Solved

Cisco ASA 5520 seems to be bypassing PAT statement

Posted on 2014-03-10
4
381 Views
Last Modified: 2014-03-15
I am in the process of converting our ASA 5520 from 7.2 to 8.3.2 and everything has worked except for my PAT from inside to DMZ.  

in 7.2 we had:
global (dmz) 1 192.168.0.10

In 8.3.2 I converted it to:
object network dmz_net
   subnet 0.0.0.0 0.0.0.0
   nat (inside,dmz) dynamic 192.168.0.10


From what I understand that should be the same as before, but when I test this config the PAT is just bypassed and my real IP's are hitting the DMZ.  Granted I know that by design the ASA is working as it should but pushing the real IP's, but the DMZ servers all have an internal network address which is causing a loop.  So I need this PAT "bandaid" to work so I can slowly change to allow my real IP's.  Any help would be great so I can try to figure out this problem.
0
Comment
Question by:Kishwaukee
  • 3
4 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 39918269
Can you provide your full config?
0
 

Author Comment

by:Kishwaukee
ID: 39918333
what part do you want to look at?  I would rather not post the whole config, it is very long.
0
 

Accepted Solution

by:
Kishwaukee earned 0 total points
ID: 39918725
The issue resolved itself with time.  Not sure why it took a day for the stuff to work but it is now working.
0
 

Author Closing Comment

by:Kishwaukee
ID: 39931106
I resolved it myself, well it resolved it on its own.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Hi All,  Recently I have installed and configured a Sonicwall NS220 in the network as a firewall and Internet access gateway. All was working fine until users started reporting that they cannot use the Cisco VPN client to connect to the customer'…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now