cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1506
Views
0
Helpful
5
Replies

ASA 5505 Security Plus - interinterface routing

jfendrody
Level 1
Level 1

Hello,

I am stuck with a routing problem on a ASA 5505 Security Plus firewall.


I have two inside networks. One for guests, one for employees. I need guests to be able to print on printers located on the employee (inside) network.

Of course, I do not want guests to access any other resources on the inside network.

I tried to configure objects to allow routing between interfaces and allow printer access unfortunately with no luck so far.

Actually, I can't even ping the inside interface of firewall from the guest network ...

Any leads on how to proceed would be most welcome.

Thanks,

JF

Technical informations

Firewall firmware :

Cisco Adaptive Security Appliance Software Version 8.3(1)
Device Manager Version 6.3(1)

Interface configuration :

interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan12
nameif guests
security-level 10
ip address 192.168.12.1 255.255.255.0

Last (unsucessful) configuration :

access-list guests_access_in extended permit ip any any
access-group guests_access_in in interface guests

static (inside,guests) 192.168.0.26 192.168.0.26 netmask 255.255.255.255
static (guests,inside) 192.168.12.0 192.168.12.0 netmask 255.255.255.0

1 Accepted Solution

Accepted Solutions

Excellent, would you please mark this question as resolve so other people can take it as reference?

Cheers

Mike

Mike

View solution in original post

5 Replies 5

Maykol Rojas
Cisco Employee
Cisco Employee

Hello

My name is Mike, I am going to try to help you out over here. Basically what you need to do is to translate (NAT) the higher security level (In order to have control for this). Your version is 8.3 so the static commands that you are using are not going to work.

Here is what  you do.

Object network Printer

  host

nat (inside,guest) source static Printer Printer

Then you will need the ACL on the guest interface (the one that you have works fine)

access-list guests_access_in extended permit ip any any
access-group guests_access_in in interface guests

If this does not work, please feel free to use the following command

packet-tracer input guest tcp 192.168.12.13 1025 192.168.0.2 40

Once we have traffic flowing we can restrict the traffic to the printer ports.

Cheers

Mike

Mike

Hello Mike,

Thanks for the support. It really helps !

Thanks to the information provided, we can now connect to the printer but unfortunately we can access the whole inside network.

I suspect we can fix this by replacing "any" by the printer IP in line "access-list guests_access_in extended permit ip any any"

However, there is something much more surprising to me. Adding or removing the NAT rule makes no difference, I can still access the whole inside network from the guest network. Did I miss something ?

Please let me know if you need additional information.

Thanks,

JF

New Configuration details :

ASA Version 8.3(1)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password gh70cYLmUMHW473x encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan12
nameif guest
security-level 10
ip address 192.168.12.1 255.255.255.0
!

interface Vlan13
nameif Galerie
security-level 100
ip address 192.168.13.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 12
!
interface Ethernet0/3
switchport access vlan 13
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7

!
boot system disk0:/asa831-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name default.domain.invalid
object network Printer_1
host 192.168.0.206
description Printer1
access-list guest_access_in extended permit ip any any
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu invite 1500
mtu Galerie 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any invite
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
nat (inside,invite) source static Printer_1 Printer_1
access-group guest_access_in in interface guest
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication enable console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 192.168.12.0 255.255.255.0 guest
http 192.168.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 192.168.0.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 192.168.0.33-192.168.0.128 inside

dhcpd dns 89.2.0.1 89.2.0.2 interface inside
dhcpd enable inside
!
dhcpd address 192.168.12.100-192.168.12.150 guest
dhcpd enable invite
!
dhcpd address 192.168.13.100-192.168.13.150 Galerie
dhcpd enable Galerie
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username ***** password ***** encrypted
username ***** attributes
service-type nas-prompt
!
!
prompt hostname context
call-home
profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:15e997e61f80fc8a69874cfc08d985b1
: end

Hello Jean,

That is true, it is because 8.3 does not have Nat-control anymore, so it is not necessary to have the traffic being natted. You are completely right. The ACL permit ip any any is the one that is giving you access to the entire internal network.

As you rightly pointed, you can change the permit ip any any for the following

access-list guests_access_in extended permit ip any

and then remove the line that you have

no access-list guests_access_in extended permit ip any any

Cheers.

Mike

Mike

Mike,

Thanks for the quite reply.

We had it working the way we want.

Below is working configuration for anyone going through the same kind of troubles.


Regards,

JF

Result of the command: "show running-config"

: Saved
:
ASA Version 8.3(1)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password EOaGZ9DJcK985tVO encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.0.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan12
nameif invite
security-level 10
ip address 192.168.12.1 255.255.255.0
!
interface Vlan13
nameif Galerie
security-level 100
ip address 192.168.13.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 12
!
interface Ethernet0/3
switchport access vlan 13
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
boot system disk0:/asa831-k8.bin
ftp mode passive
dns server-group DefaultDNS
domain-name default.domain.invalid
object network imprimante_1
host 192.168.0.206
description imprimante 1  
object network Acces_internet_anatome
subnet 192.168.0.0 255.255.255.0
description acces internet pour anatome 
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network obj_invite
subnet 192.168.12.0 255.255.255.0
object network obj_galerie
subnet 192.168.13.0 255.255.255.0
access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 object imprimante_1
access-list guest_access_in extended permit ip 192.168.12.0 255.255.255.0 any
access-list inside_to_ouside extended permit ip any any
access-list outside_access_in extended permit ip any any inactive
access-list outside_access_in extended permit icmp any any inactive
access-list inside_access_in extended permit icmp 192.168.0.0 255.255.255.0 any
access-list inside_access_in extended permit ip 192.168.0.0 255.255.255.0 any
access-list Galerie_access_in extended permit ip 192.168.13.0 255.255.255.0 any
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu invite 1500
mtu Galerie 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any invite
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
!
object network obj_any
nat (inside,outside) dynamic interface
object network obj_invite
nat (invite,outside) dynamic interface
object network obj_galerie
nat (Galerie,outside) dynamic interface
access-group inside_access_in in interface inside
access-group outside_access_in in interface outside
access-group guest_access_in in interface invite
access-group Galerie_access_in in interface Galerie
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication enable console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 192.168.12.0 255.255.255.0 invite
http 192.168.0.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 192.168.0.0 255.255.255.0 inside
telnet timeout 5
ssh 192.168.0.0 255.255.255.0 inside
ssh timeout 5
console timeout 0
dhcp-client client-id interface outside
dhcpd auto_config outside
!
dhcpd address 192.168.0.33-192.168.0.128 inside
dhcpd dns 89.2.0.1 89.2.0.2 interface inside
dhcpd enable inside
!
dhcpd address 192.168.12.100-192.168.12.150 invite
dhcpd dns 89.2.0.1 89.2.0.2 interface invite
dhcpd enable invite
!
dhcpd address 192.168.13.100-192.168.13.150 Galerie
dhcpd enable Galerie
!

threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username ***** password ****** encrypted
username ***** attributes
service-type nas-prompt
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny 
  inspect sunrpc
  inspect xdmcp
  inspect sip 
  inspect netbios
  inspect tftp
  inspect ip-options
!
service-policy global_policy global
prompt hostname context
call-home
profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:910861ec3fae1dcc829a0b3e6424ffb1
: end

Excellent, would you please mark this question as resolve so other people can take it as reference?

Cheers

Mike

Mike
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card