<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unfortunately packet tracer in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799062#M173561</link>
    <description>&lt;P&gt;Unfortunately packet tracer doesn't support those types of commands, i would have to move GNS3 to do that.&lt;/P&gt;
&lt;P&gt;Any other way or is that really the only main step forward?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 07 Jan 2016 16:20:24 GMT</pubDate>
    <dc:creator>robbo79871</dc:creator>
    <dc:date>2016-01-07T16:20:24Z</dc:date>
    <item>
      <title>SSL HTTPS connection from "outside" interface</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799052#M173541</link>
      <description>&lt;P&gt;Hi, i'm trying to establish a HTTPS connection to my ASA from another "site" in packet tracer. I can ping across the sites and into the "inside" network of the other site but cannot HTTPS into the ASA or the web server itself also. Here is the config for the ASA that i want to HTTPS into:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hostname ASA2&lt;/P&gt;
&lt;P&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt;switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P&gt;switchport access vlan 30&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;/P&gt;
&lt;P&gt;switchport access vlan 30&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/3&lt;/P&gt;
&lt;P&gt;switchport access vlan 30&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 172.16.30.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan30&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 10.30.0.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;webvpn&lt;/P&gt;
&lt;P&gt;enable outside&lt;/P&gt;
&lt;P&gt;enable inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network asa_inside_address&lt;/P&gt;
&lt;P&gt;subnet 10.30.0.1 255.255.255.255&lt;/P&gt;
&lt;P&gt;object network inside_network&lt;/P&gt;
&lt;P&gt;subnet 10.30.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.30.1 1 &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;This is just to the router on the edge for the frame relay, everything works as far as connectivity goes anyway&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit tcp any object asa_inside_address eq 443&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit icmp any object asa_inside_address&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit icmp any object inside_network&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit udp any 10.30.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group website_outside in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;group-policy webvpn internal&lt;/P&gt;
&lt;P&gt;group-policy webvpn attributes&lt;/P&gt;
&lt;P&gt;vpn-tunnel-protocol ssl-clientless&lt;/P&gt;
&lt;P&gt;webvpn&lt;/P&gt;
&lt;P&gt;url-list value test1&lt;/P&gt;
&lt;P&gt;username bob password 4IncP7vTjpaba2aF encrypted&lt;/P&gt;
&lt;P&gt;username bob attributes&lt;/P&gt;
&lt;P&gt;vpn-group-policy webvpn&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map inspect&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;class-map test&lt;/P&gt;
&lt;P&gt;class-map ssh&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global&lt;/P&gt;
&lt;P&gt;class inspect&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;class test&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global global&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;tunnel-group webvpn type remote-access&lt;/P&gt;
&lt;P&gt;tunnel-group webvpn general-attributes&lt;/P&gt;
&lt;P&gt;default-group-policy webvpn&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;And here is the config for the ASA on the other "site" with the PC behind it &amp;nbsp;that i'm using HTTPS on:&lt;/P&gt;
&lt;P&gt;hostname ASA1&lt;/P&gt;
&lt;P&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt;switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/1&lt;/P&gt;
&lt;P&gt;switchport access vlan 20&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/2&lt;/P&gt;
&lt;P&gt;switchport access vlan 20&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt;nameif outside&lt;/P&gt;
&lt;P&gt;security-level 0&lt;/P&gt;
&lt;P&gt;ip address 172.16.20.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan20&lt;/P&gt;
&lt;P&gt;nameif inside&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip address 10.20.0.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;webvpn&lt;/P&gt;
&lt;P&gt;enable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.20.1 1&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list test extended permit icmp 10.30.0.0 255.255.255.0 10.20.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-group test in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;class-map inspect&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;policy-map global&lt;/P&gt;
&lt;P&gt;class inspect&lt;/P&gt;
&lt;P&gt;inspect icmp&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;service-policy global global&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;I would just like to point out that the HTTPS works on "ASA2" because I've tested it on the inside interface from a PC there and it all works. Its just connections from the "outside" that do not work&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799052#M173541</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2019-03-12T07:06:52Z</dc:date>
    </item>
    <item>
      <title>Hi Rob,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799053#M173543</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;your ACL on the first box will need:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list website_outside line 1 extended permit tcp any object inside_network eq 443&lt;/P&gt;
&lt;P&gt;access-list website_outside line 1 extended permit tcp any host&amp;nbsp;172.16.30.2 eq 443&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I think I'm right in saying you are tring to HTTPS to that outside interface address&amp;nbsp;172.16.30.2 and also through the box to the internal network object inside_network&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 18:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799053#M173543</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-06T18:27:39Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799054#M173545</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you very much that worked perfectly.&lt;/P&gt;
&lt;P&gt;Would the same kind of concept be applied to other examples such trying to SSH to the edge router and the edge router connecting to a radius server on the inside network? Would the ports or ACL need to enable a UDP connection on the OUTSIDE interface to and not just the inside one?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Many thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:03:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799054#M173545</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2016-01-07T10:03:44Z</dc:date>
    </item>
    <item>
      <title>Hi Rob,</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799055#M173547</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;yes for the SSH but no for the RADIUS, as RADIUS is initiated by the firewall itself (using relevant interface IP address).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you had an outbound ACL on the inside interface then you'd need to let it through that. But you don't have one and it's best to keep it that way &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799055#M173547</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-07T10:10:04Z</dc:date>
    </item>
    <item>
      <title>Yeah i didnt see the point in</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799056#M173549</link>
      <description>&lt;P&gt;Yeah i didnt see the point in an ACL for outbound traffic on the inside. I did have this ACL though:&lt;/P&gt;
&lt;P&gt;access-list website_outside extended permit udp any 10.30.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;I thought that would enable the router to send the UDP radius traffic through the ASA to the appropriate address on the INSIDE interface.&lt;/P&gt;
&lt;P&gt;It doesn't work though, it just comes up Login Invalid from PC's on the INSIDE as well, I'm not even talking about the OUTSIDE yet.&lt;/P&gt;
&lt;P&gt;Would you have any suggestions on that?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tried these 2 then and no luck&lt;/P&gt;
&lt;P&gt;ASA2(config)#access-list website_outside extended permit udp any host 172.16.30.2 eq 1645&lt;/P&gt;
&lt;P&gt;ASA2(config)#access-list website_outside extended permit udp any host 172.16.30.2&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799056#M173549</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2016-01-07T10:21:47Z</dc:date>
    </item>
    <item>
      <title>do you mean firewall?</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799057#M173551</link>
      <description>&lt;P&gt;do you mean firewall?&lt;/P&gt;
&lt;P&gt;where is the RADIUS client and where is the server and what's their IP addresses?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 10:43:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799057#M173551</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-07T10:43:19Z</dc:date>
    </item>
    <item>
      <title>The client PC is on the</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799058#M173553</link>
      <description>&lt;P&gt;The client PC is on the INSIDE network and so is the AAA Radius server. The router that i want to SSH to is on the OUTSIDE interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the router config for the radius server&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;radius-server host 10.30.0.11 auth-port 1645&lt;/P&gt;
&lt;P&gt;radius-server key key&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;The AAA details are:&lt;/P&gt;
&lt;P&gt;Client Name R1&lt;/P&gt;
&lt;P&gt;Client IP&amp;nbsp;172.16.30.1&lt;/P&gt;
&lt;P&gt;Key key&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;The client machine would be a 10.30.0.0/24 address.&lt;/P&gt;
&lt;P&gt;I can ping the AAA server from the OUTSIDE interface also through part of the ACL's i have set up.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 11:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799058#M173553</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2016-01-07T11:05:41Z</dc:date>
    </item>
    <item>
      <title>are you doing dot1x? so your</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799059#M173555</link>
      <description>&lt;P&gt;are you doing dot1x? so your supplicant, authenticator and authentication server are all on the same LAN? It sounds like you need to figure out what your traffic flows are going to be, it's not an ACL issue&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 11:45:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799059#M173555</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-07T11:45:48Z</dc:date>
    </item>
    <item>
      <title>As far as i'm aware, no.</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799060#M173558</link>
      <description>&lt;P&gt;As far as i'm aware, no. Sorry i'm not as experinced with configuring Radius servers.&lt;/P&gt;
&lt;P&gt;So the ACL i have configured "&lt;SPAN&gt;access-list website_outside extended permit udp any 10.30.0.0 255.255.255.0" would be enough for it to work?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;The traffic flow would go like this:&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;Internal PC on the inside interface makes SSH connection&lt;/P&gt;
&lt;P&gt;Past the&amp;nbsp;OUTSIDE interface to&amp;nbsp;the Router on the edge&lt;/P&gt;
&lt;P&gt;The Router then tries to contact the AAA server on the INSIDE&lt;/P&gt;
&lt;P&gt;The AAA server then sends the authentication response back to it&lt;/P&gt;
&lt;P&gt;Then the router should send the response back to the INSIDE internal client.&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;I think I'm right in saying that but I'm not 100% because i haven't done AAA as much.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 13:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799060#M173558</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2016-01-07T13:18:52Z</dc:date>
    </item>
    <item>
      <title>okay well i'd set up a packet</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799061#M173560</link>
      <description>&lt;P&gt;okay well i'd set up a packet capture on the outside interface to check you're getting hits:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;cap cap1 circular-buffer interface outside match ip any any&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;then do your thing with SSH&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;then&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show cap cap1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;look for your ssh packets leaving the interface and then your RADIUS packets coming in the other direction slightly after. Based on output from that I'd enable debugging on the router and/or the ACS.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Gareth&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 13:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799061#M173560</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-07T13:37:57Z</dc:date>
    </item>
    <item>
      <title>Unfortunately packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799062#M173561</link>
      <description>&lt;P&gt;Unfortunately packet tracer doesn't support those types of commands, i would have to move GNS3 to do that.&lt;/P&gt;
&lt;P&gt;Any other way or is that really the only main step forward?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 16:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799062#M173561</guid>
      <dc:creator>robbo79871</dc:creator>
      <dc:date>2016-01-07T16:20:24Z</dc:date>
    </item>
    <item>
      <title>not sure, not familiar with</title>
      <link>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799063#M173563</link>
      <description>&lt;P&gt;not sure, not familiar with the product. I'd move to GNS3 anyway it's worth the investment in time.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Jan 2016 17:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-https-connection-from-quot-outside-quot-interface/m-p/2799063#M173563</guid>
      <dc:creator>gaowen</dc:creator>
      <dc:date>2016-01-07T17:20:16Z</dc:date>
    </item>
  </channel>
</rss>

