cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1079
Views
0
Helpful
3
Replies

ASA 5510 remote access and traceroute problem?

DejanMilicevic
Level 1
Level 1

We have L3 3750 (InterVlan Routing) with created vlans on it without any restriction between. ASA 5510 is connected on one trunk port on L3 switch with Eth 0/1.1, 01.2,.. subinterfaces for each vlans (for policy rules for limiting bandwith). On Eth 0/2.1 is outside interface with static address e.g. 88.88.88.90 on vlan 50, def route is 88.88.88.89. Static NAT with network-object for each network.We use 8.8.8.8 google DNS.

Problem: All natted network can go to the Internet and thats ok. But when we do tracert from any Internet enabled host it goes only to its gateway (vlan ip) and stops. We cant ping our outside interface 88.88.88.90 from inside networks. And also we cant ping public address from any home PCs-other ISP address 88.88.88.89 we are pinging without any problems. What's the issue here?

What about def route from L3 swith - we don't need any right?

How we can connect to ASA from outside (https,vpn) for management? We created remote vpn, but nothing happens. We permited all traffic to outside intraface, permited icmp,... all permited on in LAN interface, there are no restrictions.

Any help?

1 Accepted Solution

Accepted Solutions

Nagaraja Thanthry
Cisco Employee
Cisco Employee

Hello,

In order for you to ping/traceroute internet destinations, you need to allow

return ICMP traffic on the outside interface. Other way would be to enable

ICMP inspection.

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note0918

6a0080094e8a.shtml

If you would like to manage the firewall from outside (connecting to outside

interface), you need to exclusively enable it. I would not suggest you to

open it up for everybody. If you have a static IP range that you would like

to use when accessing the firewall, then you can configure the following:

Http server enable

Http "IP address" 255.255.255.255 outside

Ssh "IP address" 255.255.255.255 outside

Telnet is not allowed from outside interface. If you are using SSL VPN, then

there could be a conflict of ports on the outside interface. In that case,

you might have to change the port on one of the services i.e. ASDM or WebVPN

(both use port 443).

Hope this helps.

Regards,

NT

View solution in original post

3 Replies 3

Nagaraja Thanthry
Cisco Employee
Cisco Employee

Hello,

Can you please post the relevant configurations here?

Regards,

NT

Nagaraja Thanthry
Cisco Employee
Cisco Employee

Hello,

In order for you to ping/traceroute internet destinations, you need to allow

return ICMP traffic on the outside interface. Other way would be to enable

ICMP inspection.

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note0918

6a0080094e8a.shtml

If you would like to manage the firewall from outside (connecting to outside

interface), you need to exclusively enable it. I would not suggest you to

open it up for everybody. If you have a static IP range that you would like

to use when accessing the firewall, then you can configure the following:

Http server enable

Http "IP address" 255.255.255.255 outside

Ssh "IP address" 255.255.255.255 outside

Telnet is not allowed from outside interface. If you are using SSL VPN, then

there could be a conflict of ports on the outside interface. In that case,

you might have to change the port on one of the services i.e. ASDM or WebVPN

(both use port 443).

Hope this helps.

Regards,

NT

Thanks for the advices, I will try. The above link is down.

Review Cisco Networking products for a $25 gift card