06-03-2017
03:22 PM
- last edited on
03-25-2019
06:00 PM
by
ciscomoderator
Dear Support;
I have 2 Cisco ASA 5520 running 8.3 version
The two asa are connected back to back.
I want to allow internal netwrok behind asa 2 to access Internet Throught ASA 1.
I want to also allow somme remote sites directellly connected to ASA 2 to access Internal server in LAN and others servers in DMZ Internal 1 & 2
Internal Network must access all dmz and internet
Please how can i configure the Internal ASA
Need your Help
Solved! Go to Solution.
06-03-2017 08:10 PM
Hi
Your 1st asa facing internet will be the one handling the nat and exempt nat from your remote site or vpn accessing internal lan behind internal asa.
Your internal asa will be configured like a standard asa (acl, routing) except for nat. It won't have any nat configuration.
This means that all acls on your internal asa will see the traffic with its real source ip.
Maybe you're expecting specific answers. If yes, can you detail your question? What do you want to know when saying how to configure your internal asa?
Thanks.
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-04-2017 08:34 AM
Hi
You'll need to configure it as standard asa even if it's not doing nat. That said it means lan will have security level of 100 and your wan facing inside of your 1st asa will have s security level of 0.
For the dmz, it depends the data behind it. Don't forget when you setting your security level that higher interface level can access the lowest one.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-03-2017 08:10 PM
Hi
Your 1st asa facing internet will be the one handling the nat and exempt nat from your remote site or vpn accessing internal lan behind internal asa.
Your internal asa will be configured like a standard asa (acl, routing) except for nat. It won't have any nat configuration.
This means that all acls on your internal asa will see the traffic with its real source ip.
Maybe you're expecting specific answers. If yes, can you detail your question? What do you want to know when saying how to configure your internal asa?
Thanks.
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-04-2017 12:16 AM
Dear Francesco
Thanks for you reply, your are right, i wan t my internal asa acting as router and acl only, no need nat here.
My question is, How to define me securiy-level on differents interfaces which are differents dmz?
I have 7 differents subnets connected on 7 interfaces.
What will be the security-level for the interface connected to Internal lan
what will be the security-level for the interface connected to Internet ASA.
Many Thanks
06-04-2017 08:34 AM
Hi
You'll need to configure it as standard asa even if it's not doing nat. That said it means lan will have security level of 100 and your wan facing inside of your 1st asa will have s security level of 0.
For the dmz, it depends the data behind it. Don't forget when you setting your security level that higher interface level can access the lowest one.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-04-2017 01:00 PM
Hi Francesco,
Many thanks for your support, it's worked, from internal network i can reach internet.
The only issue is that From internal network behind Internal Firewall i cannot ping server located in DMZ 2 connected to Internet Firewall.
But when i created a policy any any ip from inside interface it's worked on Internet firewall.
Normally from inside (security-level 100) to lower security-level no need policy
I reach internet without this policy but cannot reach servers in DMZ 2
Regards
06-04-2017 02:11 PM
Hi
Not sure I get it right. Maybe you can share some configs to take a look.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
06-04-2017 10:14 PM
06-05-2017 11:00 AM
Hi Francesco
Thanks for you support
i solved the issue, it was nat exempt
On Internet firewall, traffic from inside to dmz 1 and dmz4 must not be translated, so nat exempt is requiered.
i applied it and it worked fine Now
06-05-2017 08:04 PM
Hi
Sorry for my late answer.
Yes you need nat exempt for internal communication between your different zones.
Thanks
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide