<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX, SSL, and Missing ACKs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-ssl-and-missing-acks/m-p/1565018#M615894</link>
    <description>&lt;P&gt;I am attempting to forward SSL connections requests across a NAT into a Windows 2003 platform that is hosting a &lt;BR /&gt;SSL web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My SSL webserver is receiving the forwarded SYNs from the client, and responding, but that response ACK is getting lost.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a record of the ACK on the server but I get no record of it on the PIX. No ACLs appear to be triggered by the&lt;BR /&gt;ACK either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Management-subnet. as shown in the config below, is actually not being used for management but the interface 192.168.11.15 is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The end result is that I get a SYN timeout message in the PIX logs when they are set to debugging level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have opened up a bunch of ACLs for debugging purposes but with no positive result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;name 192.168.1.80 BPM-server&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;name 192.168.1.64 BPM-server-subnet description Small subnet to hold BPM and AG servers
name 192.168.1.0 Management-subnet description Small subnet to manage devices
!
interface Ethernet0
 description Management interface for Vlab PIX
 nameif Vlab-1-mgmt
 security-level 100
 ip address 192.168.11.15 255.255.255.0 
 management-only
!
interface Ethernet1
 description This is used for management access and for the BPM and other demo servers
 nameif inside
 security-level 10
 ip address 192.168.1.2 255.255.255.0 
!
interface Ethernet2
 description This will provide external service to the Bell Privacy Manager demo and Sharepoint servers
 nameif BPM-Vlab-external-1
 security-level 20
 ip address xxx.yyy.zzz.67 255.255.255.248 &lt;BR /&gt;!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
same-security-traffic permit intra-interface
object-group network DM_INLINE_NETWORK_1
 network-object BPM-server-subnet 255.255.255.248
 network-object xxx.yyy.zzz.64 255.255.255.248&lt;BR /&gt;access-list 100 extended permit tcp Management-subnet 255.255.255.0 any 
access-list 100 extended permit ip any Management-subnet 255.255.255.0 
access-list 100 extended permit ip xxx.yyy.zzz.64 255.255.255.248 Management-subnet 255.255.255.0 &lt;BR /&gt;access-list BPM-Vlab-external-1_access_in extended permit icmp any xxx.yyy.zzz.64 255.255.255.248 
access-list BPM-Vlab-external-1_access_in extended permit ip any object-group DM_INLINE_NETWORK_1 
access-list inside_access_in extended permit udp host 192.168.1.1 host 192.168.1.2 
access-list 110 extended permit tcp any host xxx.yyy.zzz.67 eq https&lt;BR /&gt;access-list inside_access_in_1 extended permit udp host 192.168.1.1 host 192.168.1.2 
access-list BPM-Vlab-external-1_access_in_1 extended permit ip any Management-subnet 255.255.255.0 
access-list BPM-Vlab-external-1_access_in_1 extended permit ip Management-subnet 255.255.255.0 any 
access-list BPM-Vlab-external-1_access_in_1 extended permit ip any xxx.yyy.zzz.64 255.255.255.248 &lt;BR /&gt;access-list BPM-Vlab-external-1_access_in_1 extended permit ip any any 


&lt;/EM&gt;&lt;PRE&gt;&lt;EM&gt;global (BPM-Vlab-external-1) 1 xxx.yyy.zzz.69&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,BPM-Vlab-external-1) tcp interface https BPM-server https netmask 255.255.255.255 
access-group 100 in interface inside
access-group BPM-Vlab-external-1_access_in_1 in interface BPM-Vlab-external-1
!
router rip
 version 2
!
route BPM-Vlab-external-1 0.0.0.0 0.0.0.0 xxx.yyy.zzz.68 1&lt;/EM&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:12:43 GMT</pubDate>
    <dc:creator>loubarsony</dc:creator>
    <dc:date>2019-03-11T19:12:43Z</dc:date>
    <item>
      <title>PIX, SSL, and Missing ACKs</title>
      <link>https://community.cisco.com/t5/network-security/pix-ssl-and-missing-acks/m-p/1565018#M615894</link>
      <description>&lt;P&gt;I am attempting to forward SSL connections requests across a NAT into a Windows 2003 platform that is hosting a &lt;BR /&gt;SSL web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; My SSL webserver is receiving the forwarded SYNs from the client, and responding, but that response ACK is getting lost.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a record of the ACK on the server but I get no record of it on the PIX. No ACLs appear to be triggered by the&lt;BR /&gt;ACK either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Management-subnet. as shown in the config below, is actually not being used for management but the interface 192.168.11.15 is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The end result is that I get a SYN timeout message in the PIX logs when they are set to debugging level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have opened up a bunch of ACLs for debugging purposes but with no positive result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;name 192.168.1.80 BPM-server&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;name 192.168.1.64 BPM-server-subnet description Small subnet to hold BPM and AG servers
name 192.168.1.0 Management-subnet description Small subnet to manage devices
!
interface Ethernet0
 description Management interface for Vlab PIX
 nameif Vlab-1-mgmt
 security-level 100
 ip address 192.168.11.15 255.255.255.0 
 management-only
!
interface Ethernet1
 description This is used for management access and for the BPM and other demo servers
 nameif inside
 security-level 10
 ip address 192.168.1.2 255.255.255.0 
!
interface Ethernet2
 description This will provide external service to the Bell Privacy Manager demo and Sharepoint servers
 nameif BPM-Vlab-external-1
 security-level 20
 ip address xxx.yyy.zzz.67 255.255.255.248 &lt;BR /&gt;!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
same-security-traffic permit intra-interface
object-group network DM_INLINE_NETWORK_1
 network-object BPM-server-subnet 255.255.255.248
 network-object xxx.yyy.zzz.64 255.255.255.248&lt;BR /&gt;access-list 100 extended permit tcp Management-subnet 255.255.255.0 any 
access-list 100 extended permit ip any Management-subnet 255.255.255.0 
access-list 100 extended permit ip xxx.yyy.zzz.64 255.255.255.248 Management-subnet 255.255.255.0 &lt;BR /&gt;access-list BPM-Vlab-external-1_access_in extended permit icmp any xxx.yyy.zzz.64 255.255.255.248 
access-list BPM-Vlab-external-1_access_in extended permit ip any object-group DM_INLINE_NETWORK_1 
access-list inside_access_in extended permit udp host 192.168.1.1 host 192.168.1.2 
access-list 110 extended permit tcp any host xxx.yyy.zzz.67 eq https&lt;BR /&gt;access-list inside_access_in_1 extended permit udp host 192.168.1.1 host 192.168.1.2 
access-list BPM-Vlab-external-1_access_in_1 extended permit ip any Management-subnet 255.255.255.0 
access-list BPM-Vlab-external-1_access_in_1 extended permit ip Management-subnet 255.255.255.0 any 
access-list BPM-Vlab-external-1_access_in_1 extended permit ip any xxx.yyy.zzz.64 255.255.255.248 &lt;BR /&gt;access-list BPM-Vlab-external-1_access_in_1 extended permit ip any any 


&lt;/EM&gt;&lt;PRE&gt;&lt;EM&gt;global (BPM-Vlab-external-1) 1 xxx.yyy.zzz.69&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,BPM-Vlab-external-1) tcp interface https BPM-server https netmask 255.255.255.255 
access-group 100 in interface inside
access-group BPM-Vlab-external-1_access_in_1 in interface BPM-Vlab-external-1
!
router rip
 version 2
!
route BPM-Vlab-external-1 0.0.0.0 0.0.0.0 xxx.yyy.zzz.68 1&lt;/EM&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ssl-and-missing-acks/m-p/1565018#M615894</guid>
      <dc:creator>loubarsony</dc:creator>
      <dc:date>2019-03-11T19:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX, SSL, and Missing ACKs</title>
      <link>https://community.cisco.com/t5/network-security/pix-ssl-and-missing-acks/m-p/1565019#M615895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Couple of things -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) your outside interface has a higher security level than your inside interface, is this what you want as it is not standard ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You say you can see the server sending the ACK but do not see it on the pix. Is the servers default-gateway the pix ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 15:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-ssl-and-missing-acks/m-p/1565019#M615895</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-11-22T15:41:50Z</dc:date>
    </item>
  </channel>
</rss>

