02-22-2020 12:47 PM - edited 02-22-2020 12:53 PM
Hi
I have 2 networks 192.168.1.0/24 and 192.168.100.0/24 connected to the inside global interface BVI1
Seems ASA did not want to forward packets between different network !!!
I just want the ASA be a simple gateway for any network connect to inside interface ???
Googled many posts, no solution was found for a simple need.
Can anybody help me ?
Here the config
Result of the command: "show config" : Saved : : : Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores) : Written by dtouzeau at 12:55:23.044 UTC Sat Feb 22 2020 ! ASA Version 9.8(2) ! hostname router names ! interface GigabitEthernet1/1 nameif outside security-level 0 ip address 10.10.1.2 255.255.255.0 ! interface GigabitEthernet1/2 bridge-group 1 nameif CABLE_BLANC security-level 100 ! interface GigabitEthernet1/3 bridge-group 1 nameif inside_2 security-level 100 ! interface GigabitEthernet1/4 bridge-group 1 nameif inside_3 security-level 100 ! interface GigabitEthernet1/5 bridge-group 1 nameif inside_4 security-level 100 ! interface GigabitEthernet1/6 bridge-group 1 nameif inside_5 security-level 100 ! interface GigabitEthernet1/7 bridge-group 1 nameif inside_6 security-level 100 ! interface GigabitEthernet1/8 description Vers FreeWifi nameif FREE security-level 100 ip address 192.168.30.75 255.255.255.0 ! interface Management1/1 management-only no nameif no security-level no ip address ! interface BVI1 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 ipv6 nd managed-config-flag ipv6 nd other-config-flag ! ftp mode passive same-security-traffic permit inter-interface same-security-traffic permit intra-interface object network obj_any1 subnet 0.0.0.0 0.0.0.0 object network obj_any2 subnet 0.0.0.0 0.0.0.0 object network obj_any3 subnet 0.0.0.0 0.0.0.0 object network obj_any4 subnet 0.0.0.0 0.0.0.0 object network obj_any5 subnet 0.0.0.0 0.0.0.0 object network obj_any6 subnet 0.0.0.0 0.0.0.0 object network obj_any7 subnet 0.0.0.0 0.0.0.0 object network LocalNetwork subnet 192.168.0.0 255.255.0.0 object network LAN subnet 192.168.0.0 255.255.0.0 description MAISON Network object network googleDN1 host 8.8.8.8 object network RESEAU_100 subnet 192.168.100.0 255.255.255.0 access-list outside_access_in extended permit ip any any4 access-list outside_access_in extended permit ip interface outside any log disable access-list inside_access_in extended permit ip any any log disable pager lines 24 logging asdm informational mtu outside 1500 mtu CABLE_BLANC 1500 mtu inside_2 1500 mtu inside_3 1500 mtu inside_4 1500 mtu inside_5 1500 mtu inside_6 1500 mtu FREE 1500 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 no arp permit-nonconnected arp rate-limit 16384 nat (any,FREE) source dynamic any interface ! object network LAN nat (any,outside) dynamic interface access-group outside_access_in in interface outside access-group inside_access_in in interface inside route outside 0.0.0.0 0.0.0.0 10.10.1.254 1 route inside 192.168.100.0 255.255.255.0 192.168.1.55 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 timeout conn-holddown 0:00:15 timeout igp stale-route 0:01:10 user-identity default-domain LOCAL aaa authentication ssh console LOCAL aaa authentication telnet console LOCAL aaa authentication login-history http server enable http 192.168.1.0 255.255.255.0 CABLE_BLANC http 192.168.1.0 255.255.255.0 inside_2 http 192.168.1.0 255.255.255.0 inside_3 http 192.168.1.0 255.255.255.0 inside_4 http 192.168.1.0 255.255.255.0 inside_5 http 192.168.1.0 255.255.255.0 inside_6 no snmp-server location no snmp-server contact service sw-reset-button crypto ipsec security-association pmtu-aging infinite crypto ca trustpoint _SmartCallHome_ServerCA no validation-usage crl configure crypto ca trustpool policy crypto ca certificate chain _SmartCallHome_ServerCA certificate ca 513fb9743870b73440418d30930699ff 30820538 30820420 a0030201 02021051 3fb97438 70b73440 418d3093 0699ff30 0d06092a 864886f7 0d01010b 05003081 ca310b30 09060355 04061302 55533117 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31 33313033 31303030 3030305a 170d3233 31303330 32333539 35395a30 7e310b30 09060355 04061302 5553311d 301b0603 55040a13 1453796d 616e7465 6320436f 72706f72 6174696f 6e311f30 1d060355 040b1316 53796d61 6e746563 20547275 7374204e 6574776f 726b312f 302d0603 55040313 2653796d 616e7465 6320436c 61737320 33205365 63757265 20536572 76657220 4341202d 20473430 82012230 0d06092a 864886f7 0d010101 05000382 010f0030 82010a02 82010100 b2d805ca 1c742db5 175639c5 4a520996 e84bd80c f1689f9a 422862c3 a530537e 5511825b 037a0d2f e17904c9 b4967719 81019459 f9bcf77a 9927822d b783dd5a 277fb203 7a9c5325 e9481f46 4fc89d29 f8be7956 f6f7fdd9 3a68da8b 4b823341 12c3c83c ccd6967a 84211a22 04032717 8b1c6861 930f0e51 80331db4 b5ceeb7e d062acee b37b0174 ef6935eb cad53da9 ee9798ca 8daa440e 25994a15 96a4ce6d 02541f2a 6a26e206 3a6348ac b44cd175 9350ff13 2fd6dae1 c618f59f c9255df3 003ade26 4db42909 cd0f3d23 6f164a81 16fbf283 10c3b8d6 d855323d f1bd0fbd 8c52954a 16977a52 2163752f 16f9c466 bef5b509 d8ff2700 cd447c6f 4b3fb0f7 02030100 01a38201 63308201 5f301206 03551d13 0101ff04 08300601 01ff0201 00303006 03551d1f 04293027 3025a023 a021861f 68747470 3a2f2f73 312e7379 6d63622e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403 02010630 2f06082b 06010505 07010104 23302130 1f06082b 06010505 07300186 13687474 703a2f2f 73322e73 796d6362 2e636f6d 306b0603 551d2004 64306230 60060a60 86480186 f8450107 36305230 2606082b 06010505 07020116 1a687474 703a2f2f 7777772e 73796d61 7574682e 636f6d2f 63707330 2806082b 06010505 07020230 1c1a1a68 7474703a 2f2f7777 772e7379 6d617574 682e636f 6d2f7270 61302906 03551d11 04223020 a41e301c 311a3018 06035504 03131153 796d616e 74656350 4b492d31 2d353334 301d0603 551d0e04 1604145f 60cf6190 55df8443 148a602a b2f57af4 4318ef30 1f060355 1d230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300d0609 2a864886 f70d0101 0b050003 82010100 5e945649 dd8e2d65 f5c13651 b603e3da 9e7319f2 1f59ab58 7e6c2605 2cfa81d7 5c231722 2c3793f7 86ec85e6 b0a3fd1f e232a845 6fe1d9fb b9afd270 a0324265 bf84fe16 2a8f3fc5 a6d6a393 7d43e974 21913528 f463e92e edf7f55c 7f4b9ab5 20e90abd e045100c 14949a5d a5e34b91 e8249b46 4065f422 72cd99f8 8811f5f3 7fe63382 e6a8c57e fed008e2 25580871 68e6cda2 e614de4e 52242dfd e5791353 e75e2f2d 4d1b6d40 15522bf7 87897812 816ed94d aa2d78d4 c22c3d08 5f87919e 1f0eb0de 30526486 89aa9d66 9c0e760c 80f274d8 2af8b83a ced7d60f 11be6bab 14f5bd41 a0226389 f1ba0f6f 2963662d 3fac8c72 c5fbc7e4 d40ff23b 4f8c29c7 quit telnet 192.168.1.0 255.255.255.0 CABLE_BLANC telnet timeout 5 ssh stricthostkeycheck ssh 192.168.1.0 255.255.255.0 CABLE_BLANC ssh 192.168.1.0 255.255.255.0 inside_2 ssh timeout 5 ssh key-exchange group dh-group1-sha1 console timeout 0 dhcpd auto_config outside ! dhcpd address 192.168.1.150-192.168.1.254 inside dhcpd dns 192.168.1.118 192.168.1.101 interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept dynamic-access-policy-record DfltAccessPolicy ! class-map inspection_default match default-inspection-traffic ! ! policy-map global_policy class inspection_default inspect icmp inspect ctiqbe inspect dcerpc inspect dns inspect esmtp inspect ftp inspect h323 h225 inspect h323 ras inspect http inspect icmp error inspect ils inspect ip-options inspect ipsec-pass-thru inspect lisp inspect mgcp inspect netbios inspect pptp inspect rsh inspect rtsp inspect sip inspect skinny inspect snmp inspect sqlnet inspect stun inspect sunrpc inspect tftp inspect vxlan inspect waas inspect xdmcp ! service-policy global_policy global prompt hostname context Cryptochecksum:68819168f0a727a74e30b5baa056a36e
02-24-2020 07:02 AM
There are several things in the config that I wonder about, such as the access list applied to the inside interface showing as disable. But I believe that the main issue is probably that your ASA route for 192.168.100.0 has 192.168.1.55 as its next hop. Your diagram identifies this as some type of firewall. I would check that device for a security policy that does not permit traffic between the networks.
02-24-2020 10:11 AM
Hello,
post the output of:
sudo iptables -L -v
from the iptables firewall...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide