<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Firewalling Microsoft DCOM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373431#M271771</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running Cisco ASA 2220 version 8.4(3).&lt;/P&gt;&lt;P&gt;In previous attempts we have been unable to firewall Microsoft DCOM communications and generally any Microsoft RPC comms although the last time we attempted we were running an older model of Cisco ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to use a policy map to correctly open the pinholes for Microsoft RPC communications? If so what version of IOS is required and would anyone have a configuration example?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone had success with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:27:54 GMT</pubDate>
    <dc:creator>tekgem123</dc:creator>
    <dc:date>2019-03-12T03:27:54Z</dc:date>
    <item>
      <title>Firewalling Microsoft DCOM</title>
      <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373431#M271771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running Cisco ASA 2220 version 8.4(3).&lt;/P&gt;&lt;P&gt;In previous attempts we have been unable to firewall Microsoft DCOM communications and generally any Microsoft RPC comms although the last time we attempted we were running an older model of Cisco ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to use a policy map to correctly open the pinholes for Microsoft RPC communications? If so what version of IOS is required and would anyone have a configuration example?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone had success with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373431#M271771</guid>
      <dc:creator>tekgem123</dc:creator>
      <dc:date>2019-03-12T03:27:54Z</dc:date>
    </item>
    <item>
      <title>Firewalling Microsoft DCOM</title>
      <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373432#M271774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MS RPC has been supported for years with constant improvements and updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See here e.g. the 9.1 overview:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/inspect_mgmt.html#wp1478733"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/inspect_mgmt.html#wp1478733&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Jan 2014 13:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373432#M271774</guid>
      <dc:creator>m.kafka</dc:creator>
      <dc:date>2014-01-11T13:39:12Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalling Microsoft DCOM</title>
      <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373433#M271777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Addendum: Yes I used it a couple of times with different requirements, one time remeber I had to update the ASA to whatever to support DCERPC without endpointmapper (was some OWA frontend on a DMZ talking to a Exchange on the inside)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Jan 2014 13:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373433#M271777</guid>
      <dc:creator>m.kafka</dc:creator>
      <dc:date>2014-01-11T13:41:05Z</dc:date>
    </item>
    <item>
      <title>Firewalling Microsoft DCOM</title>
      <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373434#M271779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I setup a lab for testing... specifically a client server application called Microsoft Data Protection Manager (backup application) which makes use of DCOM for agent communications.&lt;/P&gt;&lt;P&gt;The lab consists of Cisco ASA with inside (security-level 100) and outside interface (security-level 0) and a DCOM client and server on each side of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interestingly when I use the dcerpc policy map and test using a simple dcom test application from Microsoft it is successful and correctly opens up the pinholes for DCOM. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As soon as I try to use Microsoft DPM the communications fail but I don't see any denied traffic so it must be hitting the rule but failing. I just wonder if some of the inbound traffic is not being inspected and being dropped rather than denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas how to troubleshoot further?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 13:35:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373434#M271779</guid>
      <dc:creator>tekgem123</dc:creator>
      <dc:date>2014-01-22T13:35:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalling Microsoft DCOM</title>
      <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373435#M271781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an update, I have another tool provided by Microsoft for testing dcerpc tcp 135 called portqry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run this tool on the server located on the outside interface I get the following:&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 192.168.254.10/50341 to 192.168.253.11/135 flags PSH ACK on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run this tool on the client located on the inside interface I get the following:&lt;/P&gt;&lt;P&gt;tcp flow from inside:192.168.253.11/58151 to outside:192.168.254.10/135 terminated by inspection engine, reason - proxy inspector disconnected, dropped packet.&lt;/P&gt;&lt;P&gt;Deny TCP (no connection) from 192.168.253.11/58173 to 192.168.254.10/135 flags PSH ACK on interface inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 11:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/2373435#M271781</guid>
      <dc:creator>tekgem123</dc:creator>
      <dc:date>2014-01-23T11:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalling Microsoft DCOM</title>
      <link>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/4028995#M271782</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am experiencing the very same problem on a production network and i cannot find a solution. I wonder if you have solved your situation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Br,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 13:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewalling-microsoft-dcom/m-p/4028995#M271782</guid>
      <dc:creator>kadoo</dc:creator>
      <dc:date>2020-02-13T13:52:55Z</dc:date>
    </item>
  </channel>
</rss>

