<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can you post sanitized config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996910#M151581</link>
    <description>&lt;P&gt;Can you post sanitized config of your ASA ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thx&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
    <pubDate>Sat, 27 Aug 2016 02:46:05 GMT</pubDate>
    <dc:creator>mvsheik123</dc:creator>
    <dc:date>2016-08-27T02:46:05Z</dc:date>
    <item>
      <title>Cisco ASA and Citrix Netscaler</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996905#M151575</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am currently attempting to setup a Citrix Netscaler in our environment. I have encountered a roadblock though. We currently have 1 DMZ where the Netscaler is sitting. When attempting to setup LDAP authentication to our domain controller on our Inside network, it fails to detect the server. I opened a thread on Citrix's forums and have made some progress but still haven't resolved the issue.&lt;/P&gt;
&lt;P&gt;First off our network details.&lt;/P&gt;
&lt;P&gt;Netscaler SNIP&amp;nbsp;- 172.16.1.46&lt;/P&gt;
&lt;P&gt;DC - 192.168.1.43&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The information I acquired from Citrix was to run&amp;nbsp;nstcpdump.sh host 192.168.1.43 on the console. At first it revealed an R flag when the Netscaler SNIP attempted to communicate to our DC. I added an access rule in our ASA to allow TCP/LDAP from 172.16.1.46 -&amp;gt; 192.168.1.43. Now when performing the nstcpdump.sh command, I receive the R flag but this time from 192.168.1.43 [port 389]&amp;nbsp;-&amp;gt; 172.16.1.46 [any port]. I am having troubles how to achieve a solution. I figure it is an access rule that needs to be set up but what I've tried so far is not fairing well. Any ideas? I really appreciate any feedback!&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Kalab&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996905#M151575</guid>
      <dc:creator>beesley</dc:creator>
      <dc:date>2019-03-12T08:08:39Z</dc:date>
    </item>
    <item>
      <title>Hi Kalab,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996906#M151576</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Kalab,&lt;/P&gt;
&lt;P&gt;What is the ASA version? Assuming you have required routing in place...&lt;/P&gt;
&lt;P&gt;1.Inside to DMZ communication allowed?&lt;/P&gt;
&lt;P&gt;2. Access list applied and no deny statements above the permit rule?&lt;/P&gt;
&lt;P&gt;Try packet tracer from ASA...&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input DMZ tcp 172.16.1.46 54444 &lt;SPAN&gt;192.168.1.43&lt;/SPAN&gt;&amp;nbsp;389&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;It will give display what casing the issue. Post the output.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hth&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2016 23:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996906#M151576</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-08-17T23:31:07Z</dc:date>
    </item>
    <item>
      <title>ASA version is 9.1.7 (ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996907#M151577</link>
      <description>&lt;P&gt;ASA version is 9.1.7 (ASA 5510)&lt;/P&gt;
&lt;P&gt;In our NAT rules, I have a rule that allows Inside to DMZ1 communication (Server on inside network to Netscaler SNIP on DMZ1)&lt;/P&gt;
&lt;P&gt;I only have one deny rule and that is the Global which is an implicit rule (Source Any, Dest Any, Service IP, Action Deny)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is the output from the packet tracer.&lt;/P&gt;
&lt;P&gt;NALL-ASA# packet-tracer input DMZ1 tcp 172.16.1.46 54444 192.168.1.43 389&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ1,Inside) source static Netscaler-SNIP Netscaler-SNIP destination static Inside-Networks Inside-Networks&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Inside&lt;BR /&gt;Untranslate 192.168.1.43/389 to 192.168.1.43/389&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ1_access_in in interface DMZ1&lt;BR /&gt;access-list DMZ1_access_in extended permit tcp object Netscaler-SNIP object EYENET09 eq ldap&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ1,Inside) source static Netscaler-SNIP Netscaler-SNIP destination static Inside-Networks Inside-Networks&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.1.46/54444 to 172.16.1.46/54444&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FILTER&lt;BR /&gt;Subtype: filter-url&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2016 13:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996907#M151577</guid>
      <dc:creator>beesley</dc:creator>
      <dc:date>2016-08-18T13:47:25Z</dc:date>
    </item>
    <item>
      <title>Remove the nat statement and</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996908#M151578</link>
      <description>&lt;P&gt;Remove the nat statement and try...&lt;/P&gt;
&lt;P&gt;no&amp;nbsp;&lt;SPAN&gt;nat (DMZ1,Inside) source static Netscaler-SNIP Netscaler-SNIP destination static Inside-Networks Inside-Networks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thx&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2016 23:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996908#M151578</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-08-18T23:13:17Z</dc:date>
    </item>
    <item>
      <title>I removed the previous NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996909#M151580</link>
      <description>&lt;P&gt;I removed the NAT statement&amp;nbsp;and attempted the command through the CLI in the ASDM and received this message:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ERROR: NAT configuration not found&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Kalab&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 18:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996909#M151580</guid>
      <dc:creator>beesley</dc:creator>
      <dc:date>2016-08-23T18:11:00Z</dc:date>
    </item>
    <item>
      <title>Can you post sanitized config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996910#M151581</link>
      <description>&lt;P&gt;Can you post sanitized config of your ASA ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thx&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2016 02:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-and-citrix-netscaler/m-p/2996910#M151581</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2016-08-27T02:46:05Z</dc:date>
    </item>
  </channel>
</rss>

