Cisco Firewall :: ASA 8.3 ACL Denying Access To DMZ?

Mar 6, 2012

I am migrating an asa 5520 from 8.2 to 8.3 and after the migration the ACL's are blocking access to the DMZ. It looks like the NAT functions were migrated properly by the migration tool but now when I try to access devices in the DMZ the ACL is denying the traffic because my acls in 8.2 had the NATTED IP, not the real IP in the ACL. Now it looks like 8.3 is looking for the real IP and not the NATTED IP.
 
Here is an example:
 
Inside network: 172.24.0.0/24
DMZ server real IP: 1.1.1.1
DMZ server NAT IP 2.2.2.2
 
so, in 8.2 I would have an ACL on the inside interface that said permit 172.24.0.0/24 to 2.2.2.2 eq 80, 443. This acl doesn't work in my 8.3 config because it wants: permit 172.24.0.0/24 to 1.1.1.1 eq 80, 443.
 
Is this correct for 8.3 or are my NAT rules all messed up after the migration?

View 2 Replies


ADVERTISEMENT

Cisco Firewall :: ASA 8.4 Denying Traffic

Apr 23, 2013

I'm having a (fairly common) problem with my ASA in that I cannot get traffit to pass through it. I can't determine the source of this problem and need getting traffic from my inside network (10.1.2.1, please ignore anything labled 192.168.X.X) to my outside network.
 
-The border router can ping the Internet, itself, and the ASA's outside int (10.1.1.2)
-The ASA can ping everything
-An ASDM can connect and can manage the ASA via the 10.1.3.2 management cloud
-The inside router (R2) can ping the inside int of the ASA but not the outside
 
I've tried in both the CLI and ASDM to:   -Add network objects to prepare configuring NAT (objects required after 8.3 I believe)   -Configure NAT (static)   -Configure ACL's to allow any traffic in any direction (just for these initial testing purposes)   -Allow ICMP inspection (which was weird because my ASA had no global_policy and I had to make one)
 
The ASDM doesn't show any logging traffic when I try to ping from R2 (192.168.150.150 or old 10.1.2.2) to my Border (either ints, both being inside 10.1.1.1 and outside 172.16.68.190). Again, I can't even ping the outside int of the ASA from R2. [code]

View 10 Replies View Related

Cisco Firewall :: ASA5510 Denying TCP Connections

Aug 15, 2012

We are implementing an ASA 5510 firewall with DMZ.  Our UDP packets are able to get outside the firewall, but our TCP packets are being denied because of no connection.  I've attached the config file and log file.

View 2 Replies View Related

Cisco Firewall :: ASA 5520 Denying SSH Connection

Apr 9, 2013

Device Cisco ASA
Model:5520
OS 8.4(2)
 
I am not able to access the device via SSH .After connecting to teh console I have found that allowed SSh session are fully utilized with show resource usage command and the output is [code]
 
So I used show ssh session command to see who is using the sessions but in the output it has showed only one session and the output was [code]

I was wondering why it shows only one session above instead of showing all the 5 sessions which are utilized as confirmed by show resource usge command.We are usning some internal tool for ssh monitoring on device which is poling the device after a fixed interval for port 22 reachabilty .I dont think these tools are making any issue as this is secondary firewall and we are not facing any reachabilty issue for primary firewall.also we are using 10 min for idle ssh timeout.

View 13 Replies View Related

Cisco Switching/Routing :: 3750x - Denying VLAN Access To Other VLANs

Mar 18, 2013

I've got a 3750x stack set up as my core switch (only a small-ish environment) - I'm shortly going to be deploying an enterprise wireless network with Corporate and Guest SSID's. I'm going to be putting all traffic from the Guest SSID in VLAN 244, and don't want it to have access to any of the other VLANs (1 (Legacy Eqpt), 4, 8, 12, 16, 20, 24, 28, 32, 248 & 252).
 
IP ranges for all the main VLANs are:
 
1: 10.0.0.x/22
4: 10.0.4.x/22
8: 10.0.8.x/22
12: 10.0.12.x/22
16: 10.0.16.x/22 etc etc (you get the pattern)
 
I'll probably give Guest traffic (VLAN 248) the IP range 192.168.10.x/22 (not because I NEED that many addresses, but it's easier for everyone to remember/understand if I keep the subnet masks the same all round). However I also have a CCTV VLAN (252) which already has the range 192.168.0.x/24, which some people in other VLANs WILL need access to.
 
So my question is: What is the syntax for the ACL on my 3750x (IP base - 15.0.2) to prevent traffic from VLAN 244 gaining access to any of my other VLANs. I'm making a broad assumption here that a layer 3 switch is perfectly capable of supporting that function? I need ALL the syntax for setting up ACL's - I've never done it before
 
My gateway device by the way is 10.0.4.1, and I do have inter-VLAN routing set up on the core switch (obviously).

View 3 Replies View Related

Cisco :: Setting Up A Local User But Denying Telnet / Ssh?

Mar 14, 2012

A quick query regarding setting up a local user on a Cisco 2811. I have setup a few users as they need to have remote VPN access into our edge router, this works fine and I'm happy with it. The only thing is that when they come into the office they now have logins to get onto the router, they do not have the enable secret so they can't exactly do a lot (plus I've created them with privilege 0 which cuts a few extra CLI options) but I'd rather not allow them access at all if possible.If they weren't on DHCP then I could setup an access-list but this isn't really an option, I could also set me up statically and deny everyone else, but yet again I'd rather not.Is there anyway to restrict telnet/ssh access based on user alone? So when they put in their login it just boots them out. I could setup something like RADIUS (and therefore remove the local users completely) but I think it will be a bit over kill for the sake of a couple of users.

View 1 Replies View Related

Cisco Firewall :: ASA 5510 - Users Unable To Access Internet Through Firewall

Feb 26, 2013

I have some problem with the ASA 5510 ver 7.0(6). My manager wants to keep this as backup. tried lots of things but still users not able to access internet nor can i ping anywhere.For example when i ping 4.2.2.2 i dont get any reply.The runing config is below for ur ref :
 
HQ-ASA-01# show  running-config
: Saved
:

[Code]......

View 9 Replies View Related

Cisco Firewall :: Users Behind ASA5505 Firewall Are Unable To Access Internet

Feb 24, 2011

I have a normal setup of ASA5505 (without security license) connected behind an internet router. From the ASA5505 console I can ping the Internet. However, users behind the Firewall on the internal LAN, cannot ping the Internet even though NATing is configured. The users can ping the Inside interface of the Firewall so there is no internal reachability problem. In addition, I noticed that the NAT inside access list is not having any hit counts at all when users are trying to reach the internet.

When i replace the ASA5505 with a router with NAT overload configuration on it, the setup works normally and users are able to browse the internet.

The ASA5505 configuration is shown below.

hostname Firewall

interface Ethernet0/0
description Connected To Internet Router
switchport access vlan 10

[Code].....

View 2 Replies View Related

Cisco Firewall :: How To Configure Firewall Access For ASA 5510

Nov 4, 2012

This is my first time to use the Cisco ASA 5500 family. I have a request from a user to create an access rule, to allow all LAN traffic to Destination IP address 165.241.29.17, 165.241.31.254 with Destination TCP port 5060,5061,5070 and UDP port 50000-52399.

View 9 Replies View Related

Cisco Firewall :: 837 Hardening Access And Firewall Rules

Mar 21, 2012

i have a cisco 837.I need hardening the access and firewall rules. I dont understand ip inspect.

View 1 Replies View Related

Cisco Firewall :: ASA 5520 - NAT And Firewall Access Control

Oct 4, 2012

I have an ASA 5520 in my company which does all our NAT and Firewall access control.  Currently there is a rule in place to allow an incoming connection on port 2222 from a specific ip address to allow access to a web app our developers created.  This is a test before the web app is released live.  Now the web app can communicate with the specific address and port but the incoming connection on port 2222 isn't getting through.  Everything looks great in the firewall but how can I log any hits this ACL takes to identify any potential problems?

View 2 Replies View Related

Cisco Firewall :: Rv042 - Firewall Access Rule

Jun 3, 2013

I have a server behind an rv042 that i would like to block access to on one port from outside in.  I have configured the rule as follows:
 
priority = 1.  policy name<name>.  enable<checked>.  action = deny.  service <service to block>. source interface = wan1.  sources = any.  destination = <public ip address of server>.  day <nothing>. 

This does not block the intended port from outside.  I also changed the destination to be the private ip address and i changed the source interface to LAN and to *.  What is the correct syntax to do this?.  Port forwarding is enabled.  I noticed that there is one entry in the forwarding table for the public ip but it is going to a dead private ip address.  Would this have an effect? 

View 5 Replies View Related

Cisco Firewall :: RDP Access Through ASA5510 Firewall?

Feb 12, 2012

i  am  using Cisco ASA5510 Firewall  in my  Network in the distrubition Layer .Private Range of Network Address  use  in the Network  and PAT  at the FW for  address translation.presently  encountering an issue  the users  behind  the FW  in my network  unable to  RDP  at port 2000  presented  at the Client Network.Able to Telnet  on port2000 but  not RDP .  any changes needed at the FW end  to  get the RDP Access.

View 12 Replies View Related

Cisco Firewall :: ZBF And VPN Access In 891

Jul 20, 2011

After applying ZBF in a 891, users can not connect to internal resources after a successful VPN establishment. For testing purposes I've created only two zone-pair without using the self-zone, only LAN-to-WAN and WAN-to-LAN. In the last one I've permitted everything in the corresponding class-map. From the point of view of the router, traffic of vpn clients comes in the WAN interface to LAN, right?

Below is the current configuration.

VPN clients get address from the 172.16.73.0/24 pool and internal resources are in the 172.16.72.0/24. Ping from 172.16.73.x to 172.16.7.2 fails.
 
class-map type inspect match-any CM_LAN_TO_WAN
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-any CM_WAN_TO_LAN
[Code]....

View 3 Replies View Related

Cisco Firewall :: Can't Access ASA 5505 Via SSH

Apr 23, 2010

I can't access our ASA 5505 via SSH from the outside. I've configured this through the ASDM to allow SSH (Device Management > Management Access > ASDM/HTTPS/Telnet/SSH). I added a rule that allows SSH on the outside interface from 0.0.0.0 0.0.0.0. When I try to ssh in with putty, it says "server unexpectedly closed network connection" When I watch the logs on the ASA, it shows a Built inbound TCP connection on port 22, but then immediately a Teardown TCP connection. It doesn't show it's being blocked by any rule. Is there something I'm missing on enabling SSH?

View 13 Replies View Related

Cisco Firewall :: ASA 5510 - Cannot Access To Dmz From Outside

Jun 26, 2012

I have a new ASA 5510 firewall, the objective is to set up a DMZ zone. my problem is I can't access to the web server in the DMZ from outside
 
DMZ ==========> outside OK 
INSIDE ==========> DMZ OK 
DMZ ============> Inside OK 
OUTSIDE ==========> DMZ  NOK "FAIL"
  
I put in attachment the running-config file.

View 6 Replies View Related

Cisco Firewall :: DVR 8000 Access Through ASA From Outside

Sep 3, 2012

I have my ASA configured with Static PAT commands. Currently there are 6 DVR machines in my organization with different IP Addresses 192.168.8.1 - 192.168.8.6 and port used by all DVR is 8000.I have a requirement to make these DVR able on Internet for management purpose. Right now i am using below command for DVR static PAT .Now my query is that how can i use port 8000 with all the Static PAT to be used for DVR Access with different IP addresses.Secondly, when i try to hit http://111.119.x.x:8000 from internet i got error The Page Cannot be delayed.

View 8 Replies View Related

Cisco Firewall :: Cannot Access Outside From Dmz - ASA 5505

Aug 7, 2012

I am not able to get to the internet from my DMZ ip address.

Here is my config.
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2(code)

View 4 Replies View Related

Cisco Firewall :: ASA 8.4.I Can't Access Any Networks

Feb 21, 2013

I have just set up anyconnect vpn on my box. I'm running ASA 8.4. I can connect with anyconnet client, but i cant access any networks. [code]

View 3 Replies View Related

Cisco Firewall :: Cannot Access Certain Websites Behind PIX 501 With 6.2 FW

Oct 9, 2012

I have a PIX 501 with 6.2 FW.  The firewall inside network is connected to a Windows server (Mailserver).  I can get access to most websites on all clients as well as on the server.  However, there are some particular websites, such as facebook.com that the server and all but one client cannot access.  I get a "cannot display the webpage" in internet explorer.
 
I have disabled the Windows firewall and AV.  I have also scanned for any malware and no malware was found.
 
I found on the forums a "fixup protocol dns" solution, but my PIX version does not support it.
 
Below is my config:
 
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100

[Code]......

View 12 Replies View Related

Cisco Firewall :: Static NAT And Access From Outside In ASA 8.4

Aug 24, 2011

I have configured Static NAT on ASA 8.4; and opened the telnet access through following configuration but it is not working. What mistake I am making in my configuration
 
interface Ethernet0/0nameif outsidesecurity-level 0ip address 119.36.105.210 255.255.255.240!interface Ethernet0/1nameif insidesecurity-level 100ip address 192.168.117.1 255.255.255.0
hostname(config)# object network Router_A
hostname(config-network-object)# host 192.168.117.2
hostname(config-network-object)# nat (inside,outside) static 119.36.105.211
hostname(config)# access-list ACCESS-TO-SERVER extended permit tcp any host 119.36.105.211 eq telnet
hostname(confi)# access-group ACCESS-TO-SERVER in interface outside
 
The host (router) 192.168.117.2 can access internet after this configuration but telnet is not possible from outside.

View 2 Replies View Related

Cisco Firewall :: Remote Access VPN 10.42.10.0

Nov 26, 2012

I have a remote access VPN to our office network 10.42.10.0. however I have some web services that are located in a production network 10.42.1.0 that users in the office network need to access.This is obviously no problem when using remote desktop to an office PC but when users with laptops remote in and try to access the website on the production network it does not work.
 
Is there any way for the tunnel also to also allow traffic to the production network  for the remote hosts?

View 8 Replies View Related

Cisco Firewall :: Access From Outside Of 5505?

Mar 8, 2013

I have a web server behind my 5505 that I'd like to access from the outside of the 5505 (still within my home network though). Its running on port 3000. I made the changes but I have been unable to access my server from the outside.

I do have an Airport Extreme in from of the 5505 and the 5505 is getting its address via dhcp from the airport. So I'm trying to hit 192.168.2.57:3000 from my wireless airport network.

[code]...

View 8 Replies View Related

Cisco Firewall :: ASA 8.2.5 - DMZ To Inside Access?

Oct 18, 2012

A Cisco ASA running 8.2.5 with 3 interfaces: Outside (Sec lvl 0)/-nternet IP / DMZ (Sec lvl 2)-192.168.8.0/24 / Inside (Sec level 100)-192.168.1.0/24
 
An ACL on the DMZ which looks like this:
 
access list DMZ_IN permit ip 192.168.8.0 255.255.255.0 any
access list DMZ_IN deny ip any any
access-group DMZ_IN in interface DMZ 
global (outside) 1 interface
nat (DMZ) 1 192.168.8.0 255.255.255.0
 
Nat Control  is not enabled (by default) There is no nat exemption, static identity nat or any nat of any kind set up between the Inside and DMZ.The question is:  Will the DMZ network be able to initiate connections to the Inside network or will only outside (internet) access be permitted?
 
A) No, inside access will not be permitted, only Interenet access will be permitted, because there is no NAT exemption or Static Identity NAT between the lower level security interface (DMZ) and the Higher level security interface (Inside), regardless of the DMZ ACL rule with a destination of ANY.
 
B) Yes, access to the Internet and the Inside can be initiated because NAT control is disabled and there is an ACL that permits DMZ traffic to 'ANY' destination.

View 4 Replies View Related

Cisco Firewall :: ASA 5505 - VPN Access

Sep 22, 2011

if log on to the firewall with the enable_15 account remotely via a Cisco IPSec VPN client? Similarly, how do you restrict access to the ADSM to the local LAN for the enable_15 account? Is there a way to tell when a user last logged on via an IPSec VPN?

View 4 Replies View Related

Cisco Firewall :: ASA 9.1 Inside To DMZ Access

Feb 26, 2013

I recently upgraded my asa from 8.2 to 9.1 (reconfigured from scratch - didnot convert old config) and everything seems to be working fine except for communication between my INTERNAL network and my DMZ. Here's my config below -
 
ASA Version 9.1(1)
!
hostname ZEPPELIN
domain-name MIWEBPORTAL.com
enable password XXXXX
[Code]...

View 15 Replies View Related

How To Access A Firewall On Lan

Feb 4, 2012

how can i access the firewall device on lan port to configure it and edit the setting it .

View 1 Replies View Related

Cisco :: Get VPN IP Address Without Giving Someone Access To The Firewall Itself?

Dec 6, 2011

Is there a way to get VPN IP address without giving someone access to the firewall itself? LIke a script you can put on a website?

View 2 Replies View Related

Cisco Firewall :: ASA 5505 And Access Point In DMZ?

Jan 11, 2013

I have question about license for ASA 5505. I have to put public access point behind ASA into DMZ. Do I need to hava the unlimited license? Does Securipty Plus license include unlimited users option and 50 VLAN or I will need different type of license.

View 2 Replies View Related

Cisco Firewall :: Can't Access Web-server Behind ASA 5520 8.4(2)

Dec 13, 2012

How can I access my webserver (on my private LAN) from the internet? INTERNET------------(53.X.X.1 )ASA(192.X.X.X)DMZ-----------(192.X.X.80)HTTP SERVER. I can ping my public address on the ASA outside interface 53.X.X.1 form the internet, but I'm not sure how to do this. I tried to NAT, but I'm failing.

View 3 Replies View Related

Cisco Firewall :: ASA 5510 - Cannot Access Asdm

Oct 5, 2012

Recently powered down device (transformer overhaul) and when it booted back up, unable to access with ASDM, SSH...can access directly using HyperTerm, but have only limited commands...will not accept known user/password credentials. When I issue 'show flash' I can see that there are upgrade_startup_errors.log files, but cannot access them.

View 5 Replies View Related

Cisco Firewall :: Access-list On ASA5520

Feb 23, 2011

I have a question about access-lists on ASA: (5520 running 8.4)Often I want to permit all traffic from networks behind an interface (let's say DMZ in this example) to Internet, but NOT to internal networks. Then I  first configure a Deny from DMZ to all internal network and then a Permit to ANY. If I forget the first Deny I will allow all traffic also to my internal networks. Is it possible to configure an access-list that permit all traffic from a network to all networks that are reachable via a given interface? In this example: Permit all traffic from DMZ to all networks that are reachable via the Outside-interface? This should permit traffic to Internet and deny traffic to internal networks in one statement.If I specify the outside-interface as the destination only traffic to the interface itself will be allowed.

View 1 Replies View Related

Cisco Firewall :: Configure SSH Only Access On PIX 506e

Mar 4, 2011

How to configure SSH access on my PIX 506e.  I would like to use local authentication with no AAA server.  Also I would like to have telnet disabled completely.

View 3 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved