03-01-2016 11:35 PM - edited 03-12-2019 12:25 AM
Hi,
When accessing my server outside the translated server address(PUBIP) is not accessible.
object network PUB
host 1.1.0.3
object network RT
host 10.0.0.1
nat (outside2,inside) 1 source static any any destination static PUB RT
or nat (inside,outside2) source static RT PUB
access-list outside2_access_in_1 extended permit tcp any object RT eq ssh\telnet\http\https
access-group outside2_access_in_1 in interface outside2
Tried to clear xlate but same result
Server can ping and access the internet. Also it translated to the static address.
telnet publicaddressofserver 80 failed
03-02-2016 09:49 PM
Static NAT is bydirectional so you would only need the statement nat (inside,outside2) source static RT PUB.
But I noticed that you have defined the outside interface as outside2. Does this mean that you have another public / internet facing interface? If so then it is quite possible that you have an Asynchronous routing issue going on here, and that could be the reason the packet is being droped. Because packet-tracer only checks the "security checks" between two interfaces it will show allowed, but in reality, the return traffic could be leaving through another interface and the ASA finds no existing connection for this and then drops the packet.
--
Please remember to select a correct answer and rate helpful posts
03-02-2016 10:25 PM
03-02-2016 10:41 PM
But where is you default route pointing? Are you able to put a more specific route pointing out the outside2 interface for this traffic? If you are using two public interface, then as I mentioned this is most likely a case of asynchronous routing which is by default dropped by the ASA.
The solution to this is to first upgrade to version 9.3 or higher, if you haven't already done so. then use traffic zones to group the two outside interfaces. The zone allows for traffic to enter and leave interfaces within the same zone freely and still maintain the state-table connection. I am a little uncertain if this will cause a hickup in existing traffic so it would be best to do these changes in a service window.
zone outside
interface gig0/0
description outside1
zone-member outside
interface gig0/1
description outside2
zone-member outside
--
Please remember to select a correct answer and rate helpful posts
03-02-2016 11:00 PM
03-02-2016 11:16 PM
Default route is - outside interface.
And using PBR to route to outside2 interface. or do i need to create a static nat w/ route map
thanks
03-04-2016 03:33 PM
I think you would still have an issue as you are not able to place G0/1 in the zone-pair.
Depending on if it is specific IPs or all IP that are going to access through outside2, this will determine if you use static routing or PBR.
--
Please remember to select a correct answer and rate helpful posts
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide