Static NAT/FTP SERVER problem

deacongibsondeacongibson Member Posts: 8 ■□□□□□□□□□
I am new to Firewall and about taking the FIREWALL v2.0 642-618. After several attemps, i am in this forum for solution.

I can ping from all lower secuity level interfaces to higher security level interface, I can also ping the DMZ server from outside interface.

But I cannot connect to my Filezilla server in DMZ server from an outside host when my DMZ NAT configuration is set from higher to lower eg (NAT (DMZ,OUTSIDE)), but I can connect to my Filezilla server when I reverse the configuration eg (NAT (OUTSIDE,DMZ)).

From all knowledge cisco books and toturials, is suppose to be (NAT (DMZ,OUTSIDE)). I need to connect to FTP server using the right NAT static configuration which is (NAT (DMZ,OUTSIDE)).

I need someone to help me out on what i am doing wrong.

See hereunder for config.

ASA2(config)# sh run
: Saved
ASA Version 8.4(2)
hostname ASA2
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
interface GigabitEthernet0
nameif inside
security-level 100
ip address
interface GigabitEthernet1
nameif OUTSIDE
security-level 0
ip address
interface GigabitEthernet2
nameif DMZ
security-level 50
ip address
interface GigabitEthernet3
no nameif
no security-level
no ip address
interface GigabitEthernet4
no nameif
no security-level
no ip address
interface GigabitEthernet5
no nameif
no security-level
no ip address
ftp mode passive
dns domain-lookup inside
dns server-group Default
object network INSIDE-NET
object network DMZ-NAT
object network POOL-RANGE-4-INSIDE-NET
object network SERVER2-REAL-IP
object-group network DM_INLINE_NETWORK_1
network-object object INSIDE-NET
access-list OUTSIDE_access extended permit tcp any object SERVER2-REAL-IP eq ftp
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu OUTSIDE 1500
mtu DMZ 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
object network INSIDE-NET
nat (inside,any) dynamic POOL-RANGE-4-INSIDE-NET
object network SERVER2-REAL-IP
nat (OUTSIDE,DMZ) static DMZ-NAT
access-group OUTSIDE_access in interface OUTSIDE
router eigrp 1
no auto-summary
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
class-map global-class
match default-inspection-traffic
class-map global-class1
match any
policy-map global-policy
class global-class
inspect dns
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rtsp
inspect sip
inspect esmtp
inspect rsh
inspect skinny
inspect sqlnet
inspect sunrpc
inspect tftp
inspect xdmcp
inspect ftp
inspect icmp
class global-class1
set connection advanced-options tcp-state-bypass
service-policy global-policy global
prompt hostname context
no call-home reporting anonymous
profile CiscoTAC-1
no active
destination address http https://tool


Sign In or Register to comment.