Solved

Cisco ASA 8.4 denies packets between two internal subnets

Posted on 2011-09-23
7
1,868 Views
Last Modified: 2012-05-12
Hello. Our basic config..

10.10.1.1 - ASA 8.4 (5510)
10.10.1.3 - router to 10.10.15.0 subnet

asa has route..

route inside 10.10.15.0 255.255.255.0 10.10.1.3 1

asa can ping 10.10.15.x hosts, however we can't communicate with them, and get this error on the asa:

Deny inbound UDP from 10.10.1.21/5060 to 10.10.15.105/5060 on interface inside


Current config is almost out of the box.


I have tried creating access-lists and network object, but my knowledge is weak, so no success. If someone could please tell me which lines to add and break it down to me, I would very much appreciate it.

Should be a very basic question, no VLANs or anything.

Thanks
0
Comment
Question by:arthurk123
  • 4
  • 2
7 Comments
 
LVL 18

Expert Comment

by:jmeggers
Comment Utility
Looks like the host is sending to the ASA when it should be sending to the 10.10.15.105.  The ASA won't redirect, so my guess is that's why it's denying the packet.  Is the host (10.10.1.21) using the ASA as its default gateway?  Since the ASA won't redirect, I believe it should be using the router as its default gateway instead.
0
 

Author Comment

by:arthurk123
Comment Utility
Yes, the ASA is the default gateway, it is replacing our existing Peplink firewall

The router is just a point to point T1 connection to another office up the street

I am not trying to link different interfaces with different subnets, just stop the ASA from denying the above packets...


I refuse to believe the ASA won't do this. Even a 50 dollar Linksys has the option to put in static routes...
0
 
LVL 4

Accepted Solution

by:
dcj21 earned 500 total points
Comment Utility
Need to turn on same security traffic. That allows traffic with the same security level to cross the ASA including going in and out the same interface.

same-security-traffic permit {inter-interface | intra-interface}

inter-interface - Permits communication between different interfaces that have the same security level.
intra-interface - Permits communication in and out of the same

interface.http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/s1_72.html#wp1289167
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 

Author Comment

by:arthurk123
Comment Utility
Thank you, you are GOD!

I did run a packet trace and got...

Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   10.10.15.0      255.255.255.0   inside

Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:

Result:
input-interface: inside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule


I thought same security traffic was only for different interfaces talking to each other, not same interface.

Thank you many times!
0
 

Author Closing Comment

by:arthurk123
Comment Utility
Exact answer I needed
0
 
LVL 4

Expert Comment

by:dcj21
Comment Utility
This has bit me before - ;-)

Please mark my answer as helpful, I'm trying to earn points for my membership
0
 

Author Comment

by:arthurk123
Comment Utility
done!
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Overview The Cisco PIX 501, PIX 506e, ASA 5505 and ASA 5510 (most if not all of this information will be relevant to the PIX 515e but I do not have a working configuration handy to verify the validity) are primarily used within small to medium busi…
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now