[c-nsp] Cisco ASA 5510 DMZ Zone mail server not access Internet

Md. Jahangir Hossain jrjahangir at yahoo.com
Thu Nov 22 14:24:32 EST 2012


Dear Honorable Friend:
 

Wishes all are fine.

I faced some difficulties about Cisco
ASA firewall. The problem details are:
 
I configured on my ASA 5510 dmz
zone and put my mail server in this zone. i configured nat rule with public
address which i received from my ISP as well as configured ACL rule. 
 
My  Mail server cannot access the internet. My ISP
is registered in dns zone A record on my public IP 119.x.x.86, MX record and
TXT record, but i can't access to internet from my mail server.
 
My Mail server ip address
192.168.100.10 which static nat with 119.x.x.85.
But I can access internet from one
of workstation which ip is 192.168.100.50 which static nat with 119.x.x.83. Need your suggestion for resolved this issue.

 


My configuration of asa 5510 is:
 

hostname
ciscoasa
domain-name
cisco.com
dns-guard
!
interface
Ethernet0/0
description
Server_Zone
 nameif dmz
 security-level 50
 ip address 192.168.100.1 255.255.255.0 
!
interface
Ethernet0/1
 description Local_Lan
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.248.0 
!
interface
Ethernet0/2
 description ISP_Connectivity
 nameif outside
 security-level 0
 ip address 119.x.x.82 255.255.255.240 
 
interface
Ethernet0/3
 description Connection between Firewall to
Router
 nameif Firewall2Router
 security-level 100
 ip address 172.x.x.1 255.255.255.252 
!
boot
system disk0:/asa822-k8.bin
ftp
mode passive
clock
timezone MAWT 6
dns
server-group DefaultDNS
domain-name
cisco.com
same-security-traffic
permit inter-interface
access-list
outside_access_in extended permit ip any any 
access-list
dmz_access_in extended permit ip any any 
access-list
inside_access_in extended permit ip any any 
access-list
Firewall2Router_access_in extended permit ip any any 
access-list
Firewall2Router_access_out extended permit ip any any 
access-list
inside_access_out extended permit ip any any 
access-list
dmz_access_out extended permit ip any any 
access-list
outside_access_out extended permit ip any any 
pager
lines 24
logging
enable
mtu
dmz 1500
mtu
inside 1500
mtu
outside 1500
icmp
unreachable rate-limit 1 burst-size 1
asdm
image disk0:/asdm-632.bin
no
asdm history enable
arp
timeout 14400
global
(outside) 1 interface
nat (inside) 1 192.168.0.0
255.255.248.0
nat (inside) 0 access-list
inside_nat0_outbound
 
static
(dmz,outside) 119.x.x.83 192.168.100.100 netmask 255.255.255.255 
static
(dmz,outside) 119.x.x.85 192.168.100.50 netmask 255.255.255.255 
access-group
dmz_access_in in interface dmz
access-group
dmz_access_out out interface dmz
access-group
inside_access_in in interface inside
access-group
inside_access_out out interface inside
access-group
outside_access_in in interface outside
access-group
outside_access_out out interface outside
access-group
Firewall2Router_access_in in interface Firewall2Router
access-group
Firewall2Router_access_out out interface Firewall2Router
route
outside 0.0.0.0 0.0.0.0 119.x.x.81 1
 
class-map
inspection_default
 match default-inspection-traffic
!
!
policy-map
type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map
global_policy
 class inspection_default
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect skinny  
  inspect esmtp 
  inspect sqlnet 
  inspect sunrpc 
  inspect sip  
  inspect xdmcp 
  inspect icmp error 
!
service-policy
global_policy global
prompt
hostname context 
call-home
 profile CiscoTAC-1
  no active
  destination address http
https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome at cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic
monthly
  subscribe-to-alert-group configuration
periodic monthly
  subscribe-to-alert-group telemetry periodic
daily
 
ciscoasa# show version 
Cisco Adaptive Security Appliance
Software Version 8.2(2) 
Device Manager Version 6.3(2)
Compiled on Mon 11-Jan-10 14:19 by
builders
System image file is
"disk0:/asa822-k8.bin"
Config file at boot was
"startup-config"
Hardware:   ASA5510, 256 MB RAM, CPU Pentium 4 Celeron
1600 MHz
Internal ATA Compact Flash, 256MB
 
Licensed features for this
platform:
Maximum Physical Interfaces    : Unlimited 
Maximum VLANs                  : 100       
Inside Hosts                   : Unlimited 
Failover                       : Active/Active
VPN-DES                        : Enabled   
VPN-3DES-AES                   : Enabled   
Security Contexts              : 2         
GTP/GPRS                       : Disabled  
SSL VPN Peers                  : 2         
Total VPN Peers                : 250       
Shared License                 : Disabled
AnyConnect for Mobile          : Disabled  
AnyConnect for Cisco VPN Phone :
Disabled  
AnyConnect Essentials          : Disabled  
Advanced Endpoint Assessment   : Disabled  
UC Phone Proxy Sessions        : 2         
Total UC Proxy Sessions        : 2         
Botnet Traffic Filter          : Disabled  
 
This platform has an ASA 5510
Security Plus license.





Thanks
Jahangir


More information about the cisco-nsp mailing list