{"id":422,"date":"2019-05-07T06:22:25","date_gmt":"2019-05-07T11:22:25","guid":{"rendered":"http:\/\/itblog.ldlnet.net\/?p=422"},"modified":"2019-05-07T06:22:25","modified_gmt":"2019-05-07T11:22:25","slug":"issue-with-nat-on-cisco-asa","status":"publish","type":"post","link":"https:\/\/itblog.ldlnet.net\/index.php\/2019\/05\/07\/issue-with-nat-on-cisco-asa\/","title":{"rendered":"Issue with NAT on Cisco ASA"},"content":{"rendered":"\n<p>I was working on upgrading my ASA firewall and was running into an issue with internet working on my device, but none of my server services were responding to requests:<\/p>\n\n\n\n<p class=\"has-text-color has-small-font-size has-medium-pink-color\">Result:<br> input-interface: outside<br> input-status: up<br> input-line-status: up<br> output-interface: inside<br> output-status: up<br> output-line-status: up<br> Action: drop<br> Drop-reason: (no-adjacency) No valid adjacency<\/p>\n\n\n\n<p>I had configured 1-to-1 Object Based NAT translations for my servers for this purpose as had been configured on my prior ASA device. I had just copied the NAT rules to the new device thinking that it should just work. Needless to say, I had to call Cisco TAC and open a case. This seemed to be an issue for them as well. We kept getting the same error as above with another error listed during the NAT translation of the packets:<\/p>\n\n\n\n<p class=\"has-text-color has-small-font-size has-medium-pink-color\">ifc selected is not same as preferred ifc<br>Doing route lookup again on ifc  inside<\/p>\n\n\n\n<p>We could ping internally to the server successfully from the ASA through the inside port:<\/p>\n\n\n\n<p class=\"has-text-color has-small-font-size has-medium-pink-color\">LDLNET-FW01(config)# ping LDLNET-LAN 192.168.100.x<br> Type escape sequence to abort.<br> Sending 5, 100-byte ICMP Echos to 192.168.100.x, timeout is 2 seconds:<br> !!!!!<br> Success rate is 100 percent (5\/5), round-trip min\/avg\/max = 1\/1\/1 ms<br><br>Packet Capture:<br><br>4 packets captured<br>1: 01:01:21.086894       192.168.100.2 > 192.168.100.x: icmp: echo request<br>2: 01:01:21.087153       192.168.100.x > 192.168.100.2: icmp: echo reply<br>3: 01:01:21.087886       192.168.100.2 > 192.168.100.x: icmp: echo request<br>4: 01:01:21.088069       192.168.100.x > 192.168.100.2: icmp: echo reply<\/p>\n\n\n\n<p>Again, I had created Object based NAT translations that should have worked for all the inside ports and allowed the packet traffic through properly:<\/p>\n\n\n\n<p class=\"has-text-color has-small-font-size has-medium-pink-color\">object network Exchange_Server<br>  nat (any,any) static ExchOut net-to-net<\/p>\n\n\n\n<p>Not having knowledge what the net-to-net statement within the NAT Rule stood for, we ended up scrapping all of the Object based NAT rules and created a new rule using a static route:<\/p>\n\n\n\n<p style=\"color:#26d037\" class=\"has-text-color has-small-font-size\">nat (LDLNET-LAN,outside) source static Exchange_Server ExchOut description Exchange NAT Both Directions<\/p>\n\n\n\n<p>Doing this worked for us and allowed traffic that was NOT translating correctly to be translated and flowing correctly through the ASA.<\/p>\n\n\n\n<p style=\"color:#26d037\" class=\"has-text-color has-small-font-size\">Phase: 17<br> Type: FLOW-CREATION<br> Subtype:<br> Result: ALLOW<br> Config:<br> Additional Information:<br> New flow created with id 12345, packet dispatched to next module<br> Module information for forward flow \u2026<br> snp_fp_tracer_drop<br> snp_fp_inspect_ip_options<br> snp_fp_tcp_normalizer<br> snp_fp_translate<br> snp_fp_adjacency<br> snp_fp_fragment<br> snp_ifc_stat<br><br>Module information for reverse flow \u2026<br> snp_fp_tracer_drop<br> snp_fp_inspect_ip_options<br> snp_fp_translate<br> snp_fp_tcp_normalizer<br> snp_fp_adjacency<br> snp_fp_fragment<br> snp_ifc_stat<br><br>Result:<br> input-interface: outside<br> input-status: up<br> input-line-status: up<br> output-interface: LDLNET-LAN<br> output-status: up<br> output-line-status: up<br> Action: allow<\/p>\n\n\n\n<p>Great! This is working now! The only issue is that I had to create static rules that go through the single interface on the ASA. What if I need to connect other devices to the ASA on different interface ports? Well, I will have to create the static NAT rules for those ports as well. If the current interface fails, I will have to recreate the static NAT Rules for the interface port that I change to. Secure in a way, but not how I think it should be designed.<\/p>\n\n\n\n<p>If anyone has any suggestions for the configuration of this, why I was getting the error, or a way to get the Object Based NAT rules working properly, <strong>PLEASE COMMENT!<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" style=\"text-align:center\">I&#8217;M ALWAYS LOOKING FOR THE BEST SOLUTION!<br>PLEASE LEAVE YOUR COMMENTS!<\/h3>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2019\/05\/LDLNET-Leaderboard-728x90.png\" alt=\"LDLNET LLC (844) 884-7838\" class=\"wp-image-423\" srcset=\"https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2019\/05\/LDLNET-Leaderboard-728x90.png 728w, https:\/\/itblog.ldlnet.net\/wp-content\/uploads\/2019\/05\/LDLNET-Leaderboard-728x90-300x37.png 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><figcaption>Contact sales@ldlnet.net for more information!<\/figcaption><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>I was working on upgrading my ASA firewall and was running into an issue with internet working on my device, but none<\/p>\n<p class=\"link-more\"><a class=\"myButt \" href=\"https:\/\/itblog.ldlnet.net\/index.php\/2019\/05\/07\/issue-with-nat-on-cisco-asa\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[181,2,180],"tags":[182,183,184,185,188,187,186],"class_list":["post-422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco","category-general","category-networking","tag-asa","tag-cisco","tag-ios","tag-nat","tag-packet","tag-translate","tag-translation","odd"],"_links":{"self":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/comments?post=422"}],"version-history":[{"count":1,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/422\/revisions"}],"predecessor-version":[{"id":425,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/422\/revisions\/425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media\/424"}],"wp:attachment":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media?parent=422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/categories?post=422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/tags?post=422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}