route towards the remote syslog server yet? Are you perhaps running dynamic routing between the sites as you are using IPsec + GRE?
What is the IP address/network of the interface of the ASA that has the route (or will have the route after configured) for the remote sites syslog server?
Basically you should first confirm that each site has a route towards the other sites syslog server network. You would also have to confirm that each site as a route for the network that is connected to the ASA interface from which you want to send the syslogs to the other site.
You should be able to use the "show route" command on the ASAs and "show ip route" command on the router side to determine if the routing information needed is already there. If not, then some additions to the routing have to be made for each ASA to be able to send syslog to the other side.
- Jouni
05-22-2013 12:27 PM
Hi Mahesh,
So if I understood you correctly you have the following
If this is correct then I would imagine you can use the Static PAT / Port Forward configuration on each ASA to enable the the remote site ASA to send Syslogs through the public network to the syslog server.
I would consider doing this through L2L VPN connection though so your are not sending Syslog in the public network.
This would naturally include more configurations required BUT if you want to test this setup in some lab setup then I dont see a problem with it for testing purposes. From what I remember from our previous discussions, you have been aquiring ASAs for your own test lab to learn more about the firewalls?
Are we talking abouta lab environment with this Syslog setup OR is this for a real production network?
- Jouni
05-22-2013 12:34 PM
Oh,
And forgot to answer the other question.
You can use a single public IP address to both provide Internet access to LAN users with Dynamic PAT and also configure Static PAT like you have shown in your post.
These dont rule eachother out.
- Jouni
05-22-2013 12:36 PM
Hi Jouni,
Here i am talking about production network.
Where two sites are connected via wan link.
So the commands which i mentioned earlier are more static NAT right?
Thanks
Mahesh
05-22-2013 12:46 PM
Hi,
The configuration you mentioned
static(inside,outside) UDP 200.x.x.1 syslog 192.168.50.1 syslog
static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog
Are Static PAT which in other words means Static Port Address Translation. Or even a more common name used for this type of NAT is Port Forwarding.
So if we take the 2 Static PAT configurations above
Site 1
static(inside,outside) udp 200.x.x.1 syslog 192.168.50.1 syslog
Site 2
static(inside,outside) udp 200.x.x.2 syslog 192.168.60.1 syslog
The above coupled with the needed ACLs on each sites "outside" interfaces would allow you to send Syslog from one site to the Syslog server on the other site. Naturally you also need the "logging" configurations so that the ASA knows where to send the Syslogs.
But I would again have to say that I would personally rather transfer this Syslog traffic through a L2L VPN connection between the sites so the Syslogs wouldnt be visible to anyone else on the public network.
- Jouni
05-22-2013 01:17 PM
Hi Jouni,
If i config below on Site 1 ASA
static(inside,outside) UDP 200.x.x.1 syslog 192.168.50.1 syslog
static(inside,outside) UDP 200.x.x.2 syslog 192.168.60.1 syslog
Need to confirm below
So this will forward the traffic coming from Site 2 to site 1 ?
Site 2
static(inside,outside) UDP 200.x.x.3 syslog 192.168.50.1 syslog
static(inside,outside) UDP 200.x.x.4 syslog 192.168.60.1 syslog
This will forward the traffic coming from site 1 to site 2 right?
Also need to know i read that static NAT is bidirectional .
So this static PAT is also bidirectional?
also we have vpn connection between 2 sites.
Thanks
Mahesh
05-22-2013 01:29 PM
Hi,
You dont need 2 Static PAT configurations on both sites. You just need a single Static PAT configuration on each site to enable the local Syslog server to be reached through the Internet.
So if Site 1 has a Syslog server with the IP address of 192.168.50.1 then you configure a Static PAT configuration for that on its local firewall and if the Site 2 has a Syslog server with the IP address of 192.168.60.1 then you configure a Static PAT configuration for that on its local firewall
Are you using the "outside" interface IP address on each site OR do you have spare public IP addresses that can be used only for the Syslog servers?
If you only have the single public IP address of the ASA "outside" interface then you have to use Static PAT. If you have spare IP addresses then you can use Static NAT
Static PAT using the "outside" interface IP address would be configured with
Site 1
static (inside,outside) udp interface syslog 192.168.50.1 syslog netmask 255.255.255.255
Site 2
static (inside,outside) udp interface syslog 192.168.60.1 syslog netmask 255.255.255.255
I think you should probably try sending some logs through the Internet first and when that is working correctly then it will be easier to handle the L2L VPN configurations to support sending the logs through the VPN connection.
With regards to the bidirectionality of the NAT. Notice that we are talking about UDP and sending Syslogs. The other ASA will send Syslogs through the other ASA to the Syslog server there. The UDP traffic only has to go through the remote site ASA and since we are talking about UDP traffic there is no bidirectional traffic in Syslogs case. The Syslog server doesnt need to send anything to the ASA (to my knowledge atleast)
The Static PAT should work just fine for you. As I said, if you have spare public IP address that we can dedicate for each Syslog server on each site THEN you can also use Static NAT.
- Jouni
05-22-2013 02:03 PM
Hi Jouni,
We have Public IP to be used for syslog server.
Also if i config say each line on each site
Site A
static (inside,outside) udp 200.x.x.x syslog 192.168.50.1 syslog netmask 255.255.255.255.
how will syslog message from site A devices will go to syslog server at site B?
Thanks
Mahesh
05-22-2013 02:17 PM
Hi,
Ok, so you say that you have a spare public IP address to be dedicated to ONLY be used for the Syslog server then you can configure Static NAT instead of Static PAT
So the Static NAT configuration would be
static (inside,outside) 200.x.x.x 192.168.50.1 netmask 255.255.255.255
Then you would have to have an ACL rule permitting the inbound Syslog traffic from the remote site
access-list OUTSIDE-IN permit udp host y.y.y.y host 200.x.x.x eq syslog
Where
Presuming ofcourse your current "outside" interface ACL is named OUTSIDE-IN. You naturally use the name of the ACL you have in use.
So the above are the configurations on Site A. This enable Site B ASA to send Syslogs to server at Site A.
For the same to work for Syslogs from Site A ASA to Site B Syslog server you need configurations on Site B ASA also.
static (inside,outside) 200.x.x.x 192.168.60.1 netmask 255.255.255.255
access-list OUTSIDE-IN permit udp host y.y.y.y host 200.x.x.x eq syslog
Where
- Jouni
05-22-2013 08:55 PM
Hi Jouni,
The setup which we have here has different public IP at site A and B
For site A
static (inside,outside) 200.x.x.2 192.168.50.1 netmask 255.255.255.255
Site B
static (inside,outside) 200.x.x.3 192.168.60.1 netmask 255.255.255.
So i mean to say that Public IPs are different at both the sites.
Is this possible?
Thanks
MAhesh
05-22-2013 11:37 PM
Hi Mahesh,
Yes, ofcourse the public IP addresses are different on the sites. I guess I could have changed the IP addresses a bit in the configuration commands I mentioned. For example 200.x.x.x and 200.y.y.y.
So as I said it would probably be best that you first configure the Static NAT (as you seem to have spare public IP address that you can dedicate to the Syslog server on each site) and configure ACLs that allow the traffic from the other ASAs public IP address.
When the NAT and ACL are configured correctly then you could try adding the "logging" configurations and start confirming that Syslogs from each site arrive to the remote site Syslog server.
When you have confirmed that this configuration is working correctly THEN we could temporarily remove the logging to the remote site and start looking at the L2L VPN configurations required so that you have move the Syslog traffic to the L2L VPN between the 2 sites that you say already existed. So one step at a time.
Do you have enough information to configure the Static NAT for the Syslog server on each site?
When the NAT and ACL are done you should be able to use the command
logging host outside
The ASA might give a warning about the "security-level" value of the interface "outside" but this is to be expected as the ASA warns you that you are about to send Syslog information through an interface behind which the network is not secured by the ASA and in a sense secured.
- Jouni
05-23-2013 09:49 AM
Hi Jouni,
I have send you message please read.
Thanks
Mahesh
05-23-2013 09:51 AM
Hi Mahesh,
I will answer here on the forums to your message.
The "logging" command you posted were a bit wrong.
The reason is that the other server is local and is naturally located on the "inside" BUT the other remote site Syslog server would need the interface set to "outside" as its located behind that interface.
My intention was to first get your NAT, ACL and Logging configurations in order for you to be confirm through Internet that the logs were arriving at the remote site server.
As soon as that is working you can temporarily disable the syslog sending to the remote site through "outside" and THEN we can start looking into adding the L2L VPN related configurations so you can have the ASAs send that syslog information to the remote site through a protected L2L VPN Connections.
I just try to keep the configurations changes as simple as possible and confirm that the basics are working before trying something more complicated.
- Jouni
05-23-2013 09:52 AM
Also,
On each ASA you will ofcourse have to use the Remote Syslog server public NAT IP address in the "logging" command.
- Jouni
05-23-2013 10:44 AM
Hi,
The IP addresses you mention in the message sent through the forums might be configured with Static NAT so you should look through your "show run static" on the ASA to find the translations
Or you have use "show run static | inc x.x.x.x" where the "x.x.x.x" is the public IP address
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide