cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
354
Views
0
Helpful
1
Replies

Port Forwarding ( PAT ) issue on ASA5505

Martijn de Loos
Level 1
Level 1

Hello all,

I have a very weird issue concerning PAT.

I have an ASA5505 with ASA8.2(2) running. The outside interface is on "dhcp setroute" mode and receives an IP address from our ISP. The inside interface is connected to a switch with desktops connected it. I have specified a NAT rule which allows the inside network to NAT over the outside interface and I have specified an ACL on the inside interface which allows all incoming traffic to the outside world. This works perfectly so far. Every host has internet connection.

Here comes the tricky part where I'm already stuck on for a day. There is one host which runs a Teamspeak2 server on port 4444. So in ASDM, I created a static NAT rule specifying the inside adres of the host to be translated over the outside interface using PAT UDP 4444. I created an ACL on the outside interface specifying that "any" incoming to destination "outside" on UDP/4444 should be allowed. However, no one is able to access my Teamspeak2 server, including myself. I can only connect to it on the internal address, so the server is actually running!

I also tried the same with RDP. No success either. There is no (Windows) firewall running on the end hosts. Please see my config below and the attached screenshots. I hope someone can help me out.

hostname ciscoasa

enable password 8Ry2YjIyt7RRXU24 encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface Vlan1

nameif inside

security-level 100

ip address 192.168.1.254 255.255.255.0

!

interface Vlan10

nameif outside

security-level 0

ip address dhcp setroute

!

interface Ethernet0/0

!

interface Ethernet0/1

!

interface Ethernet0/2

shutdown

!

interface Ethernet0/3

shutdown

!

interface Ethernet0/4

shutdown

!

interface Ethernet0/5

shutdown

!

interface Ethernet0/6

shutdown

!

interface Ethernet0/7

switchport access vlan 10

!

boot system disk0:/asa822-k8.bin

ftp mode passive

dns domain-lookup outside

dns server-group DefaultDNS

name-server 8.8.8.8

same-security-traffic permit intra-interface

access-list inside_access_in extended permit ip any any

access-list outside_access_in extended permit udp any interface outside eq 4444

access-list outside_access_in extended permit tcp any interface outside eq 3389

access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 10.7.0.0 255.255.0.0

access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 10.0.0.0 255.255.0.0

access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 10.7.0.0 255.255.0.0

access-list outside_2_cryptomap extended permit ip 192.168.1.0 255.255.255.0 10.0.0.0 255.255.0.0

pager lines 24

logging enable

logging asdm informational

mtu inside 1500

mtu outside 1500

no failover

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-631.bin

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list inside_nat0_outbound

nat (inside) 1 0.0.0.0 0.0.0.0 dns

static (inside,outside) tcp interface 3389 192.168.1.101 3389 netmask 255.255.255.255

static (inside,outside) udp interface 4444 192.168.1.101 4444 netmask 255.255.255.255

access-group inside_access_in in interface inside

access-group outside_access_in in interface outside

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

http server enable

http 192.168.1.104 255.255.255.255 inside

http 192.168.1.101 255.255.255.255 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto map outside_map 1 match address outside_1_cryptomap

crypto map outside_map 1 set pfs

crypto map outside_map 1 set peer 85.***.***.***

crypto map outside_map 1 set transform-set ESP-3DES-SHA

crypto map outside_map 2 match address outside_2_cryptomap

crypto map outside_map 2 set pfs

crypto map outside_map 2 set peer 217.***.***.***

crypto map outside_map 2 set transform-set ESP-3DES-SHA

crypto map outside_map interface outside

crypto isakmp enable outside

crypto isakmp policy 10

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

telnet timeout 5

ssh timeout 5

console timeout 0

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

group-policy DfltGrpPolicy attributes

tunnel-group 85.***.***.*** type ipsec-l2l

tunnel-group 85.***.***.*** ipsec-attributes

pre-shared-key *****

tunnel-group 217.***.***.*** type ipsec-l2l

tunnel-group 217.***.***.*** ipsec-attributes

pre-shared-key *****

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny 

  inspect esmtp

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip 

  inspect xdmcp

  inspect ip-options

  inspect icmp

  inspect icmp error

!

service-policy global_policy global

prompt hostname context

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

NAT.PNG

ACL.PNG

1 Reply 1

Gajendra R'
Level 1
Level 1

hi Friend ,

  as of i understand that you have configure same port to be translate with same port no only.. which i think should not be like this...either way you do one thing

remove below config.(its doest not make any sense where same port to going to translate with same one )

static (inside,outside) tcp interface 3389 192.168.1.101 3389 netmask 255.255.255.255

static (inside,outside) udp interface 4444 192.168.1.101 4444 netmask 255.255.255.255

try to modify your below config which i thik in wrong direction you put it.

  access-group inside_access_in in interface inside

( access-group inside_access_in in interface outside)

Thanks

Enjoy........

Review Cisco Networking for a $25 gift card