cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1035
Views
0
Helpful
2
Replies

CISCO ASA5510 help

shalvin_caaf
Level 1
Level 1

My Scenario:

Cisco ASA 5510 directly facing the internet on E0/0 (1 Public IP only) with internal LAN on E0/1. Exchange 2010 OWA working fine with ACL and NAT rules configured.

Problem:

  • •1.       Cannot publish internal web servers to outside, have tried PAT.
  • •2.       Have multiple web servers to publish with all on one protocol (HTTP) to a single public IP which I don’t know if it’s possible on a ASA.
  • •3.       When SSL VPN is configured with Local user database, connecting from Anyconnect client gives a certificate error. Upon viewing the certificate it points to the internal mail server.

Help please .

2 Replies 2

James Leinweber
Level 4
Level 4

You may get more responses to this if you pose it in the firewalling discussion group.

What version of the ASA software are you running?   There is a NAT syntax and function discontinuity at 8.3.

For (1) and (2), you can publish multiple servers from inside private addresses to a single public outside address using static PAT provided the outside mapped ports are all different.

For (3), I'm guessing the the parent certificate which signed your ASA cert isn't configured as a trustpoint.

Would it be possible for you to post your configuration, or excerpts from it?

-- Jim Leinweber, WI State Lab of Hygiene

Hi,

Thanks for the reply, I'm running v8.2(5).

Please find below my asa config:

: Saved

:

ASA Version 8.2(5)

!

hostname xxxciSCOASAXX

enable password encrypted

passwd encrypted

names

name 10.70.75.XX XXXsrvmx01 description Exchange-Server

name 202.62.XXX.XXX mail.caaf.org.fj description ExtInt

name 10.70.75.XX XXcenter description vmware

name 10.70.75.XX DVR description dvr

name 10.70.75.XX ICTA description ICT Laptop

name 10.70.75.XX XXXsrvaqd01 description AQDportal

name 10.70.75.XX XXSS-Int description hrss

name 10.70.75.XX otrs description otrs

dns-guard

!

interface Ethernet0/0

description WAN_Link

nameif outside

security-level 0

ip address XXX.XXX.org.fj 255.255.255.252

!

interface Ethernet0/1

description LAN_Link

nameif inside

security-level 100

ip address 10.70.75.XX 255.255.255.0

!

interface Ethernet0/2

shutdown

no nameif

no security-level

no ip address

!

interface Ethernet0/3

shutdown

no nameif

no security-level

no ip address

!

interface Management0/0

nameif management

security-level 100

ip address 192.168.1.1 255.255.255.0

management-only

!

ftp mode passive

clock timezone FJST 12

object-group service DM_INLINE_TCP_1 tcp

port-object eq ftp

port-object eq www

port-object eq https

port-object eq pop3

port-object eq smtp

object-group service DM_INLINE_TCP_2 tcp

port-object eq https

port-object eq smtp

object-group protocol TCPUDP

protocol-object udp

protocol-object tcp

access-list global_mpc extended permit tcp any any object-group DM_INLINE_TCP_1

access-list outside_access_in_1 extended permit tcp any interface outside object-group DM_INLINE_TCP_2

access-list outside_access_in_1 extended permit tcp any interface outside eq 100

pager lines 24

logging enable

logging asdm informational

mtu outside 1500

mtu inside 1500

mtu management 1500

icmp unreachable rate-limit 1 burst-size 1

icmp permit any inside

asdm image disk0:/asdm-645.bin

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 0.0.0.0 0.0.0.0

static (inside,outside) tcp interface smtp XXXsrvmx01 smtp netmask 255.255.255.255

static (inside,outside) tcp interface https XXXsrvmx01 https netmask 255.255.255.255

static (inside,outside) tcp interface 100 DVR 100 netmask 255.255.255.255

access-group outside_access_in_1 in interface outside

route outside 0.0.0.0 0.0.0.0 202.62.xxx.xxx 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

http server enable

http 192.168.1.0 255.255.255.0 management

http 0.0.0.0 0.0.0.0 inside

http authentication-certificate inside

http authentication-certificate management

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto ca trustpoint _SmartCallHome_ServerCA

crl configure

crypto ca trustpoint ASDM_TrustPoint0

enrollment self

subject-name CN=xxxCISCOASAxx

crl configure

crypto ca server

shutdown

smtp from-address admin@xxxCISCOASAxx.null

  quit

telnet 0.0.0.0 0.0.0.0 inside

telnet timeout 5

ssh timeout 5

console timeout 0

dhcpd address 192.168.1.2-192.168.1.254 management

dhcpd enable management

!

threat-detection basic-threat

threat-detection scanning-threat

threat-detection statistics host

threat-detection statistics access-list

threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200

ssl trust-point ASDM_TrustPoint0 outside

webvpn

svc enable

group-policy DfltGrpPolicy attributes

vpn-tunnel-protocol IPSec l2tp-ipsec

group-policy remoteVPN internal

group-policy remoteVPN attributes

vpn-tunnel-protocol webvpn

tunnel-group RemoteVPN type remote-access

tunnel-group RemoteVPN general-attributes

address-pool VPN_pool

default-group-policy remoteVPN

!

class-map global-class

match access-list global_mpc

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect rsh

  inspect rtsp

  inspect esmtp

  inspect sqlnet

  inspect skinny 

  inspect sunrpc

  inspect xdmcp

  inspect sip 

  inspect netbios

  inspect tftp

  inspect ip-options

  inspect icmp

  inspect icmp error

class global-class

  csc fail-close

!

service-policy global_policy global

prompt hostname context

call-home reporting anonymous

Cryptochecksum:fd21551

: end

Review Cisco Networking products for a $25 gift card