Here is a quick look at my connectivity
Internet ---- ASA ---(192.168.1.0)----Router --(192.168.95.0, Direct connection Fiber) ---Router --(172.29.94.0)
192.168.1.0
|
|
Internet ---- Router
Anyway I can reach both destinations fine can ping a workstation from the 172.29.94.0 network from the 192.168.1.0 and vice versa. But I am unable to remote desktop to a host from either side, nor can I reach the existing AD in the 192.168.1.0 network. I am sure it's ACL issue. Can anyone tell me how I can achieve this?
Thanks.
I'll post all the ACL's
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_5 any any
access-list inside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_2 any
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_5
access-list testacl extended permit ip 192.168.1.0 255.255.255.0 any
access-list testacl extended permit object-group DM_INLINE_PROTOCOL_1 172.29.94.0 255.255.254.0 192.168.1.0 255.255.255.0
access-list testacl extended permit object-group DM_INLINE_PROTOCOL_2 192.168.95.0 255.255.255.252 192.168.1.0 255.255.255.0
access-list testacl extended permit object-group DM_INLINE_SERVICE_3 192.168.1.0 255.255.255.0 172.29.94.0 255.255.254.0
access-list testacl extended permit object-group DM_INLINE_SERVICE_4 192.168.1.0 255.255.255.0 192.168.95.0 255.255.255.252
access-list inside_access_out extended permit ip any any
access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_2
access-list outside_access_in extended permit tcp any host waterloo-public eq imap4
access-list outside_access_in extended permit tcp any host waterloo-public eq 5500
access-list outside_access_in extended permit tcp any host waterloo-public eq 888
access-list outside_access_in extended permit tcp any host waterloo-public eq smtp
access-list outside_access_in extended permit tcp any host waterloo-public eq ssh
access-list outside_access_in extended permit tcp any host waterloo-public eq lotusnotes
access-list outside_access_in extended permit tcp any host waterloo-public eq https
access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_1 host waterloo-public eq 3389
access-list outside_access_in extended permit tcp any host waterloo-public eq www
access-list outside_access_in extended permit tcp any host waterloo-public eq 10000
access-list outside_access_in extended permit tcp any host waterloo-public eq ftp
access-list outside_access_in extended permit tcp any host waterloo-public eq ftp-data
access-list outside_access_in extended permit tcp any host waterloo-public range 5600 5700
access-list outside_access_out extended permit object-group DM_INLINE_SERVICE_6 any any
access-list outside_cryptomap_1 extended permit object-group DM_INLINE_SERVICE_1 any any
access-list outside_cryptomap_1 extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list outside_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip any 192.168.1.224 255.255.255.224
access-list inside_nat0_outbound extended permit object-group DM_INLINE_SERVICE_11 object-group DM_INLINE_NETWORK_3 192.168.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit object-group DM_INLINE_SERVICE_12 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_4
access-list vpn_accessible_nets remark Waterloo inside network
access-list vpn_accessible_nets standard permit 192.168.1.0 255.255.255.0
access-list vpn_accessible_nets remark Germany inside network
access-list vpn_accessible_nets standard permit 192.168.60.0 255.255.255.0
And the following is my NAT statements
static (inside,outside) tcp interface 3389 192.168.1.100 3389 netmask 255.255.255.255
static (inside,outside) tcp interface lotusnotes 192.168.1.4 lotusnotes netmask 255.255.255.255
static (inside,outside) tcp interface 222 192.168.1.4 ssh netmask 255.255.255.255
static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255
static (inside,outside) tcp interface 5500 192.168.1.4 5500 netmask 255.255.255.255
static (inside,outside) tcp interface imap4 192.168.1.4 imap4 netmask 255.255.255.255
static (inside,outside) tcp interface 6502 192.168.1.21 6502 netmask 255.255.255.255
static (inside,outside) tcp interface 6503 192.168.1.22 6503 netmask 255.255.255.255
static (inside,outside) tcp interface 6504 192.168.1.23 6504 netmask 255.255.255.255
static (inside,outside) tcp interface 6505 192.168.1.24 6505 netmask 255.255.255.255
static (inside,outside) tcp interface 255.255.255.255
static (inside,outside) tcp interface https 192.168.1.9 https netmask 255.255.255.255
static (inside,outside) tcp interface ftp 192.168.1.43 ftp netmask 255.255.255.255
static (inside,outside) tcp interface ftp-data 192.168.1.43 ftp-data netmask 255.255.255.255
static (inside,outside) tcp interface 5600 192.168.1.43 5600 netmask 255.255.255.255
access-group inside_access_in in interface inside
access-group inside_access_out out interface inside
access-group outside_access_in in interface outside
access-group outside_access_out out interface outside
Internet ---- ASA ---(192.168.1.0)----Router --(192.168.95.0, Direct connection Fiber) ---Router --(172.29.94.0)
192.168.1.0
|
|
Internet ---- Router
Anyway I can reach both destinations fine can ping a workstation from the 172.29.94.0 network from the 192.168.1.0 and vice versa. But I am unable to remote desktop to a host from either side, nor can I reach the existing AD in the 192.168.1.0 network. I am sure it's ACL issue. Can anyone tell me how I can achieve this?
