<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall HTTPS Traffic Flow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3920676#M24643</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;You should run packet-tracer from inside to outside, not from the IP address of the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;E.g. - "packet-tracer input inside tcp 192.168.0.5 3000 &amp;lt;remote ip&amp;gt; 443"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That being said, your ACL is referencing a host 192.168.0.0 not a network/subnet. This is probably what you require:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host &amp;lt;Remote Server IP&amp;gt; eq https &lt;/PRE&gt;
&lt;P&gt;The ACL is used for traffic going through the ASA, not originating from it, the network 172.18.151.0 is the outside network of the ASA and shouldn't need to be in the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Sat, 07 Sep 2019 18:39:54 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-09-07T18:39:54Z</dc:date>
    <item>
      <title>Firewall HTTPS Traffic Flow</title>
      <link>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3920660#M24640</link>
      <description>&lt;P&gt;Trying, through ongoing research and troubleshooting, to configure an ASA5525 running version 9.8(2) to allow bidirectional traffic from two ESXi 6.7 VMs from an UCS C240 M5 through the ASA to a remote server that “telnet &amp;lt;DNS Name&amp;gt; 443” from my laptop receives a response from, but not ping as it is configured to be restricted on the remote side, and that the two VMs currently have HTTPS access to through the COMM server switch the UCS is currently directly connected to.&lt;/P&gt;&lt;P&gt;Besides configuring the firewall to allow access for the additional required "mandatory” ports for ESXi as well as for LDAP port 636, I have started by just trying to configure and verify port 443 HTTPS bidirectional traffic from the UCS VMs through the firewall to the remote server but no access list and otherwise configuration variation on the firewall that I keep believing to be true from repeated research is allowing a successful telnet response from the firewall.&lt;/P&gt;&lt;P&gt;Attached is the current show run configuration of the ASA5525 with the following access lists that allows ICMP to work but not tcp,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list INBOUND extended permit icmp any any echo-reply &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list INBOUND extended permit tcp host &amp;lt;Remote Server IP&amp;gt; host 172.18.151.0 eq https &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list INBOUND extended permit tcp host &amp;lt;Remote Server IP&amp;gt; host 192.168.0.0 eq https &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit icmp any any echo &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit icmp any any time-exceeded &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit tcp host 172.18.151.0 host &amp;lt;Remote Server IP&amp;gt; eq https &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit tcp host 192.168.0.0 host &amp;lt;Remote Server IP&amp;gt; eq https &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and results in,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ASA# packet-tracer input outside tcp 172.18.151.171 443 &amp;lt;Remote Server IP&amp;gt; detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;found next-hop 172.18.151.1 using egress ifc outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Phase: 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype: &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: DROP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Implicit Rule&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;in id=0x2aaac8bb82d0, priority=501, domain=permit, deny=true&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;hits=30, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;src ip/id=172.18.151.171, mask=255.255.255.255, port=0, tag=any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input_ifc=outside, output_ifc=any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Result:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input-interface: outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;input-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;output-interface: outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;output-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;output-line-status: up&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Action: drop&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ASA#&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and since I am unsure how to telnet for an ASA, also tried,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ASA# ping tcp&lt;BR /&gt;Interface: outside&lt;BR /&gt;Target IP address: &amp;lt;Remote Server IP&amp;gt;&lt;BR /&gt;Destination port: [80] 443&lt;BR /&gt;Specify source? [n]: y&lt;BR /&gt;Source IP address: 172.18.151.171&lt;BR /&gt;Source port: [0]&lt;BR /&gt;Repeat count: [5]&lt;BR /&gt;Timeout in seconds: [2]&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5 TCP SYN requests to &amp;lt;Remote Server IP&amp;gt; port 443&lt;BR /&gt;from 172.18.151.171, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;BR /&gt;ASA# &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and previously altered configuration to try with what I believe would be more specifically with,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit tcp host &amp;lt;Remote Server IP&amp;gt; host 172.18.151.&amp;lt;cimc&amp;gt; eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit tcp host &amp;lt;Remote Server IP&amp;gt; host 172.18.151.&amp;lt;vm1&amp;gt; eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit tcp host &amp;lt;Remote Server IP&amp;gt; host 172.18.151.&amp;lt;vm2&amp;gt; eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list INBOUND extended permit tcp 172.18.151.171 255.255.255.0 any eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and may be more broadly with,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list INBOUND extended permit tcp any any eq https &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list INBOUND extended permit tcp 172.0.0.0 255.0.0.0 any eq https &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list OUTBOUND extended permit tcp 172.0.0.0 255.0.0.0 any eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;with neither giving favorable results.&lt;/P&gt;&lt;P&gt;So, any feedback that may provide further clarity about progressing through this issue would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Sep 2019 17:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3920660#M24640</guid>
      <dc:creator>MK1975</dc:creator>
      <dc:date>2019-09-07T17:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall HTTPS Traffic Flow</title>
      <link>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3920676#M24643</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;You should run packet-tracer from inside to outside, not from the IP address of the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;E.g. - "packet-tracer input inside tcp 192.168.0.5 3000 &amp;lt;remote ip&amp;gt; 443"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That being said, your ACL is referencing a host 192.168.0.0 not a network/subnet. This is probably what you require:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host &amp;lt;Remote Server IP&amp;gt; eq https &lt;/PRE&gt;
&lt;P&gt;The ACL is used for traffic going through the ASA, not originating from it, the network 172.18.151.0 is the outside network of the ASA and shouldn't need to be in the ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 07 Sep 2019 18:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3920676#M24643</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-09-07T18:39:54Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall HTTPS Traffic Flow</title>
      <link>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3924104#M24647</link>
      <description>&lt;P&gt;Yeah that corrected it, much appreciated and if the domain name that the &amp;lt;Remote Server IP&amp;gt; has been behind was configured in the access list instead, since the IP address may alter over time, the configuration would change, with the listed public DNS server to start since no private DNS server on hand, to the following or similar?&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;dns domain-lookup outside&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DNS server-group DefaultDNS&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; name-server 4.2.2.2&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;object network obj-&amp;lt;Domain Name&amp;gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;fqdn &amp;lt;domain Name&amp;gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host obj-&amp;lt;domain Name&amp;gt; eq https&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;that currently results in,&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ASA(config)# access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255$&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host &amp;lt;Domain &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;^Name&amp;gt; eq https&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;ERROR: % Invalid input detected at '^' marker.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ASA(config)# $ed permit tcp 192.168.0.0 255.255.255.0 host ?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;configure mode commands/options:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;A.B.C.D Destination host IPv4 address&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;X:X:X:X::X Destination host IPv6 address&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACVP(config)# $ed permit tcp 192.168.0.0 255.255.255.0 host&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;as further further research continues.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 17:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-https-traffic-flow/m-p/3924104#M24647</guid>
      <dc:creator>MK1975</dc:creator>
      <dc:date>2019-09-13T17:47:22Z</dc:date>
    </item>
  </channel>
</rss>

