10-12-2019 03:47 PM
Hello,
I have a situation with an ASA 5508-X where I cannot get any traffic to pass through on anything other than it's own IP address on the outside interface. To clarify, the outside interface has a /28 on say 1.2.3.34/28. Traffic passes through for 1.2.3.34 but not 35-46.
I am upgrading from ASA 5510s which have a similar config (minus the post 8.3 NAT changes) so I'm quite baffled.
I do have hosts configured and NAT statements for them under the IPs 35-46.
I also have 2 more sets of /28 that are routed to my outside interface that DOES work, and the NAT statements are exactly the same (minus the host IP address of course).
Here is what I have:
interface Redundant1.1 vlan xxx nameif outside security-level 0 ip address 1.2.3.34 255.255.255.240
route outside 0.0.0.0 0.0.0.0 1.2.3.33 1
object network Web1
host 192.168.0.2
object network E3
host 192.168.0.3
object network v1
subnet 192.168.0.0 255.255.255.0
object-group service DM_INLINE_SERVICE_5
service-object icmp
service-object tcp-udp destination eq domain
access-list outside_access_in extended permit icmp any any
access-list v1_access_in extended permit object-group DM_INLINE_SERVICE_5 192.168.0.0 255.255.255.0 any
Does not work: object network Web1 nat (v1,outside) static 1.2.3.35 Does work: object network E3 nat (v1,outside) static 1.2.3.78
I also have a NAT statement for everything else that's not matched, so everything that sits behind .34 without a specific static NAT is working fine.
object network VNAT nat (v1,outside) dynamic interface
Hopefully this makes sense, I'm sure I'm missing something small.
Thanks.
10-13-2019 01:53 AM
try this,
object network Web1_Public
host 1.2.3.35
!
nat (v1,outside) source static Web1 Web1_Public
!
object network E3_Public
host 1.2.3.78
!
nat (v1,outside) source static E3 E3_public
!
10-13-2019 02:11 AM
10-13-2019 03:25 AM
Thanks Sheraz, I'll try that when I can get there next (hopefully tomorrow night). I had to plug in the 5510 until I get this working.
bhargavdesai, I'll run a packet trace when I am in next as mentioned above.
Just odd that no IPs within the /28 can be NATted but the routed IPs (such as the .78) can using the same statements. Is this a common issue (byt that I mean an incorrect config) that I somehow have just never faced?
10-13-2019 03:58 AM
Yes packet tracer would be good to look at.
But I do not quite understand what is not working. Is it from the server to internet or from internet to the server? If the issue is that the server cannot reach the internet and the ACL you have posted is all you have configured for this interface then that is where the problem is. You are only permitting DNS traffic.
10-13-2019 03:50 PM
Hi Marius,
I only posted a basic ACL to show things were in place. In reality there are many more to allow http/https, etc but in this example I kept it simple.
Both directions cannot ping when the NAT rule(s) above are in place. Otherwise the host can ping as 1.2.3.34.
I did run a packet tracer from the v1 interface a couple of days ago and it passed.
10-13-2019 10:09 PM
And in that packet tracer was traffic hitting the correct NAT statements? It sounds like traffic from Web1 is matching a different NAT rule than the one you intent it to match.
10-14-2019 12:34 AM
10-14-2019 11:56 AM - edited 10-14-2019 11:57 AM
I highly doubt the issue is with proxy arp as this is enabled by default in ASA and to turn it off you would need to manually add the no-proxy-arp statement at the end of the NAT statement, which is not present in the NAT statement posted.
10-15-2019 03:29 AM
10-15-2019 11:23 PM
Thanks for your time everyone. Turns out it was a service policy/ICMP inspection.
Had a Cisco engineer look at it and after 2 hours mind you, input a protocol fixup and that was it.
I should have toyed with that but sometimes you just need that second pair of eyes...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide