cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1442
Views
10
Helpful
16
Replies

Trying to pass internet with a Cisco ASA 5505

msittnick
Level 1
Level 1

Hello,

   I have not been having much success configuring my 5505 for Internet access, and I'm sure there are a few small things I'm missing.  At times I believe I got it to the point where I could ping, but still not pass through the Internet traffic.  At this point, I reset the 5505 and only changed a couple of settings. 

I have an external range with these characteristics: Network Address 67.139.113.16 (.17 is Gateway), SM: 255.255.255.248, available IP: 67.139.113.218

The external connection is through a T1 modem, and when I put those settings in my laptop, I can access just fine.

When I went through the startup wizard in the ADSM, I maded the internal interface 10.209.0.3, subnet mask: 255.255.255.0

I selected PAT in the Wizard, but don't know if I should have, or if the NAT rules I tried to put in are fine.

Eventually I want to add a Site to Site VPN to the rest of the 10.0.0.0 network, but I can't even pass the Internet through to the inside.

Also, this will eventually be behind another hosted firewall, so I'm not worried about restricting access, even currently.

However, I suspect the problem is that traffic is being blocked with the NAT rules or Access rules.
I wish I could just disable those inherent deny rules

Outside of pings to 10.209.0.3, all pings come back as request timed out.

Can someone please review this, and see if they notice anything I can change?

I do appreciate it....

Config:

: Saved
:
ASA Version 8.2(5) 
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
name 10.0.0.0 Eventual
name 10.209.0.0 Local
name 67.139.113.216 T1
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 0
 ip address 10.209.0.3 255.0.0.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 67.139.113.218 255.255.255.248 
!
!
time-range Indefinite
!
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object icmp
 protocol-object udp
 protocol-object tcp
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 Local 255.255.255.0 any time-range Indefinite 
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any inside
asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 0.0.0.0 0.0.0.0 dns tcp 255 255  udp 255
access-group inside_access_in in interface inside
route inside 0.0.0.0 0.0.0.0 67.139.113.217 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http Eventual 255.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto ca trustpoint _SmartCallHome_ServerCA
 crl configure
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 10.209.0.201-10.209.0.232 inside
dhcpd dns 8.8.8.8 8.8.4.4 interface inside
dhcpd auto_config outside interface inside
dhcpd enable inside
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
call-home reporting anonymous
Cryptochecksum:d3c4872f997a93984332213f98fbe12b
: end
asdm location Eventual 255.0.0.0 inside
asdm location Local 255.255.255.0 inside
asdm location T1 255.255.255.248 inside
asdm history enable
2 Accepted Solutions

Accepted Solutions

Julio Carvajal
VIP Alumni
VIP Alumni

Hello Sr,

No need to worry .. We are here to help you with this

do the following

No nat (inside) 0 0.0.0.0 0.0.0.0 dns tcp 255 255  udp 255

nat (inside) 1 0 0

no access-group inside_access_in in interface inside

clear configure access-list

fixup protocol Icmp

Then give it a try and let us know

Julio Carvajal

Remember to rate all of the helpful posts

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

View solution in original post

Hello,

Ofcourse not

no route inside 0.0.0.0 0.0.0.0 67.139.113.217 1

route outside 0.0.0.0 0.0.0.0 67.139.113.217 1

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

View solution in original post

16 Replies 16

Julio Carvajal
VIP Alumni
VIP Alumni

Hello Sr,

No need to worry .. We are here to help you with this

do the following

No nat (inside) 0 0.0.0.0 0.0.0.0 dns tcp 255 255  udp 255

nat (inside) 1 0 0

no access-group inside_access_in in interface inside

clear configure access-list

fixup protocol Icmp

Then give it a try and let us know

Julio Carvajal

Remember to rate all of the helpful posts

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Unfortunately that didn't work....

The new config:

: Saved
:
ASA Version 8.2(5) 
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
name 10.0.0.0 Eventual
name 10.209.0.0 Local
name 67.139.113.216 T1
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 0
 ip address 10.209.0.3 255.0.0.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 67.139.113.218 255.255.255.248 
!
!
time-range Indefinite
!
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group protocol DM_INLINE_PROTOCOL_1
 protocol-object ip
 protocol-object icmp
 protocol-object udp
 protocol-object tcp
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any outside
icmp permit any inside
asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
route inside 0.0.0.0 0.0.0.0 67.139.113.217 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http Eventual 255.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto ca trustpoint _SmartCallHome_ServerCA
 crl configure
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 10.209.0.201-10.209.0.232 inside
dhcpd dns 8.8.8.8 8.8.4.4 interface inside
dhcpd auto_config outside interface inside
dhcpd enable inside
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
!
service-policy global_policy global
prompt hostname context 
call-home reporting anonymous
Cryptochecksum:64bbf533cf1bd591e797c053ea9e107a
: end
asdm location Eventual 255.0.0.0 inside
asdm location Local 255.255.255.0 inside
asdm location T1 255.255.255.248 inside
asdm history enable

I am getting some more encouraging messages in the Syslog, but I still cannot bing 8.8.8.8 or the outside interface.

5Aug 29 200801:42:558.8.4.453Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src inside:10.209.0.6/64477 dst inside:8.8.4.4/53 denied due to NAT reverse path failure
6Aug 29 200801:42:5410.209.0.61686SSL session with client inside:10.209.0.6/1686 terminated.
6Aug 29 200801:42:5410.209.0.6168610.209.0.3443Deny TCP (no connection) from 10.209.0.6/1686 to 10.209.0.3/443 flags FIN ACK on interface inside


Hello,

Ofcourse not

no route inside 0.0.0.0 0.0.0.0 67.139.113.217 1

route outside 0.0.0.0 0.0.0.0 67.139.113.217 1

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Now I get a "Destination host unreachable" message

From the ASA can you ping: 67.139.113.217

If it works then try to ping 4.2.2.2 from the ASA again

Let me know the results

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Ooops, sorry.....

I got that destination unreachable message in pinging

67.139.113.217

8.8.8.8

4.2.2.2

So there is a connectivity problem between the ASA and the default gateway

Can you make sure that the Device your ISP provide you is connected to ethernet 0/0 on the ASA?

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Yes it is.

And I can ping all of those from the ping utility in the ASA, using the outside interface (all fail using the inside interface)

Hello,

Well that is expected,

I was refering to ping from the outside interface to those destinations,

So that works...

Okay now can you ping from a PC on the inside of the ASA to 10.209.0.3?

Can you ping from a PC on the inside to 67.139.113.217

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Sorry, I realized there was a misunderstanding about the pings

(I didn't catch the "from ASA" part earlier)

No, I cannot ping from the inside to the outside interface/gateway. (.218/.217)

I can ping from the inside PC to the inside interface (.3)

Hhmm Does not make any sense,

What is connected to the End users, just a layer 2 switch??

Regards,

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

Right now, just a single CPU connected to the 5th port.
Eventually I would install a switch on this end to support 20 users/computers, but right now it is a test environment...

T1-> (port 0) Cisco ASA 5505 (port 5) -> laptop computer

I will go get the config posted again, just in case there was any input error on my part.

Hello.

Please paste the configuration

and do the following and share the output

packet-tracer input inside icmp ip_address_computer 8 0 4.2.2.2

Also the ipconfig/all from the PC

Julio Carvajal
Senior Network Security and Core Specialist
CCIE #42930, 2xCCNP, JNCIP-SEC

So when I did the ipconfig /all, the gateway was blank within the results (while I had input 10.209.0.3 manually and it was still there in the connection properties).

I changed it to 10.209.0.1 and pinged again, with results timing out

I then changed it back to 10.209.0.3 and pinged again, and it worked.

So obvioiusly I had both some config wrong, and something with my machine not taking the gateway properly.

I thank you for your help.

Review Cisco Networking for a $25 gift card