cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
502
Views
10
Helpful
1
Replies

ASA blocked PCs from accessing outside of network.

HeroVax
Level 1
Level 1

Hello, I was doing a sample skills test and I have issue with ASA firewall blocking PCs to access outside of ASA firewall.

HeroVax_0-1668511229408.png

In this scenario, I am trying to ping from PC-B to R1's Loopback (172.20.1.1). Meaning, Inside Network go to Outside Network.

Unfortunately, PC-B only able to ping its default gateway (192.168.10.1). The moment I tried to ping to ASA Interface Gig 1/1 (209.165.200.234), it shows request timeout. This means, it blocks at ASA firewall and prevent PC-B from going outside of the network.

I have use the following configuration:

ASA Firewall Config

 

CCNAS-ASA#sh run

: Saved

:

ASA Version 9.6(1)

!

hostname CCNAS-ASA

domain-name ccnasecurity.com

enable password [deleted to prevent marked as spam] encrypted

names

!

interface GigabitEthernet1/1

nameif outside

security-level 0

ip address 209.165.200.234 255.255.255.248

!

interface GigabitEthernet1/2

nameif inside

security-level 100

ip address 192.168.10.1 255.255.255.0

!

interface GigabitEthernet1/3

no nameif

no security-level

no ip address

shutdown

!

interface GigabitEthernet1/4

no nameif

no security-level

no ip address

shutdown

!

interface GigabitEthernet1/5

no nameif

no security-level

no ip address

shutdown

!

interface GigabitEthernet1/6

no nameif

no security-level

no ip address

shutdown

!

interface GigabitEthernet1/7

no nameif

no security-level

no ip address

shutdown

!

interface GigabitEthernet1/8

no nameif

no security-level

no ip address

shutdown

!

interface Management1/1

management-only

no nameif

no security-level

no ip address

!

object network inside-net

subnet 192.168.10.0 255.255.255.0

nat (inside,outside) dynamic interface

!

route outside 0.0.0.0 0.0.0.0 209.165.200.233 1

!

!

!

aaa authentication ssh console LOCAL

!

username admin password [deleted to prevent marked as spam] encrypted

!

class-map inspection_default

match default-inspection-traffic

!

policy-map type inspect dns preset_dns_map

parameters

message-length maximum 512

policy-map global_policy

class inspection_default

inspect dns preset_dns_map

inspect ftp

inspect tftp

!

service-policy global_policy global

!

telnet timeout 5

ssh 172.30.3.3 255.255.255.255 outside

ssh timeout 10

!

dhcpd address 192.168.10.6-192.168.10.30 inside

dhcpd enable inside

=== END ===

I have provided the pkt and the pdf file under this post. 

Much appreciated for your help

1 Accepted Solution

Accepted Solutions

HeroVax
Level 1
Level 1

After several hours researching, I have found the answer. It turns out I need to configure access-list on ASA firewall, in order to allow INSIDE network to OUTSIDE network.

The following is the configuration added:

CCNAS-ASA(config)#access-list IN-OUT extended permit ip 192.168.10.0 255.255.255.0 any
CCNAS-ASA(config)#access-group IN-OUT in interface inside

Hopefully, this will find helpful for those who seek it.

View solution in original post

1 Reply 1

HeroVax
Level 1
Level 1

After several hours researching, I have found the answer. It turns out I need to configure access-list on ASA firewall, in order to allow INSIDE network to OUTSIDE network.

The following is the configuration added:

CCNAS-ASA(config)#access-list IN-OUT extended permit ip 192.168.10.0 255.255.255.0 any
CCNAS-ASA(config)#access-group IN-OUT in interface inside

Hopefully, this will find helpful for those who seek it.

Review Cisco Networking for a $25 gift card