01-24-2017 04:44 PM - edited 03-12-2019 01:49 AM
This is driving me a little crazy so any help would be nice. I am having trouble with public server. I was about to one for smtp and it seem to work, but when I tried doing one for the web server using https and http I am having issues. I am unable to get to the servers after setting them up. I have tried a few different Access Rules and NAT Rules but I just seem able to get this to work. I have a ASA 5506. Attached is my current running config. I am not running a DMZ. I would be glad for any help!
Solved! Go to Solution.
01-27-2017 10:14 AM
Hi
We get a private IM for your concern and the answer was:
You won't be able to ping your Outside IP from internal zone and even your NAT Public IP. If you look at your logs (try pinging your nat public IP), you should see a message like Deny IP due to Land Attack from
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-24-2017 05:43 PM
Hi,
I'm sorry but I don't understand what issue your facing?
I checked your config and you have 2 NAT that seems to be ok.
Thanks
01-24-2017 09:23 PM
Well I setup these public servers to allow our web servers to make a site accessible off network via ssl https. But I cannot seem to get it to work.
01-25-2017 05:32 AM
Hi
Did you do the capture?
For the firewall rules, everything is fine but as it has been told, you can make some cleanup and/or tweak rules /NAT already existing
Thanks
01-26-2017 03:19 PM
Doing the capture lead me to test on my cell phone. I am still trying to fine what is stopping it from being accessible from the inside.
01-24-2017 05:48 PM
Can you confirm if the issue is with 20.1.1.37. I see that you have NAT and access rule allowing smtp and https traffic. Please attach packet-tracer output for 20.1.1.37 and port 443 and lets see what ASA is doing with this traffic.
I would also advise to remove the below NAT statement since there is one already in twice nat section. Use of 'any' keyword in NAT statement can sometimes get us unexpected results:
object network obj_any nat (any,outside) dynamic interface
In future, it would be best if you can attach some more useful info like related ip address, packet-tracer output etc. It saves time for everyone.
-
AJ
01-24-2017 09:19 PM
01-25-2017 03:22 AM
ok, so 20.1.1.6 maps to 85.150.14.26 and 20.1.1.37 maps to 85.150.14.26.
And you need to access these servers from internet over https.
Now, please clarify which one is not working. The config seems to be legit, although it can fine tuned but we can keep it for a later stage once testing is done.
Can you check if the ip addresses you are using is routable if you are using them for the first time. One thing we can do for testing is to create a test nat using outside interface and see if that works:
object network owa-server
nat (inside,outside) static interface service tcp 443 443
Please test it. If it works, then we will have to check if the public ip address you are using are routable.
As a tshoot step, we can also set up captures on outside interface to see if traffic is arriving for a specific ip address:
cap capo interface outside match ip any host 85.150.14.26
and then initiate traffic on this ip on port 443.
then take output of show cap capo
-
AJ
01-26-2017 03:17 PM
Sorry. After everything I did figure out that they are showing up outside the network after testing on my cell phone. The problem is that inside my network I cannot access them.
I have checked the DNS and everything seems fine. I cannot still access it from inside the network. I also cannot ping the outside interface from inside the network. Any ideas?
Also I have turn on our old gateway which the ASA replaced, I setup a PC to use that as the gateway as a test. I am about to get to the sites with no problem. It seems it only happens via the ASA that we cannot access it on the network.
01-26-2017 03:55 PM
Hi
Can you tell what tests are you doing? What it isn't accessible?
And please provide packet-tracer logs.
Thanks
01-27-2017 10:14 AM
Hi
We get a private IM for your concern and the answer was:
You won't be able to ping your Outside IP from internal zone and even your NAT Public IP. If you look at your logs (try pinging your nat public IP), you should see a message like Deny IP due to Land Attack from
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-25-2017 04:43 AM
Can you check if the ip addresses you are using is routable if you are using them for the first time. One thing we can do for testing is to create a test nat using outside interface and see if that works:
object network owa-server
nat (inside,outside) static interface service tcp 443 443
Please test it. If it works, then we will have to check if the public ip address you are using are routable.
As a tshoot step, we can also set up captures on outside interface to see if traffic is arriving for a specific ip address:
cap capo interface outside match ip any host 85.150.14.26
and then initiate traffic on this ip on port 443.
then take output of show cap capo
01-25-2017 08:45 AM
Thanks for the help that kind of lead me to some more testing and I found out that I can access it but just not from inside my network. I have to now figure out what is blocking it from inside. Maybe I need to setup a NAT Loopback?
01-25-2017 08:58 AM
On your ASA, please do the following packet-tracer and paste the output:
packet-tracer input outside tcp 8.8.8.8 5565 85.150.14.29 443
If it's allowed then the issue isn't coming from ASA but something else internally.
01-25-2017 09:43 AM
Yeah agreed All are allowed
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide