|
I'm having a hell of time figuring out this problem with ASA. This is my first time configuring a firewall and I'm a bit in over my head. I have a 4507 switch and an ASA5510 firewall. The outside interface goes to the internet. The inside interface is a point to point link to the switch. The asa-side IP is 192.168.99.1 and the switch side non-switch-port is 192.168.99.2. The DMZ is a trunk that goes to the switch carrying the DMZ vlan 120. That vlan is configured with an ip of 192.168.100.1. The switch has a non routed vlan 120 which is assigned to a port. On that port I have a server (192.168.100.9) who's default gateway is the ASA's 192.168.100.1. I have a routed vlan 20 on the switch that goes out to another server (192.168.0.20). How do I make the DMZ communicate with the server's VLAN. (ping from the 100.9 to the 0.20 and vice versa) I have included a sketch of what I mean. 0.0.0.0 traffic goes to 192.168.99.1. I'm currently on site and have been hacking away at this for hours. Maybe someone can let me know what I'm missing.
|
# ¿ Jul 6, 2007 00:24 |
|
|
# ¿ Apr 27, 2024 20:55 |
|
Tremblay posted:Captain, post a show ip route from that switch plz. I think the switch is just doing the routing for you, which you don't want. Gateway of last resort is 192.168.99.1 to network 0.0.0.0 C 192.168.14.0/24 is directly connected, Vlan34 C 192.168.8.0/24 is directly connected, Vlan28 C 192.168.10.0/24 is directly connected, Vlan30 C 192.168.99.0/24 is directly connected, Vlan40 C 192.168.6.0/24 is directly connected, Vlan26 C 192.168.0.0/24 is directly connected, Vlan20 C 192.168.100.0/24 is directly connected, Vlan120 S* 0.0.0.0/0 [1/0] via 192.168.99.1 I set up a interface vlan on the switch as a last resort to communicate with that server. The IP is 192.168.100.2. Doing that I can ping the server on the DMZ from the switch but not from any other network.
|
# ¿ Jul 6, 2007 01:15 |
|
Tremblay posted:Yeah see how: I want the switch to do all the routing except for the DMZ Vlan. The server in the DMZ is an ISA server and needs to communicate with Exchange which is on the 20 Vlan so connections come in from the internet, to the DMZ through the ISA server which needs to talk to the 20 vlan to get to exchange. Also, I have subnet-zero enabled. That's why I have 192.168.0.0/24.
|
# ¿ Jul 6, 2007 01:28 |
|
Tremblay posted:Right, so what I am saying is, since you have a L3 vlan interface on the switch that resides in the DMZ subnet. The switch is currently routing between the .99 and .100 subnets and not the ASA. This is NOT what you want to happen. Thanks. Even when the 4507 was not routing, i still couldn't get through. What's the next step?
|
# ¿ Jul 6, 2007 01:37 |
|
Tremblay posted:You need the static nats I posted above. ASA by default requires a NAT config to get traffic from one interface to another. So basically what we do is write NAT statements that essentially NAT traffic to their original IP addresses. The order of the interfaces is important since it controls which interface proxy ARPs for the subnet or host IP configured. If you flip the interface order you can wind up having the FW and hosts ARPing for the same addresses and that makes a headache. This is fantastic, I didn't know i could use NAT to route traffic that way. I had to go for the day but I'll pick this up in the morning. I only saw half of your post before so I missed the static entries. Now that I'm home, I'm going to read up on this to speed things up tomorrow. Thanks again.
|
# ¿ Jul 6, 2007 02:25 |
|
Is there a way to alter the access list of a PIX 515e on a live network without it being automatically removed from the interface? I have an entry that needs to go at the very top. Should I just write it up in notepad and execute it quick to minimize downtime? I'm worried about making typo or something and then I have a half finished ACL with erroneous entries that I have to clean up. So, editing a firewall ACL without downtime. Impossible?
|
# ¿ Aug 1, 2007 18:13 |
|
Tremblay posted:Hey, sorry I missed your previous IMs. It depends on the version of code. I think line numbers were introduced in 6.3. Thanks for the response. This version hasn't introduced accesslist numbers yet and PDM isn't installed. I ended up just asking permission to have a brief lapse in connectivity and applied the new rules successfully without too much noise.
|
# ¿ Aug 3, 2007 17:20 |
|
Cisco's site is down! Can someone verify if it's just on my end? I really need to get my hands on some of those sweet docs.
|
# ¿ Aug 8, 2007 19:03 |
|
|
# ¿ Apr 27, 2024 20:55 |
|
Interesting. What used to return a timeout now gives this:code:
|
# ¿ Aug 8, 2007 20:52 |