I have an ASA 5510 running 8.2(5) with the following configuration and I am having problems routing traffic between sub-interfaces at the same security level. Although not shown there are ACL's for each sub-interface allowing ICMP and IP traffic in both directions. NOTE: I have cut down the amount of config posted but what is there should be sufficient.
The restrictions in place are: No upgrade beyond 8.2(5) No use of same-security commands All inside interfaces to be same security level.
Traffic flows to/from the outside to the various sub-interface, but between sub-interfaces it is hit & miss, which is the source of my confusion. If it were consistent in not working it would be easy.
The problems I am seeing for example are:
- Asymmetric NAT rules matched for forward and reverse flows; for traffic from sub-int 112 to 104
- ICMP traffic being denied by an implicit rule, yet each ACL has
ext perm ICMP any any - I am pretty sure this line nat (DMZ-102) 1 192.168.102.0 255.255.255.0 is an error but having it or removing it seems to make no difference.
So if anyone has suggestions/recommendations please let me know.
interface Ethernet0/0 speed 100 duplex full nameif outside security-level 0 ip address 10.172.1.212 255.255.255.0 interface Ethernet0/1 speed 1000 duplex full no nameif no security-level no ip address interface Ethernet0/1.102 vlan 102 nameif DMZ-102 security-level 100 ip address 192.168.102.251 255.255.255.0 interface Ethernet0/1.103 vlan 103 nameif DMZ-103 security-level 100 ip address 192.168.103.252 255.255.255.0 interface Ethernet0/1.104 vlan 104 nameif DMZ-104 security-level 100 ip address 192.168.104.252 255.255.255.0 interface Ethernet0/1.112 vlan 112 nameif DMZ-112 security-level 100 ip address 192.168.112.252 255.255.255.0 access-list incoming extended permit ip any any access-list OUTBOUND extended permit ip any any global (outside) 1 interface global (DMZ-102) 1 interface global (DMZ-103) 1 interface global (DMZ-104) 1 interface global (DMZ-112) 1 interface nat (DMZ-102) 1 192.168.102.0 255.255.255.0 nat (DMZ-102) 0 192.168.102.0 255.255.255.0 nat (DMZ-103) 0 192.168.103.0 255.255.255.0 nat (DMZ-104) 0 192.168.104.0 255.255.255.0 nat (DMZ-112) 0 192.168.112.0 255.255.255.0 static (DMZ-103,outside) 10.172.1.213 192.168.103.11 netmask 255.255.255.255 static (DMZ-102,DMZ-103) 192.168.102.0 192.168.102.0 netmask 255.255.255.255 static (DMZ-102,DMZ-104) 192.168.102.0 192.168.102.0 netmask 255.255.255.255 static (DMZ-102,DMZ-112) 192.168.102.0 192.168.102.0 netmask 255.255.255.255 static (DMZ-103,DMZ-102) 192.168.103.0 192.168.103.0 netmask 255.255.255.255 static (DMZ-103,DMZ-104) 192.168.103.0 192.168.103.0 netmask 255.255.255.255 static (DMZ-103,DMZ-112) 192.168.103.0 192.168.103.0 netmask 255.255.255.255 static (DMZ-104,DMZ-102) 192.168.104.0 192.168.104.0 netmask 255.255.255.255 static (DMZ-104,DMZ-103) 192.168.104.0 192.168.104.0 netmask 255.255.255.255 static (DMZ-104,DMZ-112) 192.168.104.0 192.168.104.0 netmask 255.255.255.255 static (DMZ-112,DMZ-102) 192.168.112.0 192.168.112.0 netmask 255.255.255.255 static (DMZ-112,DMZ-103) 192.168.112.0 192.168.112.0 netmask 255.255.255.255 static (DMZ-112,DMZ-104) 192.168.112.0 192.168.112.0 netmask 255.255.255.255 access-group incoming in interface outside access-group OUTBOUND out interface outside route outside 0.0.0.0 0.0.0.0 10.172.1.1 1