04-16-2013 03:43 AM - edited 03-10-2019 12:02 AM
ASA default gateway in 172.31.224.0/20 subnet. Address is 172.31.224.1.
172.31.224.4 is a gateway to 172.31.100.0/24 subnet. This gateway is connected to same external switch as ASA.
My aim is to make ASA forward packets destined to 172.31.100.0/24 through 172.31.224.4.
Here is parts of the configuration that I've done to get it working:
access-list inside_access_in extended permit ip any any log debugging
access-list NONAT extended permit ip 172.31.224.0 255.255.240.0 172.31.100.0 255.255.255.0
access-list NONAT extended permit ip 172.31.100.0 255.255.255.0 172.31.224.0 255.255.240.0
nat (inside) 0 access-list NONAT
access-group inside_access_in in interface inside
route inside 172.31.100.0 255.255.255.0 172.31.224.4 1
The result is that ping works from 172.31.224.0/20 to 172.31.100.0/24.
Dest MAC is ASA MAC when sending the packets and replies are coming from the GW 172.31.224.4 MAC. So routing works.
But when trying to connect SSH to host 172.31.100.20, connection times out. Some packets can be seen in packet capture between client and SSH server, but still no connection.
If I add route 172.31.100.0 mask 255.255.255.0 gateway 172.31.224.4 to client machine, SSH connection starts working.
So how to configure ASA so that I do not have to create the route to 172.31.100.0/24 in all client machines?
04-16-2013 04:06 AM
Hi / Moi,
If I understood the situation correctly it would seem to me that we are talking possibly talking about asymmetric routing.
Also the problem might be because of the ASA configurations even though you have the route.
Have you configured the "same-security-traffic permit intra-interface"?
This would enable the connection that enters an ASA interface to head out the same interface in which this case seems to be the "inside" interface.
Have you monitored what the ASA logs say. In the capture have you seen any return traffic from the network 172.31.100.0/24 hosts? To my understanding there should be none because of the asymmetric routing.
So if I understood correctly the connection would work this way at the moment
Though I might have missunderstood the situation.
- Jouni
04-16-2013 11:27 AM
Thanks Jouni,
You understood the situation just right and seems that I was talking about asymmetric routing.
same-security-traffic permit intra-interface has been configured. Now I understand that ping is working because it does not require TCP connection.
According to this document https://supportforums.cisco.com/docs/DOC-14491 and example B, which is this situation, there are two options that could be used to fix this:
1. remove the other router 172.31.224.4 and make ASA 172.31.224.1 the ONLY router for 172.31.100.0 network
2. use TCP State Bypass for this traffic
As this option 2 would significantly degrade security I think I'll go with option 1.
04-16-2013 11:38 AM
Yeah,
I tend to avoid any special routing related setups when it comes to ASA firewall since it doesnt handle those that well. Usually either handle the routing on an actual router or if firewall is required, bring the connection first to the ASA on its own interface/subinterface so the traffic flow is something that doesnt cause problems with the ASA or require configuration related workarounds.
Once you decide to use the ASA for some "special" routing setups you will probably end up regretting it in the long run and wish you had done it right the first time
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide