ASA 5505 Network Configuration & Telephony problem
We would like to use a cisco asa 5505 to replace our pfsense. Please find in attachement the architecture we want :
Could you tell me if the configuration below is OK?
Because with this configuration we have the following problems: we are using Astra phones and Avaya phones and it seems that there is communication problems when we tried to call an avaya with an astra. (Users who are using Avaya cannot hear Astra users)
With pfsenses we don't have this problem.
Maybe my NAT is not correctly configured?
Thank you for your responses.
ASA Version 8.2(5)
switchport access vlan 2
switchport access vlan 3
switchport access vlan 4
switchport access vlan 5
ip address 192.168.22.254 255.255.255.0
ip address 192.168.100.254 255.255.255.0
ip address 192.168.1.10 255.255.255.0
ip address 192.168.66.254 255.255.255.0
ip address 192.168.200.1 255.255.255.0
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group icmp-type DefaultICMP
description DefaultICMP Types permitted
object-group protocol DM_INLINE_PROTOCOL_1
object-group protocol TCPUDP
access-list lan_access_in extended permit ip any any
access-list inside_access_in extended permit ip any any
access-list wan2_access_in extended permit ip any any
access-list lan_mail_access_in extended permit ip any any
access-list wan_access_in extended permit ip any any
access-list from_outside extended permit icmp any any echo
access-list name extended permit icmp any interface inside
pager lines 24
mtu inside 1500
mtu wan 1500
mtu lan 1500
mtu lan_mail 1500
mtu wan2 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (network) 11 interface
global (wan) 11 interface
global (inside) 1 interface
global (lan_mail) 11 interface
global (wan2) 11 interface
nat (network) 11 192.168.22.0 255.255.255.0
nat (network) 11 0.0.0.0 0.0.0.0
access-group inside_access_in in interface inside
access-group wan_access_in in interface wan
access-group lan_access_in in interface lan
access-group lan_mail_access_in in interface lan_mail
This document gives several answers on frequently asked questions for PFRv3 channel state behavior.
Q1: What are all the channel operational states from a BR (border role) perspective and what are the rules/conditions to be in each st...
The need was to reach an host inside a LAN through a VPN connection managed by the LAN gateway (Cisco 1921).
The LAN gateway performs NAT and there was a dedicate nat rule for the host i wanted to reach through VPN.
I couldn't connect to the hos...
We have 3 identical switches configured by someone else and would like to claim some of the Gigabit ports(G1/G2/G3/G4) for use on servers. When we try to change the wiring and configuration, we run in to connectivity issues. Attached is a des...