08-10-2015 01:02 PM - edited 03-11-2019 11:24 PM
I'm trying to get traffic to pass correctly between two interfaces on our ASA 5512 - the "inside" (192.168.1.X) interface and the "DMZ" (192.168.100.X) interface.
Using the packet tracer I find that I can I can easily send packets between a source IP of 192.168.1.89 (a PC) and a destination IP of 192.168.100.5 (a switch in the DMZ). However, when I attempt to send packets between a source IP of 192.168.1.89 (a PC) and a destination IP of 192.168.100.10) (a server) the packet tracer shows them going to the "outside" interface rather than the "DMZ" interface.
The server at 192.168.100.10 is NATed to the outside interface and I assume that is what is causing the problem.
Assuming that's correct (and I hate to assume anything) here is some information related to the NAT configuration (as retrieved using ASDM):
When in production, the outside interface will only need to allow UDP traffic on a single, particular port. It would be nice if I could get traffic related to the server in question to pass between the inside and DMZ interfaces (to simplify management of said server).
I'll gladly accept any suggestions. While I'm not especially gifted at using the CLI, I can manage with a little guidance.
ASA software version: 9.1 (3) 2
Device manager version: 7.1 (4)
Thanks in advance.
08-10-2015 01:41 PM
Set the interfaces in the NAT-settings to the right interfaces. With that, it should work.
08-24-2015 07:12 AM
Try clicking the checkbox for "lookup route table to locate egress interface" under the nat statement. This will force the firewall to do a regular route lookup instead of relying on the NAT statement for traffic forwarding.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide