04-02-2013 07:15 PM - edited 03-11-2019 06:22 PM
Hello,
I have not been having much success configuring my 5505 for Internet access, and I'm sure there are a few small things I'm missing. At times I believe I got it to the point where I could ping, but still not pass through the Internet traffic. At this point, I reset the 5505 and only changed a couple of settings.
I have an external range with these characteristics: Network Address 67.139.113.16 (.17 is Gateway), SM: 255.255.255.248, available IP: 67.139.113.218
The external connection is through a T1 modem, and when I put those settings in my laptop, I can access just fine.
When I went through the startup wizard in the ADSM, I maded the internal interface 10.209.0.3, subnet mask: 255.255.255.0
I selected PAT in the Wizard, but don't know if I should have, or if the NAT rules I tried to put in are fine.
Eventually I want to add a Site to Site VPN to the rest of the 10.0.0.0 network, but I can't even pass the Internet through to the inside.
Also, this will eventually be behind another hosted firewall, so I'm not worried about restricting access, even currently.
However, I suspect the problem is that traffic is being blocked with the NAT rules or Access rules.
I wish I could just disable those inherent deny rules
Outside of pings to 10.209.0.3, all pings come back as request timed out.
Can someone please review this, and see if they notice anything I can change?
I do appreciate it....
Config:
: Saved : ASA Version 8.2(5) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted names name 10.0.0.0 Eventual name 10.209.0.0 Local name 67.139.113.216 T1 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 0 ip address 10.209.0.3 255.0.0.0 ! interface Vlan2 nameif outside security-level 0 ip address 67.139.113.218 255.255.255.248 ! ! time-range Indefinite ! ftp mode passive same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group protocol DM_INLINE_PROTOCOL_1 protocol-object ip protocol-object icmp protocol-object udp protocol-object tcp access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 Local 255.255.255.0 any time-range Indefinite pager lines 24 logging enable logging asdm informational mtu outside 1500 mtu inside 1500 icmp unreachable rate-limit 1 burst-size 1 icmp permit any outside icmp permit any inside asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 0.0.0.0 0.0.0.0 dns tcp 255 255 udp 255 access-group inside_access_in in interface inside route inside 0.0.0.0 0.0.0.0 67.139.113.217 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy http server enable http Eventual 255.0.0.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto ca trustpoint _SmartCallHome_ServerCA crl configure telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd auto_config outside ! dhcpd address 10.209.0.201-10.209.0.232 inside dhcpd dns 8.8.8.8 8.8.4.4 interface inside dhcpd auto_config outside interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept webvpn ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options ! service-policy global_policy global prompt hostname context call-home reporting anonymous Cryptochecksum:d3c4872f997a93984332213f98fbe12b : end asdm location Eventual 255.0.0.0 inside asdm location Local 255.255.255.0 inside asdm location T1 255.255.255.248 inside asdm history enable
Solved! Go to Solution.
04-02-2013 09:25 PM
Hello Sr,
No need to worry .. We are here to help you with this
do the following
No nat (inside) 0 0.0.0.0 0.0.0.0 dns tcp 255 255 udp 255
nat (inside) 1 0 0
no access-group inside_access_in in interface inside
clear configure access-list
fixup protocol Icmp
Then give it a try and let us know
Julio Carvajal
Remember to rate all of the helpful posts
04-03-2013 02:21 PM
Hello,
Ofcourse not
no route inside 0.0.0.0 0.0.0.0 67.139.113.217 1
route outside 0.0.0.0 0.0.0.0 67.139.113.217 1
04-02-2013 09:25 PM
Hello Sr,
No need to worry .. We are here to help you with this
do the following
No nat (inside) 0 0.0.0.0 0.0.0.0 dns tcp 255 255 udp 255
nat (inside) 1 0 0
no access-group inside_access_in in interface inside
clear configure access-list
fixup protocol Icmp
Then give it a try and let us know
Julio Carvajal
Remember to rate all of the helpful posts
04-03-2013 02:10 PM
Unfortunately that didn't work....
The new config:
: Saved : ASA Version 8.2(5) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted names name 10.0.0.0 Eventual name 10.209.0.0 Local name 67.139.113.216 T1 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 0 ip address 10.209.0.3 255.0.0.0 ! interface Vlan2 nameif outside security-level 0 ip address 67.139.113.218 255.255.255.248 ! ! time-range Indefinite ! ftp mode passive same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group protocol DM_INLINE_PROTOCOL_1 protocol-object ip protocol-object icmp protocol-object udp protocol-object tcp pager lines 24 logging enable logging asdm informational mtu outside 1500 mtu inside 1500 icmp unreachable rate-limit 1 burst-size 1 icmp permit any outside icmp permit any inside asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 1 0.0.0.0 0.0.0.0 route inside 0.0.0.0 0.0.0.0 67.139.113.217 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy http server enable http Eventual 255.0.0.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto ca trustpoint _SmartCallHome_ServerCA crl configure telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd auto_config outside ! dhcpd address 10.209.0.201-10.209.0.232 inside dhcpd dns 8.8.8.8 8.8.4.4 interface inside dhcpd auto_config outside interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept webvpn ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp ! service-policy global_policy global prompt hostname context call-home reporting anonymous Cryptochecksum:64bbf533cf1bd591e797c053ea9e107a : end asdm location Eventual 255.0.0.0 inside asdm location Local 255.255.255.0 inside asdm location T1 255.255.255.248 inside asdm history enable
I am getting some more encouraging messages in the Syslog, but I still cannot bing 8.8.8.8 or the outside interface.
5 | Aug 29 2008 | 01:42:55 | 8.8.4.4 | 53 | Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src inside:10.209.0.6/64477 dst inside:8.8.4.4/53 denied due to NAT reverse path failure |
6 | Aug 29 2008 | 01:42:54 | 10.209.0.6 | 1686 | SSL session with client inside:10.209.0.6/1686 terminated. |
6 | Aug 29 2008 | 01:42:54 | 10.209.0.6 | 1686 | 10.209.0.3 | 443 | Deny TCP (no connection) from 10.209.0.6/1686 to 10.209.0.3/443 flags FIN ACK on interface inside |
04-03-2013 02:21 PM
Hello,
Ofcourse not
no route inside 0.0.0.0 0.0.0.0 67.139.113.217 1
route outside 0.0.0.0 0.0.0.0 67.139.113.217 1
04-03-2013 02:59 PM
Now I get a "Destination host unreachable" message
04-03-2013 03:02 PM
From the ASA can you ping: 67.139.113.217
If it works then try to ping 4.2.2.2 from the ASA again
Let me know the results
04-03-2013 03:07 PM
Ooops, sorry.....
I got that destination unreachable message in pinging
67.139.113.217
8.8.8.8
4.2.2.2
04-03-2013 03:35 PM
So there is a connectivity problem between the ASA and the default gateway
Can you make sure that the Device your ISP provide you is connected to ethernet 0/0 on the ASA?
04-03-2013 03:45 PM
Yes it is.
And I can ping all of those from the ping utility in the ASA, using the outside interface (all fail using the inside interface)
04-03-2013 03:47 PM
Hello,
Well that is expected,
I was refering to ping from the outside interface to those destinations,
So that works...
Okay now can you ping from a PC on the inside of the ASA to 10.209.0.3?
Can you ping from a PC on the inside to 67.139.113.217
04-03-2013 03:51 PM
Sorry, I realized there was a misunderstanding about the pings
(I didn't catch the "from ASA" part earlier)
No, I cannot ping from the inside to the outside interface/gateway. (.218/.217)
I can ping from the inside PC to the inside interface (.3)
04-03-2013 03:53 PM
Hhmm Does not make any sense,
What is connected to the End users, just a layer 2 switch??
Regards,
04-03-2013 03:57 PM
Right now, just a single CPU connected to the 5th port.
Eventually I would install a switch on this end to support 20 users/computers, but right now it is a test environment...
T1-> (port 0) Cisco ASA 5505 (port 5) -> laptop computer
I will go get the config posted again, just in case there was any input error on my part.
04-03-2013 03:59 PM
Hello.
Please paste the configuration
and do the following and share the output
packet-tracer input inside icmp ip_address_computer 8 0 4.2.2.2
Also the ipconfig/all from the PC
04-03-2013 04:16 PM
So when I did the ipconfig /all, the gateway was blank within the results (while I had input 10.209.0.3 manually and it was still there in the connection properties).
I changed it to 10.209.0.1 and pinged again, with results timing out
I then changed it back to 10.209.0.3 and pinged again, and it worked.
So obvioiusly I had both some config wrong, and something with my machine not taking the gateway properly.
I thank you for your help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide