Solved

PIX to ASA migration

Posted on 2012-03-23
5
486 Views
Last Modified: 2012-04-16
Hello all,

I'm currently in the process of migrating our PIX 506e to a new ASA 5510 (Version 8.4(3)).  Everything looks to be configured right, however when we transfer all traffic through the ASA none of the ACL Rules work.  We host about a few different public facing servers, as well as our company's long distance that goes through a SIP gateway.  It's a bit hard to test new configurations since they have to be done really early in the morning for least impact to business functionality.  I'm just not missing, especially since the Packet Trace utility says everything is working.

Here's a snippet of the config:

!
interface Ethernet0/0
 nameif outside
 security-level 0
 ip address AAA.AAA.AAA.AAA 255.255.255.0
!
interface Ethernet0/1
 nameif inside
 security-level 100
 ip address 10.1.32.1 255.255.0.0
!
interface Ethernet0/2
 shutdown
 nameif DSLFailOver
 security-level 0
 ip address ZZZ.ZZZ.ZZZ.ZZZ 255.255.255.248
!
interface Ethernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 nameif management
 security-level 100
 ip address 192.168.10.10 255.255.255.0
 management-only
!


access-list 100 extended permit icmp any any
access-list 100 extended permit tcp any host 10.1.1.70 eq www
access-list 100 extended permit tcp any host 10.1.1.70 eq https
access-list 100 extended permit tcp any host 10.1.1.70 eq pop3
access-list 100 extended permit tcp any host 10.1.1.70 eq imap4
access-list 100 extended permit tcp any host 10.1.1.4 eq www
access-list 100 extended permit object-group TCPUDP any host 10.1.1.160 object-group OpenCourse
access-list 100 extended permit tcp any host 10.1.83.111 eq ssh
access-list 100 extended permit tcp any host 10.1.83.111 object-group 8080
access-list 100 extended permit tcp any host 10.1.83.111 eq www
access-list 100 extended permit udp any host 10.1.83.111 eq sip
access-list 100 extended permit tcp any host 10.1.1.63 eq https
access-list 100 extended permit tcp any host 10.1.1.63 eq www
access-list 100 extended permit tcp any host 10.1.1.63 eq ssh
access-list 100 extended permit tcp any host 10.1.1.63 eq ftp
access-list 100 extended permit tcp any host 10.1.32.4 eq smtp
access-list 100 extended permit tcp any host 10.1.32.4 eq ssh

object network obj-10.1.1.4
 nat (inside,outside) static BBB.BBB.BBB.BBB
object network obj-10.1.83.111
 nat (inside,outside) static CCC.CCC.CCC.CCC
object network obj-10.1.1.63
 nat (inside,outside) static DDD.DDD.DDD.DDD
object network obj-10.1.32.4
 nat (inside,outside) static EEE.EEE.EEE.EEE
object network obj-10.1.1.160
 nat (inside,outside) static FFF.FFF.FFF.FFF
object network obj-10.1.1.70
 nat (inside,outside) static GGG.GGG.GGG.GGG
object network BAJA-PAT
 nat (inside,DSLFailOver) dynamic interface
object network RELIANCE-PAT
 nat (inside,outside) dynamic interface

access-group 100 in interface outside
0
Comment
Question by:TechChad
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 37777355
Anything showing in the logs of the ASA?
0
 

Author Comment

by:TechChad
ID: 37778646
Appologies for the ignorance which logs are you reffering to?
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 37778754
No apologies needed :-)

I assume you're using ASDM. There's a logging option you can use to monitor what's happening almost real time. I'm using my phone right now so I can't point you to it exactly.
0
 

Accepted Solution

by:
TechChad earned 0 total points
ID: 37833337
After widdling it down with Cisco support it appears to be an issue with our ISP and their ARP tables being statically assigned to the devices.  After they put the MAC of the new ASA into their ARP tables.  All was well...thank you all for your help!
0
 

Author Closing Comment

by:TechChad
ID: 37850326
Cisco support assisted with finding the solution.
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question