01-26-2017 05:19 AM - edited 03-08-2019 09:04 AM
I'm a newbie to Cisco world so bare with me -- We have an ASA 5510 - I'm doing all configurations through the ASDM not CLI. So please excuse my ignorance.
Eth0/0 - WAN
Eth0/1 - LAN (10.0.0.0/24) (99 Security Level)
Eth0/3 - GuestWifi (10.0.40.0/24) (99 Security Level)
The goal is to have Eth0/3 use the internal DNS server in the Eth0/1 interface to resolve DNS queries. I've attempted to configure NAT Exempt
Interface - GuestWifi
Source - Any
Destination - LAN
NAT Exempt Direction - Nat Exempt inbound traffic from interface TTCGuest to higher security interfaces.
Also - configured Access Rules to allow DNS traffic 53 UDP.
Nothing is working, what am I doing wrong.
Thanks in advance!
D
01-26-2017 05:56 AM
Hi,
Have you enabled the same-security-traffic permit inter-interface? On the ASDM this can be found under Configuration -> Device Setup -> Interfaces at the bottom of the main pane. Basically this allows communication between interfaces with same security level.
Cheers,
01-26-2017 06:02 AM
Thanks for the reply-
Both - "Enable traffic between two or more interfaces which are configured with same security levels" and "Enable traffic between two or more hosts connected to the same interface" are checked.
The guest wireless we are using google DNS - which shouldn't matter but just a little more information.
01-26-2017 06:11 AM
Hi,
Do you have connectivity from one interface to the other? Can you ping from GuestWifi the DNS server in LAN (if ping is allowed in your ACLs)?
Cheers,
01-26-2017 06:30 AM
I setup in ACL manager the following:
Action: Permit
Src- GuestWifi/24
Dest - LAN/24
Service - ICMP
(hopefully that's an accurate configuration)
Then pinged from the GuestWifi with no luck.
01-26-2017 06:47 AM
Hi,
The access-list GuestWifi_nat0_outbound extended permit ip any 10.0.0.0 255.255.255.0 is not used by the firewall.
By default inspection of ICMP packets is not on. So the return traffic is probably blocked on the LAN interface (implicit deny). There are two ways to allow icmp:
1. inspect icmp and allow icmp on the inbound GuestWiFi interface.
2. Apply an ACL on the GuestWifi interface (inbound) and one on the LAN inbound for the return traffic.
See if this works for you (testing basic connectivity).
Cheers,
01-26-2017 07:08 AM
Actually i can see that ICMP traffic is inspected:
policy-map global_policy class inspection_default inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp
01-26-2017 07:25 AM
Under further investigation:
The NAT commands are missing the matching global group.
nat (LAN) 0 access-list LAN_nat0_outbound nat (LAN) 1 10.0.0.0 255.255.255.0 nat (LAN) 1 10.0.20.0 255.255.255.0 nat (LAN) 1 10.0.70.0 255.255.255.0
The management NAT rules has no matching ACL:
nat (management) 0 access-list management_nat0_outbound
The two GuestWifi NAT rules:
nat (GuestWifi) 0 access-list GuestWifi_nat0_outbound outside
The above line translates into the one below:
nat (GuestWifi,any) 1 source static any any destination static OBJ-10.0.0.0-24 OBJ-10.0.0.0-24 no-proxy-arp description NONAT
nat (GuestWifi) 1 10.0.40.0 255.255.255.0
nat (GuestWifi) 1 10.0.40.0 255.255.255.0
There is no matching global group.
I think we should focus more on your nat rules.
Cheers,
01-26-2017 06:00 AM
Hi
Within ASDM, under file menu you have the show running-config option. You can paste right here the config and remove all confidential data.
It's not mandatory to use exempt nat if there is no nat between these 2 interfaces.
To troubleshoot you can user in CLI the combat packet-tracer and paste the output:
Packet-tracer input inside udp (hos-guest-ip) 53 (server-dns-inside) 53
It will show you if something is dropped or not.
It also could be the same security interface feature
With the config I'll be able to help you out on this issue.
Thanks
PS: Please don't forget to rate and mark as correct answer if this answered your question
01-26-2017 06:05 AM
There may be several issues impacting this. So we need to work step by step to find and resolve the issues. The first issue is certainly that both Eth0/1 interface and Eth0/3 interface are security level 99. By default ASA will not send traffic to another interface at the same security level. So the config does need the command to permit same security level traffic. If it still does not work after fixing that then we look for other issues.
HTH
Rick
01-26-2017 06:22 AM
Richard -
Even if I have "Enable traffic between two or more interfaces which are configured with the same security levels" checked the traffic between two of the same security level interfaces won't communicate?
01-26-2017 06:32 AM
I am not clear what you are saying here. So let me address it in this way and if it does not address your question then please clarify your question.
By default ASA will not send traffic from one interface to another interface of the ASA which has the same security level. If you check the box to permit this then traffic from Eth0/1 may be sent to Eth0/3, depending on other policies in the ASA. But this does not guarantee that the traffic will be forwarded. There are other policies that might impact the traffic. So if the inter interface traffic is allowed then we need to look for other things that might prevent it. Logical things to check next include whether access lists are applied to interfaces and whether NAT is configured between these interfaces.
HTH
Rick
01-26-2017 06:37 AM
Sorry if I was not clear. Yes- I allowed inter interface traffic between these interfaces.
I'm ready to troubleshoot this issue- what next steps can you provide?
01-26-2017 10:31 AM
Hi
Sorry I wasn't able to answer as I was on site at one of my customers.
There were a lot of exchanges. Could you please tell where we're standing? Did you modified your config based on inputs?
Do you still have your issue? Can you do again a packet-tracer and post the new config?
Thanks
01-26-2017 06:32 AM
I've attached the running-config - also packet tracer gave me an error with NAT -
Info: (acl-drop) Flow is denied by configured rule.
When I select the "Show rule in NAT rules table." where it failed:
Dynamic NAT Interface LAN Src: LAN Trnnslated PoolID 1 WAN interface WAN Address Pool.
Any ideas?
I won't forget to rate the correct answer.... :)
I won't forget to ra
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide