<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DHCP Problem with ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466139#M267974</link>
    <description>&lt;P&gt;Hi. I have an ASA 5505 configured for Transparent Mode. The Outside interface connects to a router (RV042). The router manages DHCP. With the 5505 in the system, all computers can connect to the internet and to each other, except for a few. The problem computers can be made to work if they are set to a specific address, rather than automatically assigned by the router. Some of the iPads work correctly, some do not. At least one Apple Notebook cannot connect even if I enter a static address.&lt;/P&gt;&lt;P&gt;Consulting the documentation, I found that DHCP traffic (UPD Port 67 and 68) needed to be enabled via&amp;nbsp;rules for the Inside and Outside interfaces. I did that in ASDM but now nothing works.&lt;/P&gt;&lt;P&gt;I have pulled the 5505 out of the system and restored it to the configuration that worked&amp;nbsp;for most of the computers.&lt;/P&gt;&lt;P&gt;Any suggestions would be appreciated. I can pull a "show" run from CLI if it is useful.&lt;/P&gt;&lt;P&gt;Thanks...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:00:36 GMT</pubDate>
    <dc:creator>Jon Barbee</dc:creator>
    <dc:date>2019-03-12T04:00:36Z</dc:date>
    <item>
      <title>DHCP Problem with ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466139#M267974</link>
      <description>&lt;P&gt;Hi. I have an ASA 5505 configured for Transparent Mode. The Outside interface connects to a router (RV042). The router manages DHCP. With the 5505 in the system, all computers can connect to the internet and to each other, except for a few. The problem computers can be made to work if they are set to a specific address, rather than automatically assigned by the router. Some of the iPads work correctly, some do not. At least one Apple Notebook cannot connect even if I enter a static address.&lt;/P&gt;&lt;P&gt;Consulting the documentation, I found that DHCP traffic (UPD Port 67 and 68) needed to be enabled via&amp;nbsp;rules for the Inside and Outside interfaces. I did that in ASDM but now nothing works.&lt;/P&gt;&lt;P&gt;I have pulled the 5505 out of the system and restored it to the configuration that worked&amp;nbsp;for most of the computers.&lt;/P&gt;&lt;P&gt;Any suggestions would be appreciated. I can pull a "show" run from CLI if it is useful.&lt;/P&gt;&lt;P&gt;Thanks...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466139#M267974</guid>
      <dc:creator>Jon Barbee</dc:creator>
      <dc:date>2019-03-12T04:00:36Z</dc:date>
    </item>
    <item>
      <title>hi jerry,could you post a</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466140#M267976</link>
      <description>&lt;P&gt;hi jerry,&lt;/P&gt;&lt;P&gt;could you post a &lt;STRONG&gt;show run&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;you'll need an inbound and outbound ACL for DHCP to work:&lt;/P&gt;&lt;P&gt;outside_in extended permit udp host &amp;lt;DHCP SVR IP&amp;gt; any eq bootpc&lt;BR /&gt;inside_out extended permit udp host 0.0.0.0 host 255.255.255.255 eq bootps&lt;BR /&gt;inside_out extended permit udp any &amp;lt;DHCP SVR IP&amp;gt; eq bootps&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;BR /&gt;access-group inside_out out interface inside&lt;/P&gt;</description>
      <pubDate>Sun, 30 Mar 2014 02:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466140#M267976</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2014-03-30T02:27:06Z</dc:date>
    </item>
    <item>
      <title>Hello, So adding the John,</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466141#M267978</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So adding the John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The actual ACLs u will need are&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;outside_in extended permit udp host &amp;lt;DHCP SVR IP&amp;gt; any eq 68&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Any other service you need from out to in will need to be permited here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;inside_out extended permit udp host 0.0.0.0 host 255.255.255.255 eq 67&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;inside_out extended permit ip any any (Otherwise all internal traffic going to the outside world will be denied)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;If u dont add that u might end breaking everything as you said&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;access-group outside_in in interface outside&lt;/SPAN&gt;&lt;BR style="font-size: 14px; background-color: rgb(247, 247, 247);" /&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;access-group inside_out out interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 00:49:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466141#M267978</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-03-31T00:49:26Z</dc:date>
    </item>
    <item>
      <title>Thanks for the help on this.</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466142#M267979</link>
      <description>&lt;P&gt;Thanks for the help on this. I have entered the commands in the responses to this posting. Unfortunately, the DHCP traffic is not going through. Attached is a show current-config file.&lt;/P&gt;&lt;P&gt;I'm sure I missed something...just don't know what.&lt;/P&gt;&lt;P&gt;Best regards...&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 02:42:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466142#M267979</guid>
      <dc:creator>Jon Barbee</dc:creator>
      <dc:date>2014-03-31T02:42:58Z</dc:date>
    </item>
    <item>
      <title>As I said before with that</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466143#M267980</link>
      <description>&lt;P&gt;As I said before with that ACL you are closing all other traffic from inside to outside, Quite sure that will get you in problems if this is a production box.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, for the ACL the lines I sent are the ones needed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you sure the traffic actually commes from Inside to outside and not backwards??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the answer is yes, then do a capture on both interfaces matching only DHCP Packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jcarvaja&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 02:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466143#M267980</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-03-31T02:55:55Z</dc:date>
    </item>
    <item>
      <title>Understood. I tried adding</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466144#M267981</link>
      <description>&lt;P&gt;Understood. I tried adding the "inside_out extended permit ip any any" command, but it made no difference. Because the implicit rule (permit ip traffic to any less secure interface) is still in the access list table, it would seem the additional extended rule&amp;nbsp;is not needed.&lt;/P&gt;&lt;P&gt;When I first received the 5505, it had an older version of firmware. At the time, when I entered any rule in ASDM it deleted the "less secure" implicit rule, which then broke the system since there was no path for internet traffic from inside to outside, as you have stated. With the newest firmware release, however, when I enter a rule, the "less secure" implicit rule does not go away.&lt;/P&gt;&lt;P&gt;So, with help from the folks here I have made progress. Right now the issue is that when the 5505 in Transparent Mode is between the router and user computers, the computers cannot reliably get addresses that are auto-assigned by the router.&lt;/P&gt;&lt;P&gt;Looking through the logs displayed on ASDM, I noticed the following curious statement:&lt;/P&gt;&lt;P&gt;"6&amp;nbsp;Mar 31 2014&amp;nbsp;07:16:42&amp;nbsp;&amp;nbsp;fe80::1131:41c2:3627:8339&amp;nbsp;63575&amp;nbsp;ff02::1:3&amp;nbsp;5355&amp;nbsp;No management IP address configured for transparent firewall. Dropping protocol UDP packet from outside:fe80::1131:41c2:3627:8339/63575 to inside:ff02::1:3/5355"&lt;/P&gt;&lt;P&gt;However, I have configured a management IP address, and it is listed in the "show" document that I posted yesterday:&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.10 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;So, I am confused.&lt;/P&gt;&lt;P&gt;I appreciate the help. I am new to the 5505, although I participated as a "friendly" in the ASA program some years ago. I recall a similar problem with that setup. Regrettably, I can't remember how we fixed it...&lt;/P&gt;&lt;P&gt;Regards...&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 15:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466144#M267981</guid>
      <dc:creator>Jon Barbee</dc:creator>
      <dc:date>2014-03-31T15:16:15Z</dc:date>
    </item>
    <item>
      <title>The issue you are having is</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466145#M267982</link>
      <description>&lt;P&gt;The issue you are having is because of how DHCP sends requests.&amp;nbsp; It sends requests to the address of 0.0.0.0 255.255.255.255.&amp;nbsp; Now I don't know why the security levels do not apply to the DHCP request, but for some reason it doesn't.&amp;nbsp; this means you need an access list applied to the inside interface in the inbound direction.&amp;nbsp; this ACL needs to have a source of any with a destination of the router.&amp;nbsp; Now keep in mind that the inside hosts should be able so access the internet so if I were you I would consider putting a permit IP any any on the inside interface and then if required, place deny statements above the permit. You do not need the outbound ACL on the inside interface to remove that.&amp;nbsp; Your ACL statements should look something like this (I am assuming the DHCP range is 192.168.1.0/24:&lt;/P&gt;&lt;P&gt;access-list OUT-TO-IN permit udp host &amp;lt;router-IP&amp;gt; 192.168.1.0 255.255.255.0 eq 67&lt;/P&gt;&lt;P&gt;access-list OUT-TO-IN permit udp host &amp;lt;router-IP&amp;gt; 192.168.1.0 255.255.255.0 eq 68&lt;/P&gt;&lt;P&gt;access-list IN-TO-OUT permit ip any any&lt;/P&gt;&lt;P&gt;access-group IN-TO-OUT in interface inside&lt;/P&gt;&lt;P&gt;access-group OUT-TO-IN in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2014 14:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466145#M267982</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-01T14:34:16Z</dc:date>
    </item>
    <item>
      <title>Regarding: access-list IN-TO</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466146#M267983</link>
      <description>&lt;P&gt;Regarding:&amp;nbsp;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;access-list IN-TO-OUT permit ip any any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(247, 247, 247);"&gt;I'm struggling with this problem myself right now. &amp;nbsp;There is something about this ACL that seems a little off to me. &amp;nbsp;It works, yes. &amp;nbsp;In fact, I got it to work without even doing the OUT-TO-IN ACL. &amp;nbsp;The thing I am uncomfortable with is an ACL that permits ABSOLUTELY EVERYTHING! &amp;nbsp;Doesn't this circumvent the other security policies I have configured on my ASA?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Apr 2014 20:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466146#M267983</guid>
      <dc:creator>euchredog</dc:creator>
      <dc:date>2014-04-08T20:27:19Z</dc:date>
    </item>
    <item>
      <title>Well, if you think about it,</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466147#M267985</link>
      <description>&lt;P&gt;Well, if you think about it, lets say we remove that any any ACL and just let the security levels do their work (which for some reason doesn't work on the DHCP packets) you are still allowing everything from a higher security level to a lower security level...so in essence a permit any any statement from the inside network to the outside.&amp;nbsp; The other security policies are not affected...but then again from your configuration you posted, you don't have much configured on there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is a very common practice to permit everything from the inside network out, as it is "supposed" to be a secure network.&amp;nbsp; However, if you are uncomfortable doing this you can always tighten the security a bit by only allowing traffic with a source address of 192.168.1.0/24.&amp;nbsp; So your ACLs would look something like this:&lt;/P&gt;&lt;P&gt;access-list IN-TO-OUT permit udp host 0.0.0.0 host 255.255.255.255 eq 67&lt;/P&gt;&lt;P&gt;access-list IN-TO-OUT permit udp host 0.0.0.0 host 255.255.255.255 eq 68&lt;/P&gt;&lt;P&gt;access-list IN-TO-OUT permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;This will allow the initial DHCP packets through then limit any further traffic to the internet or otherwise to having a source address within the 192.168.1.0/24 subnet.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2014 12:08:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466147#M267985</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-09T12:08:19Z</dc:date>
    </item>
    <item>
      <title>Makes complete sense.  Thank</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466148#M267986</link>
      <description>&lt;P&gt;Makes complete sense. &amp;nbsp;Thank you for your quick and detailed response. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 12:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466148#M267986</guid>
      <dc:creator>euchredog</dc:creator>
      <dc:date>2014-04-10T12:55:23Z</dc:date>
    </item>
    <item>
      <title>Any time ,  Let us know if</title>
      <link>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466149#M267988</link>
      <description>&lt;P&gt;Any time &lt;IMG alt="smiley" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/regular_smile.png" title="smiley" width="23" /&gt;,&amp;nbsp; Let us know if you need further help&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 15:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dhcp-problem-with-asa-5505/m-p/2466149#M267988</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-10T15:47:43Z</dc:date>
    </item>
  </channel>
</rss>

