watchguardmonkey
Technical User
Hi,
Just been given this network to look after and it has an ASA 5500, which I'm brand new to and the problem is that traffic can't seem to get pass the device when it is all on the trusted side.
We have 12 networks connected via a cisco router, and the asa on the corporate LAN which all the other LANS need to access, I know it's the access-list & NAT statements, but just not sure how they should be setup.
Can anyone shed a bit of light on this? thanks WGM
access-list acl_outside extended permit tcp any host 80.194.100.157 eq smtp
access-list acl_outside extended permit tcp any host 80.194.100.156 eq www
access-list acl_outside extended permit tcp any host 80.194.100.155 eq www
access-list acl_outside extended permit ip 192.168.27.48 255.255.255.240 10.0.1.0 255.255.255.0
access-list acl_outside extended permit ip 10.0.1.0 255.255.255.0 192.168.27.48 255.255.255.240
access-list acl_outside extended permit ip 10.0.0.0 255.0.0.0 10.0.1.0 255.255.255.0
access-list acl_outside extended permit object-group TCPUDP 192.168.27.48 255.255.255.240 10.0.1.0 255.255.255.0 eq www
access-list acl-inside extended permit tcp 10.0.1.0 255.255.255.0 any eq www
access-list acl-inside extended permit ip 10.0.0.0 255.255.255.0 any
access-list outside_1_cryptomap extended permit ip 10.0.1.0 255.255.255.0 any
access-list outside_1_cryptomap extended permit ip 192.168.27.48 255.255.255.240 10.0.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 any
access-list inside_nat0_outbound extended permit ip any 10.0.1.236 255.255.255.252
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 192.168.27.48 255.255.255.240
access-list inside_nat0_outbound extended permit ip host 10.0.1.0 10.0.1.236 255.255.255.252
access-list outside_access_out extended permit ip 10.0.1.0 255.255.255.0 192.168.27.48 255.255.255.240
access-list DefaultRAGroup_splitTunnelAcl standard permit host 10.0.1.0
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu management 1500
ip local pool vpnpool 10.0.1.237-10.0.1.238 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-602.bin
no asdm history enable
arp timeout 14400
global (outside) 101 80.194.100.130-80.194.100.139 netmask 255.255.255.224
global (outside) 1 80.194.100.145 netmask 255.0.0.0
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 10.0.0.0 255.0.0.0
nat (inside) 101 0.0.0.0 0.0.0.0
static (inside,outside) tcp 80.194.100.157 smtp 10.0.1.4 smtp netmask 255.255.255.255
static (inside,outside) tcp 80.194.100.156 255.255.255.255
static (inside,outside) tcp 80.194.100.155 255.255.255.255
access-group acl_outside in interface outside
access-group outside_access_out out interface outside
Just been given this network to look after and it has an ASA 5500, which I'm brand new to and the problem is that traffic can't seem to get pass the device when it is all on the trusted side.
We have 12 networks connected via a cisco router, and the asa on the corporate LAN which all the other LANS need to access, I know it's the access-list & NAT statements, but just not sure how they should be setup.
Can anyone shed a bit of light on this? thanks WGM
access-list acl_outside extended permit tcp any host 80.194.100.157 eq smtp
access-list acl_outside extended permit tcp any host 80.194.100.156 eq www
access-list acl_outside extended permit tcp any host 80.194.100.155 eq www
access-list acl_outside extended permit ip 192.168.27.48 255.255.255.240 10.0.1.0 255.255.255.0
access-list acl_outside extended permit ip 10.0.1.0 255.255.255.0 192.168.27.48 255.255.255.240
access-list acl_outside extended permit ip 10.0.0.0 255.0.0.0 10.0.1.0 255.255.255.0
access-list acl_outside extended permit object-group TCPUDP 192.168.27.48 255.255.255.240 10.0.1.0 255.255.255.0 eq www
access-list acl-inside extended permit tcp 10.0.1.0 255.255.255.0 any eq www
access-list acl-inside extended permit ip 10.0.0.0 255.255.255.0 any
access-list outside_1_cryptomap extended permit ip 10.0.1.0 255.255.255.0 any
access-list outside_1_cryptomap extended permit ip 192.168.27.48 255.255.255.240 10.0.1.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 any
access-list inside_nat0_outbound extended permit ip any 10.0.1.236 255.255.255.252
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 192.168.27.48 255.255.255.240
access-list inside_nat0_outbound extended permit ip host 10.0.1.0 10.0.1.236 255.255.255.252
access-list outside_access_out extended permit ip 10.0.1.0 255.255.255.0 192.168.27.48 255.255.255.240
access-list DefaultRAGroup_splitTunnelAcl standard permit host 10.0.1.0
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu management 1500
ip local pool vpnpool 10.0.1.237-10.0.1.238 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-602.bin
no asdm history enable
arp timeout 14400
global (outside) 101 80.194.100.130-80.194.100.139 netmask 255.255.255.224
global (outside) 1 80.194.100.145 netmask 255.0.0.0
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 10.0.0.0 255.0.0.0
nat (inside) 101 0.0.0.0 0.0.0.0
static (inside,outside) tcp 80.194.100.157 smtp 10.0.1.4 smtp netmask 255.255.255.255
static (inside,outside) tcp 80.194.100.156 255.255.255.255
static (inside,outside) tcp 80.194.100.155 255.255.255.255
access-group acl_outside in interface outside
access-group outside_access_out out interface outside