Thanks.
I'll post all the ACL's
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_5 any any
access-list inside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_2 any
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_4 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_5
access-list testacl extended permit ip 192.168.1.0 255.255.255.0 any
access-list testacl extended permit object-group DM_INLINE_PROTOCOL_1 172.29.94.0 255.255.254.0 192.168.1.0 255.255.255.0
access-list testacl extended permit object-group DM_INLINE_PROTOCOL_2 192.168.95.0 255.255.255.252 192.168.1.0 255.255.255.0
access-list testacl extended permit object-group DM_INLINE_SERVICE_3 192.168.1.0 255.255.255.0 172.29.94.0 255.255.254.0
access-list testacl extended permit object-group DM_INLINE_SERVICE_4 192.168.1.0 255.255.255.0 192.168.95.0 255.255.255.252
access-list inside_access_out extended permit ip any any
access-list outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_2
access-list outside_access_in extended permit tcp any host waterloo-public eq imap4
access-list outside_access_in extended permit tcp any host waterloo-public eq 5500
access-list outside_access_in extended permit tcp any host waterloo-public eq 888
access-list outside_access_in extended permit tcp any host waterloo-public eq smtp
access-list outside_access_in extended permit tcp any host waterloo-public eq ssh
access-list outside_access_in extended permit tcp any host waterloo-public eq lotusnotes
access-list outside_access_in extended permit tcp any host waterloo-public eq https
access-list outside_access_in extended permit tcp object-group DM_INLINE_NETWORK_1 host waterloo-public eq 3389
access-list outside_access_in extended permit tcp any host waterloo-public eq www
access-list outside_access_in extended permit tcp any host waterloo-public eq 10000
access-list outside_access_in extended permit tcp any host waterloo-public eq ftp
access-list outside_access_in extended permit tcp any host waterloo-public eq ftp-data
access-list outside_access_in extended permit tcp any host waterloo-public range 5600 5700
access-list outside_access_out extended permit object-group DM_INLINE_SERVICE_6 any any
access-list outside_cryptomap_1 extended permit object-group DM_INLINE_SERVICE_1 any any
access-list outside_cryptomap_1 extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list outside_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.60.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip any 192.168.1.224 255.255.255.224
access-list inside_nat0_outbound extended permit object-group DM_INLINE_SERVICE_11 object-group DM_INLINE_NETWORK_3 192.168.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit object-group DM_INLINE_SERVICE_12 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_4
access-list vpn_accessible_nets remark Waterloo inside network
access-list vpn_accessible_nets standard permit 192.168.1.0 255.255.255.0
access-list vpn_accessible_nets remark Germany inside network
access-list vpn_accessible_nets standard permit 192.168.60.0 255.255.255.0
And the following is my NAT statements
static (inside,outside) tcp interface 3389 192.168.1.100 3389 netmask 255.255.255.255
static (inside,outside) tcp interface lotusnotes 192.168.1.4 lotusnotes netmask 255.255.255.255
static (inside,outside) tcp interface 222 192.168.1.4 ssh netmask 255.255.255.255
static (inside,outside) tcp interface smtp 192.168.1.9 smtp netmask 255.255.255.255
static (inside,outside) tcp interface 5500 192.168.1.4 5500 netmask 255.255.255.255
static (inside,outside) tcp interface imap4 192.168.1.4 imap4 netmask 255.255.255.255
static (inside,outside) tcp interface 6502 192.168.1.21 6502 netmask 255.255.255.255
static (inside,outside) tcp interface 6503 192.168.1.22 6503 netmask 255.255.255.255
static (inside,outside) tcp interface 6504 192.168.1.23 6504 netmask 255.255.255.255
static (inside,outside) tcp interface 6505 192.168.1.24 6505 netmask 255.255.255.255
static (inside,outside) tcp interface 255.255.255.255
static (inside,outside) tcp interface https 192.168.1.9 https netmask 255.255.255.255
static (inside,outside) tcp interface ftp 192.168.1.43 ftp netmask 255.255.255.255
static (inside,outside) tcp interface ftp-data 192.168.1.43 ftp-data netmask 255.255.255.255
static (inside,outside) tcp interface 5600 192.168.1.43 5600 netmask 255.255.255.255
access-group inside_access_in in interface inside
access-group inside_access_out out interface inside
access-group outside_access_in in interface outside
access-group outside_access_out out interface outside