This is basically a copy and paste from the Cisco forums, hopefully another group of eyes can help me here.
Issue 1:
I have an internal Spiceworks webserver sitting behind a 5512. I can't seem to figure out how to configure hairpin NAT using ASDM. I'm not familiar enough with the CLI anymore to tackle it that way. Additionally, initial requests are made on port 80 and then changed by the webserver to port 9675. The webserver is on a domain controller that sits on the same network and utilizes the same interface as the rest of the LAN subnet.
Issue 2:
External users are able to access the webserver and use it but files do not load. I have a page with JPGs that do not load and every link to PDF files does not load. They worked just fine prior to adding the ASA so I'm assuming the ASA is filtering it out somehow but I'm not sure where.
Issue 3:
Internal traffic is being filtered oddly. Prior to adding the ASA, users on the same network as the domain controllers had drive maps applied to them through group policies. Since adding the ASA, those drive mappings are no longer being done.
e0/0: Outside interface - Public IP --->ISP Fiber switch
e0/5: Inside interface - LAN Network --> LAN Switch --->Domain Controllers & user workstations.
Bonus Problem:
I have a /28 network provided by my ISP. Internally, we have a phone system and two data networks that I'd like to distribute our public IPs to. Unfortunately, I see that it's not as simple as assigning an individual public IP to each hardware interface. So here's what I'd like to do....how do I do it:
e 0/0 - Public IP 71.0.0.1/28 physical connection to ISP
e 0/1 - Public IP 71.0.0.2/28 physical connection to Internal Phone System
e 0/2 - Public IP 71.0.0.3/28 physical connection to LAN2 (192.168.0.0/24)
e 0/5 - Internal LAN1 10.0.0.0/24 physical connection to LAN1 switches
Issue 1:
I have an internal Spiceworks webserver sitting behind a 5512. I can't seem to figure out how to configure hairpin NAT using ASDM. I'm not familiar enough with the CLI anymore to tackle it that way. Additionally, initial requests are made on port 80 and then changed by the webserver to port 9675. The webserver is on a domain controller that sits on the same network and utilizes the same interface as the rest of the LAN subnet.
Issue 2:
External users are able to access the webserver and use it but files do not load. I have a page with JPGs that do not load and every link to PDF files does not load. They worked just fine prior to adding the ASA so I'm assuming the ASA is filtering it out somehow but I'm not sure where.
Issue 3:
Internal traffic is being filtered oddly. Prior to adding the ASA, users on the same network as the domain controllers had drive maps applied to them through group policies. Since adding the ASA, those drive mappings are no longer being done.
e0/0: Outside interface - Public IP --->ISP Fiber switch
e0/5: Inside interface - LAN Network --> LAN Switch --->Domain Controllers & user workstations.
Bonus Problem:
I have a /28 network provided by my ISP. Internally, we have a phone system and two data networks that I'd like to distribute our public IPs to. Unfortunately, I see that it's not as simple as assigning an individual public IP to each hardware interface. So here's what I'd like to do....how do I do it:
e 0/0 - Public IP 71.0.0.1/28 physical connection to ISP
e 0/1 - Public IP 71.0.0.2/28 physical connection to Internal Phone System
e 0/2 - Public IP 71.0.0.3/28 physical connection to LAN2 (192.168.0.0/24)
e 0/5 - Internal LAN1 10.0.0.0/24 physical connection to LAN1 switches