ASA 5510 replacement and ARP

Hello support,

Probably a simple question and can be buried in these forums (but I'm not).

I am trying to replace one 5510 with another 5510 and have all kinds of difficulties.  Devices the PAT against the external interface have no problem out, but anything with a 1:1 NAT cannot.  Cries of an ARP issue; However, to restart the switch and firewall are without effect.  Is there something else I could potentially be missing.  Configurations are completely reversed.  And the firewall, that the I'm replacing has no problem going out with NAT (static) 1-to-1.  Any ideas?

Hello

I assume you mean a L3 switch that you begin with the ASA?

If this isn't the case, then where is the gateway of your ASA L3 and who manages this device?

One thing that comes to mind associated with ARP is that if you use several public subnets on your ASA. For example 30 for network connection between your site and the ISP and some 28 as a public subnet for purposes of NAT static. Then you may experience problems IF your software has changed to 8.4 (3) or something higher.

If ARP is the problem then it is of course the option that makes you check the original interfaces of ASAs (connected to the ISP) MAC address and configure this same MAC address to the new WAN ASAs interface to the ISP.

You can actually go under the interface and deliver MAC address with the command

0000.1111.2222 Mac address

In addition, naturally when it comes to configurations and firewall rules you can always use the command "packet - trace" to simulate the packets from your local network for the EXTENDED or WAN network to the local network and see the race passes through completely.

-Jouni

Tags: Cisco Security

Similar Questions

  • ASA 5510 more and Port forwarding

    Hallo,

    I don't know if the thread title is correctly written, so I'll try to explain my problem.

    I have an ASA 5510 more linking several external interface VPN tunnels to internal interface. they work very well. Now I want to access a server in the internal network of trust on the Internet via RDP.

    I've set up a static NAT rule which translates by [my public ip phone]: 11111 on [the internal server ip]: 3389. Moreover, I met [my public ip phone] traffic: 11111 outside [the internal server ip]: 3389 inside via the access control list.

    Yes, it does not. I made a few soft logic error?

    Code:

    static (exterior, Interior) [the internal server ip] tcp 3389 [my laptop public ip] 11111 netmask 255.255.255.255

    Outside_access_in list extended access permit tcp host [my ip public notebook] [internal server ip] eq 3389

    Best regards

    EYAD Tayeb.

    Hi... I might have a word here!

    looking at your config you have

    static (inside, outside) tcp 3389 11111 netmask 255.255.255.255

    It should be

    static (inside, outside) of the tcp 3389 3389 netmask 255.255.255.255 interface

    Also... Make sure that the aplpied of the access list for the external interface in the outbound direction does not block traffic referred by your inside host with the public client that initiated the RDP session.

    I hope this helps... Please, write it down if she does!

  • With the help of ASA 5510 L2L and VPN L2TP

    I would let my remote users access to all resources bhind the ASA and my remote branches.

    Here's my setup.  ASA5510 as a hub to the data center.

    172.21.x.x of internal network directly connected

    DMZ directly connected 172.22.1.x.x

    L2L branch1 VPN 10.47.x.x

    L2L branch2 VPN 10.47.y.x

    172.21.y.x remote users L2TP Windows Client

    I can access my internal resources related to the ASA but not the DMZ or branch offices. I need injection road routing and reverse?

    You also need to configure crossed.  http://goo.GL/vLqAR

  • ASA 5510 with AIP SSM-10

    I'm new to network administration and our company has an ASA 5510 with and map AIP SSM-10. On the interface ASA when I try to load Intrusion detection, he said the following:

    "For IPS 5.1 (1) S205.0, use the link below to access the IPS Device Manager." (If the SSM management IP address or the port is translated, replace them accordingly in the below URL). IPS 6.0.1 or above will be fully interated ASDM. »

    Unfortunately, no URL is displayed below this message and there is no documentation in the company that owns this configuration. Is there a way to reset the AIP without resetting the ASA? How can I find the IP address to be able to configure it?

    The ASA CLI, you will be able to check the IP address of the AIP module:

    view the details of the module

    It will show you the ip address of mgmt of the module, and you can https to the IP address of your PC.

  • Cisco ASA 5510 + license + AIP - SSM

    Hello.

    I have this box.

    I have a few questions about it.

    (1) I'll be able to update the firmware (from 8.2 to 8.3 or greater for example) without smarnet for ASA 5510? And what can not do without smartnet?

    (2) I have only AIP-SSM-10 module this ASA 5510. is there a smartnet, too? And when I buy only one module is it build in a subscription for 1 year for the signatures of the IPS?

    (3) if I have the Cisco ASA 5510 base license, my IPS on AIP-SSM-10 will work?

    (4) as I foresee in a purchase of the year a 5510 more with the same module and mount ther of failover. I really need license Security more than failover (active / standby)? For active/active, I know I need one, Yes?

    Please help me.

    (1) you must Smartnet in order to download the software from the download from cisco.com site.

    (2) Yes, there is also a smartnet for the AIP module. Module AIP does not come with one year subscription, but you can ask for a demo license.

    (3) Yes, the basic license is OK for the AIP module.

    (4) Yes, you would need license security more on the two ASA to be able to run any type of failover on ASA5510.

    Hope that answers your questions.

  • Cisco Anyconnect/WebVPN license for ASA 5510

    Hello

    Someone could please check the licenses for ASA 5510 attachment and let me know. We currently have ASA 5510 with basic license. According to the table attached under VPN sessions, he mentions that "250 combined SESSIONS IPSec and WebVPN" and to "Max box of WebVPN Session" it is mentioned that 2nd meeting, exceeding that we must buy license optional webvpn. While we the 250 combined license for IPSec and webVPN. We must purchase additional anyconnect license to set up remote access for users who want to use the internal resources from outside the network. OrElse, we don't have to purchase license and can configure webvpn/anyconnect of existing combined license existing users basic ASA license? Waiting for your response. Thank you.

    You are welcome.

    1 Yes

    2 AnyConnect requires no Java, but it can he use when connecting to one AnyConnect SSL VPN client and launch the Web browser option start Java-based. There was a bug with the AnyConnect old versions had later who should have addresses. You also have the option to launch via IE and using ActiveX or simply throw AnyConnect directly - neither of these two methods require Java.

    Here is a document TAC on the Java questions if you want more details.

    Please take a moment to note the useful messages and mark your answers questions.

  • Unable to connect to server vpn behind ASA 5510 with windows clients

    Hi all

    I've seen a number of posts on this and followed by a few documents of support on this issue, but I'm totally stuck now, nothing seems to work for me.

    This is the usual scenario, I have a VPN windows 2003 Server sat on the lan deprived of our ASA 5510 firewall, and I try to get my Windows XP / 7 laptop computers to connect to it.

    Within the ASDM:

    (1) Server Public created for Protocol 1723

    (2) Public created for the GRE protocol Server

    3) created two public servers have the same public and private addresses

    (4) the foregoing has created config Public Private static route in the section NAT firewall

    (5) rules to Firewall 2 also created above on the external interface for both 1723 and GRE

    When you try to connect, I get the following entry in the debug log.

    6 August 6, 2010 17:09:37 302013 195.74.141.2 1045 1723 ChamberVPN-internal built ride connection TCP 1889195 for outside:195.74.141.2/1045 (195.74.141.2/1045) to the inside: ChamberVPN-internal/1723 (XXX.XXX.XXX.XXX/1723)

    but nothing else.

    The server shows not attempting a connection so I think I'm missing something on the firewall now.

    Also inside interface there is a temporary rule:

    Source: no

    Destination: any

    Service: IP

    Action: enabled

    This should allow all outbound traffic only as far as I know...

    Any help would be greatly appreciated.

    Chris

    Hi Chris,

    ASA newspaper indicates that the connection is interrupted because of "syn timeout. This means that asa receives no response from the Windows Server. Right now, we need to clarify some points.

    1 - your vpn server committed a correct default gateway error or the path that lies in your fw interface asa.

    is 2 - possible to start capturing packets on Windows Server. Hereby, we can get data flow information beetween client and server. And we can be sure that Windows Server wonders vpn.

    Ufuk Güler

  • Refuse the TCP (no relation) dan disassembly TCP connection ON ASA 5510, HELP Please

    IM currently implemented with AIP-SSM-10 ASA 5510 IPS and I have problem with ASA, with IPS feature currently disabled, I keep received complain blocked/idle the connection to the oracle server, using port 8000 host remote-office, I traced with syslog and message received from large number associated with the oracle server IP address.

    the network diagram is a bit like this:

    ________ ________ _____________

    | Oracle | switch | ASA 5510 |

    | Server | | ___ |---| transparent |

    -------- -------------

    192.168.10.206 |

    |

    |

    -------------

    | ROUTER |

    |___________|

    |

    ________ -------------

    | DISTANCE | ------ | Router |

    | THE USER | -------------

    ----------

    192.168.5.x

    and the syslog message looks like:

    302013: built inbound connection TCP 1662347 for OUTSIDE:192.168.5.52/1311 (192.168.5.52/1311) inside:192.168.10.206/8000 (192.168.10.206/8000)

    302014: disassembly of the TCP connection 1662345 for OUTSIDE:192.168.5.52/1310 for inside:192.168.10.206/8000 duration 0: 00:00 542 bytes TCP fins

    302013: built inbound connection TCP 1662345 for OUTSIDE:192.168.5.52/1310 (192.168.5.52/1310) inside:192.168.10.206/8000 (192.168.10.206/8000)

    302014: disassembly of the TCP connection 1662343 for OUTSIDE:192.168.5.52/1309 for inside:192.168.10.206/8000 duration 0: 00:00 539 bytes TCP fins

    302013: built inbound connection TCP 1662343 for OUTSIDE:192.168.5.52/1309 (192.168.5.52/1309) inside:192.168.10.206/8000 (192.168.10.206/8000)

    106015: deny TCP 192.168.5.52/1302 to 192.168.10.206/8000 flags ACK END on the OUTSIDE interface (no link)

    302014: disassembly of the TCP connection 1662338 for OUTSIDE:192.168.5.52/1308 for inside:192.168.10.206/8000 duration 0: 00:00 538 bytes TCP fins

    106015: deny TCP 192.168.5.52/1301 to 192.168.10.206/8000 flags ACK END on the OUTSIDE interface (no link)

    106015: deny TCP 192.168.5.52/1298 to 192.168.10.206/8000 flags ACK END on the OUTSIDE interface (no link)

    106015: deny TCP 192.168.5.52/1303 to 192.168.10.206/8000 flags ACK END on the OUTSIDE interface (no link)

    can someone help me, I'm completely stuck on this problem to cause...

    Thank you.

    7.1 (2), which contains the fix for it, is already posted at http://www.cisco.com/cgi-bin/tablebuild.pl/pix.

    If the workaround works for you, however, and you don't touch any other problems, then I would probably recommend you just stay on this version, but I'll leave it up to you.

  • Split tunnel with ASA 5510 and PIX506.

    Hello

    I have the production between Asa 5510 (main office) and Pix 506 VPN tunnel. It is configured so that all traffic is encrypted and moves through the tunnel. This includes remote users behind Pix Internet traffic. I would like to use split tunnel and direct Internet traffic hitting the web directly from Pix instead of going through the tunnel. How can I do this safely? Please see current config Pix below:

    :
    6.3 (5) PIX version
    interface ethernet0 car
    interface ethernet1 10baset
    ethernet0 nameif outside security0
    nameif ethernet1 inside the security100

    clock timezone EDT - 5
    clock to summer time EDT recurring 2 Sun Mar 2:00 1 Sun Nov 02:00
    No fixup protocol dns
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol they 389
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    No fixup protocol sip udp 5060
    fixup protocol 2000 skinny
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    no correction protocol tftp 69
    names of
    allow VPN 192.x.x.x 255.255.255.0 ip access list one
    LocalNet ip access list allow a whole
    pager lines 20
    opening of session
    monitor debug logging
    logging warnings put in buffered memory
    logging trap warnings
    Outside 1500 MTU
    Within 1500 MTU
    IP address outside 24.x.x.x 255.255.255.0
    IP address inside192.x.x.x 255.255.255.0
    IP audit name Outside_Attack attack action alarm down reset
    IP audit name Outside_Recon info action alarm down reset
    interface IP outside the Outside_Recon check
    interface IP outside the Outside_Attack check
    alarm action IP verification of information
    reset the IP audit attack alarm drop action
    disable signing verification IP 2000
    disable signing verification IP 2001
    disable signing verification IP 2004
    disable signing verification IP 2005
    disable signing verification IP 2150
    PDM logging 100 information
    history of PDM activate
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0 access-list LocalNet
    Route outside 0.0.0.0 0.0.0.0 24.x.x.x
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
    H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
    Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
    Timeout, uauth 0:05:00 absolute
    GANYMEDE + Protocol Ganymede + AAA-server
    AAA-server GANYMEDE + 3 max-failed-attempts
    AAA-server GANYMEDE + deadtime 10
    RADIUS Protocol RADIUS AAA server
    AAA-server RADIUS 3 max-failed-attempts
    AAA-RADIUS deadtime 10 Server
    AAA-server local LOCAL Protocol
    Enable http server
    enable floodguard
    Permitted connection ipsec sysopt
    Crypto ipsec transform-set esp-3des esp-md5-hmac AMC
    map UrgentCare 10 ipsec-isakmp crypto
    card crypto UrgentCare 10 corresponds to the VPN address
    card crypto UrgentCare 10 set counterpart x.x.x.x
    card crypto UrgentCare 10 value transform-set AMC
    UrgentCare interface card crypto outside
    ISAKMP allows outside
    ISAKMP key * address x.x.x.x 255.255.255.255 netmask
    ISAKMP identity address
    part of pre authentication ISAKMP policy 20
    ISAKMP policy 20 3des encryption
    ISAKMP policy 20 md5 hash
    20 2 ISAKMP policy group
    ISAKMP duration strategy of life 20 86400
    SSH timeout 15
    Console timeout 0
    Terminal width 80
    Cryptochecksum:9701c306b05151471c437f29695ffdbd
    : end

    I would do something by changing the acl that applies to your crypto card. You want to know what you want to support above the tunnel and then deny other networks.

    If you have:

    192.168.3.0/24

    192.168.4.0/24

    10.10.10.0/24

    172.16.0.0/16

    Do something like:

    VPN access list allow 192.x.x.x ip 255.255.255.0 192.168.3.0 255.255.255.0

    VPN access list allow 192.x.x.x ip 255.255.255.0 192.168.4.0 255.255.255.0

    VPN access list allow 192.x.x.x ip 255.255.255.0 10.10.10.0 255.255.255.0

    VPN access list allow 192.x.x.x 255.255.255.0 ip 172.16.0.0 255.255.0.0

    Then when the traffic is destined for something other than these networks, it will go not to the ISP instead of the tunnel.

    HTH,

    John

  • ASA 5510 can be configured as bridge mode and always send Netflow information to a collector

    ASA 5510 can be configured as bridge mode and always send Netflow information to a collector?

    We have a PIX connect internal network to the internet. Because PIX does not support NetFlow, as temporary solution, we thought to a 5510 ASA between the PIX and the internet gateway and configure as a bridge so that there will be no problem routing, and the SAA can always send Netflow information to a collector.

    Can someone please advise if this is possible?

    Thank you.

    I have not tried, but as a Netflow service policy should work in routed and transparent mode. Reference.

    Why don't you just replace the Pix with the ASA in routed mode?

  • Automatic update AIP-SSM-10 and ASA 5510 (Beginner)

    I see that it is possible to automate the updates of the ASA 5510 and AIP SSM via FTP on my own server. Is it possible to automate the download directly from Cisco.com?

    Thank you!

    Jeremy

    Jeremy, the answer to your question is correct, as far as the Cisco products are concerned. So I wrote a PERL app that does exactly that, and I published an article about it in the June 2007 issue of Sys Admin magazine. Here's the article online: http://www.samag.com/documents/s=10128/sam0706a/0706a.htm

    And it is also on my site, with a tar of scripts to:

    http://www.LHB-consulting.com/pages/apps/index.html

    Good luck.

    -Lisa

  • IPSEC with the router and asa 5510

    Hi all

    I have problems connecting ipsec l2l. I have set up a router and asa 5510 make ipsec between them, but it seems to fail on the phase 1. I already check and I am 100% sure that is the key. You can a few shed light on the issue, I have. Here's the output debug I get the two system.

    Thank you

    Hello

    Isakmp policy match on both devices? What version of ios is running on the router and the asa5510

    Thank you

  • Between asa 5510 and router VPN

    Hello

    I configured ASA 5510 to vpn LAN to LAN with router 17 857. and between the routers.

    between vpn routers works very well.

    from the local network behind the ASA I can ping the computers behind routers.

    but computers behind routers, I cannot ping PSC behind ASA.

    I have configured the remote access with vpn cisco 4.X client, it works well with routers, but cannot work with asa.

    the asa is connected to the wan via zoom router (adsl)

    Are you telnet in the firewall?

    Follow these steps to display the debug output:

    monitor terminal

    farm forestry monitor 7 (type this config mode)

    Otherwise if its console, do "logging console 7'.

    can do

    Debug crypto ISAKMP

    Debug crypto ipsec

    and then generate a ping from one device to the back of the ASA having 192.168.200.0 address towards one of the VPN subnets... and then paste the result here

    Concerning

    Farrukh

  • VPN site to Site ASA 5510 and 871 w / dynamic IP

    What is the best method of creating a VPN site-to site between an ASA 5510 and a router 871 where the 5510 has a static IP address and has 871, a dynamic IP address?

    My ASA is running ASA software version 7.0 (5) and I can't find how to create a tunnel for a dynamic IP address via the ASDM. I have currently a tunnel between these two arrangements in place, but it was done by specifying the remote IP address, even if it is dynamic.

    Any suggestions or pointers would be * very * appreciated.

    -Adam

    This can help but it does not show ASDM.

    http://Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a00807ea936.shtml

  • ASA 5505 and ASA 5510 Site to Site VPN Tunnel cannot be established

    Hi all experts

    We are now plan to form an IPSec VPN tunnel from site to site between ASA 5505 (ASA Version 8.4) and ASA 5510 (ASA Version 8.0) but failed, would you please show me how to establish? A reference guide?

    I got error syslog 713902 and 713903, how to fix?

    I got the following, when I type "sh crypto isakmp his."

    Type: user role: initiator

    Generate a new key: no State: MM_WAIT_MSG2

    Hugo

    Hello

    This State is reached when the policies of the phase 1 do not correspond to the two ends.

    Please confirm that you have the same settings of phase 1 on both sides with the following commands:

    See the isakmp crypto race

    See the race ikev1 crypto

    Also make sure that port UDP 500 and 4500 are open for communication between your device and the remote peer.

    Finally, make sure you have a route suitable for the remote VPN endpoint device.

    Hope that helps.

    Kind regards

    Dinesh Moudgil

Maybe you are looking for