09-03-2019 12:51 AM
asa firewall, inside interface,security level 100, test interface,security level 40.
there is no access list on test interface.
depend on default rule, level 100 can access level 40.
why unable to access?
thanks
Solved! Go to Solution.
09-05-2019 06:51 PM
bhargavdesai,
thanks for you help!
i disable nat rule
nat (Inside,Outside) source static vpnsource1 vpnsource1 destination static vpndest1 vpndest1
everything is fine.
09-05-2019 08:12 PM
09-03-2019 01:08 AM
Hi there,
Since your didn't specify, does the inside interface have an inbound ACL configured on it?
cheers,
Seb.
09-03-2019 01:43 AM
inside level 100:192.168.10.0,dmz level 50:192.168.100.0, test level 40:192.168.0.0
there is acl:
access-list split extended permit ip 192.168.10.0 255.255.255.0 any
access-list split extended permit ip 192.168.100.0 255.255.255.0 any
access-list split extended permit ip 192.168.0.0 255.255.255.0 any
is this inbound acl?
but,no apply to inside interface(no access-group)
there is dmz, security level 50, inside can access dmz,but unable access security level 40.
09-03-2019 02:16 AM
An ACL with the name 'split' sounds like it will be used for remote access VPN.
Can you confirm if devices connected to the test interface are receiving packets from he inside interface? Do the devices on the test subnet have the correct subnet mask and gateway address?
09-03-2019 02:24 AM
ip local pool vpnpool 10.10.10.1-10.10.10.254
!
interface GigabitEthernet0/0
nameif Outside
security-level 0
ip address x.x.x.x 255.255.255.252
!
interface GigabitEthernet0/1
nameif Inside
security-level 100
ip address 192.168.10.1 255.255.255.0
!
interface GigabitEthernet0/2
nameif DMZ
security-level 50
ip address 192.168.100.1 255.255.255.0
!
interface GigabitEthernet0/3
nameif Test
security-level 40
ip address 192.168.0.1 255.255.255.0
object network pool
subnet 192.168.0.0 255.255.0.0
object network 192.168.0.11-9802
host 192.168.0.11
object network 192.168.0.11-9803
host 192.168.0.11
object network 192.168.0.11-9804
host 192.168.0.11
object network 192.168.100.88-8999
host 192.168.100.88
access-list Outside-in extended permit tcp any host 192.168.0.11 eq 9802
access-list Outside-in extended permit tcp any host 192.168.0.11 eq 9803
access-list Outside-in extended permit tcp any host 192.168.0.11 eq 9804
access-list Outside-in extended permit tcp any host 192.168.100.88 eq 8999
object network 192.168.0.11-9802
nat (Test,Outside) static interface service tcp 9802 9802
object network 192.168.0.11-9803
nat (Test,Outside) static interface service tcp 9803 9803
object network 192.168.0.11-9804
nat (Test,Outside) static interface service tcp 9804 9804
object network 192.168.100.88-8999
nat (DMZ,Outside) static interface service tcp 8999 8999
nat (Inside,Outside) after-auto source dynamic any interface
nat (Test,Outside) after-auto source dynamic any interface
access-group Outside-in in interface Outside
thanks!
09-03-2019 04:02 AM
You can always run the Packet Tracer to see what is blocking traffic. Packet Tracer is available in ASDM and you can also run it from CLI.
You can search for Packet Tracer.
Bhaggu
09-03-2019 02:29 AM
Based on what you write (and don't write; you never say what exactly does not work) I assume that you are just doing a wrong test. Are you trying to access the IP of the ASA-interface Test from inside? That will not work by design on the ASA. Use real traffic (like something based on TCP) to a host on the test interface.
09-03-2019 11:45 PM
packet tracer
from 192.168.10.26, in inside network
to 192.168.0.181,in test network,why destination is outside?
09-04-2019 11:43 PM
It seems that your Gig 0/3 (TEST) is not up or having some issue. Can your post the output of
Show route
Show int ip brief
Show nameif
Sorry for delayed response.
Bhaggu
09-05-2019 12:10 AM
09-05-2019 02:16 AM
Can you post packet tracer log from SSH session. Moreover is there any Firepower PBR or other thing is picture.
packet-tracer input Inside tcp 192.168.10.26 12345 192.168.0.181 9804 detailed
We need to know that is causing the destination to be on OUTSIDE rather than more specific TEST interface.
Bhaggu.
09-05-2019 02:38 AM
09-05-2019 02:51 AM
According to the output the below rule may be causing issue.
nat (Inside,Outside) source static vpnsource1 vpnsource1 destination static vpndest1 vpndest1
Can you just share full configuration or try disabling the above NAT rule.
Bhaggu
09-05-2019 06:51 PM
bhargavdesai,
thanks for you help!
i disable nat rule
nat (Inside,Outside) source static vpnsource1 vpnsource1 destination static vpndest1 vpndest1
everything is fine.
09-05-2019 08:12 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide