unable to access external owa through guest network on wifi
I have setup guest network on our access point, traffic for which goes to second interface on asa and from there to outside. Internet works perfectly and all other websites that are out open without any issues, except the external owa url which is mapped to an internal private ip. so people who are using acrtivesync on the guest network, emails dont work either.
any suggestions. I am not that familiar with the asa. However did find a suggestion when i googled, which did mention about adding a static NAT for inside,guest .
there is another static nat already for inside,outside( with the public and the internal ip address of the mail server with https and smtp allowed.
Not sure if it is only the NAT but the routing as well that needs to be done. Also how would i enable ICMP on the guest network interface on the asa. it says it is currently blocked by incoming rule configure on the outside interface.
Guidnace is highly appreciated. I have put the config below.
switchport access vlan 50
ip address xx.xxx.xx.xxx 255.255.255.248
ip address yyy.yyy.yy.yyy 255.255.255.0
ip address zzz.zzz.zz.zzz 255.255.255.0
ip address rrr.rrr.rr.rrr 255.255.255.0
boot system disk0:/asa825-k8.bin
object-group network obj_any
object-group network VIA-LL
object-group network adj_any
object-group service DM_INLINE_SERVICE_1
service-object tcp eq ftp
service-object tcp eq ftp-data
object-group protocol DM_INLINE_PROTOCOL_1
access-list Data1 extended permit ip any any
access-list outside-in extended permit tcp any host(exchangepublicIP) eq https
access-list outside-in extended permit tcp any host (exchangepublicip) eq smtp
access-list outside-in extended permit ip 192.168.100.0 255.255.255.0 192.168.20.0 255.255.255.0
access-list outside-in extended permit object-group DM_INLINE_SERVICE_1 any host (FTP)
access-list inside_nat0_outbound extended permit ip any 192.168.100.0 255.255.255.224
access-list inside_nat0_outbound extended permit ip 192.168.30.0 255.255.255.0 192.168.100.0 255.255.255.224
access-list VIA-LL extended permit ip object-group VIA-LL any
access-list ciscoasa_splitTunnelAcl standard permit 192.168.30.0 255.255.255.0
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...