<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FSWM and Netscaler. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405431#M776137</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And a complete wild stab in the dark from me. We had a similar issue using some encryption devices behind an ASA which worked fine behind a 3800 router. Turns out the ASA was stripping some of the TCP options from the handshake. We had to write a service policy to put them back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We worked it out by performing a wireshark capture on the inside and outside interfaces at the same time and looking at how the packets differed before and after they had been processed by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Barry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 May 2011 13:41:22 GMT</pubDate>
    <dc:creator>barry</dc:creator>
    <dc:date>2011-05-19T13:41:22Z</dc:date>
    <item>
      <title>FSWM and Netscaler.</title>
      <link>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405427#M776107</link>
      <description>&lt;P&gt;We have 2 FWSM in Active / Active mode. for one of those context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The another context, now it's in test mode, and we like to protect some segment of servers, in this segment we have Two Citrix Netscaler to provide&lt;/P&gt;&lt;P&gt;load balance to a web service that we needs, using only one IP Virtual address.(10.11.33.48)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The segment of the servers and netscalers is 10.11.33.xx /24; When we put the segment in the inside interface of the context of FWSM, the Nestcalers don't work. using the virtual ip on any browser the page don't appears.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There any idea of what's wrong ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The netscaleres needs some type of inspect ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM-1/ctx-salud# sh running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;FWSM Version 4.0(6) &amp;lt;context&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;hostname ctx-salud&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.11.33.70 AS400 description Core Operacion Medicina Prepagada&lt;BR /&gt;name 10.11.33.52 Autorizate description Server Linux - AUT-WEB,SEDNA,SAC,Liq Serv, Of Serv Virtuales&lt;BR /&gt;name 10.11.33.38 CIKLOS_eth0 description DB Oracle + PHP&lt;BR /&gt;name 10.11.33.39 CIKLOS_eth1 description DB Oracle + PHP&lt;BR /&gt;name 10.11.33.37 COOEPSII description Server Linux - Web+PHP&lt;BR /&gt;name 10.11.33.15 Clementine_SPSS&lt;BR /&gt;name 10.11.33.11 Clientes_Delgados&lt;BR /&gt;name 10.11.33.13 Cluster_SQL&lt;BR /&gt;name 10.11.33.53 Matis description Hospital en Casa&lt;BR /&gt;name 10.11.33.45 Netscaler1&lt;BR /&gt;name 10.11.33.46 Netscaler2&lt;BR /&gt;name 10.11.33.47 Netscaler_Map&lt;BR /&gt;name 10.11.33.51 Oficina_Virtual_MP2&lt;BR /&gt;name 10.11.33.43 PagosMP description Server Linux -&lt;BR /&gt;name 10.11.33.12 Saturno description Server Win - Turnos&lt;BR /&gt;name 10.11.33.48 Virtual_Ciklos description Netscaler para CIKLOS&lt;BR /&gt;name 10.11.33.49 Virtual_Cooeps description Netscaler para Cooeps&lt;BR /&gt;dns-guard&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&lt;BR /&gt;interface Vlan500&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.52.37.6 255.255.255.240 standby 10.52.37.7 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan61&lt;BR /&gt; nameif p-salud&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 10.51.33.101 255.255.255.0 standby 10.51.33.102 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif salud&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.11.33.101 255.255.255.0 standby 10.11.33.102 &lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;object-group network CIKLOS&lt;BR /&gt; description Interfaces server CIKLOS&lt;BR /&gt; network-object host CIKLOS_eth0&lt;BR /&gt; network-object host CIKLOS_eth1&lt;BR /&gt;object-group network Remote_SSH&lt;BR /&gt; description Acceso Remoto via SSH&lt;BR /&gt; network-object host COOEPSII&lt;BR /&gt; network-object host PagosMP&lt;BR /&gt; network-object host Oficina_Virtual_MP2&lt;BR /&gt; group-object CIKLOS&lt;BR /&gt;object-group network Web_Server&lt;BR /&gt; description Equipos con Web Server&lt;BR /&gt; network-object host Saturno&lt;BR /&gt; network-object host COOEPSII&lt;BR /&gt; network-object host PagosMP&lt;BR /&gt; network-object host Netscaler1&lt;BR /&gt; network-object host Netscaler2&lt;BR /&gt; network-object host Netscaler_Map&lt;BR /&gt; network-object host Virtual_Ciklos&lt;BR /&gt; network-object host Virtual_Cooeps&lt;BR /&gt; network-object host Oficina_Virtual_MP2&lt;BR /&gt; network-object host Autorizate&lt;BR /&gt;object-group network Web_Server_Secure&lt;BR /&gt; description Equipos con Web Server seguro&lt;BR /&gt; network-object host COOEPSII&lt;BR /&gt; network-object host PagosMP&lt;BR /&gt; network-object host Netscaler1&lt;BR /&gt; network-object host Netscaler2&lt;BR /&gt; network-object host Netscaler_Map&lt;BR /&gt; network-object host Virtual_Ciklos&lt;BR /&gt; network-object host Virtual_Cooeps&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service rpc tcp&lt;BR /&gt; description rpc TCP 32772 + 32774&lt;BR /&gt; port-object eq 32772&lt;BR /&gt; port-object eq 32774&lt;BR /&gt;object-group service sunrpc tcp-udp&lt;BR /&gt; description rpcbind - port 111&lt;BR /&gt; port-object eq sunrpc&lt;BR /&gt;access-list outside_in extended permit udp any any eq ntp inactive &lt;BR /&gt;access-list outside_in extended permit tcp any any eq 135 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any any eq netbios-ssn inactive &lt;BR /&gt;access-list outside_in extended permit udp any any range netbios-ns netbios-dgm inactive &lt;BR /&gt;access-list outside_in extended permit tcp any any eq 445 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any any eq 3389 inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Clientes_Delgados eq isakmp inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Clientes_Delgados eq 4500 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Clientes_Delgados range 49152 49155 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any object-group Remote_SSH eq ssh &lt;BR /&gt;access-list outside_in extended permit tcp any object-group Web_Server eq www &lt;BR /&gt;access-list outside_in extended permit tcp any object-group Web_Server_Secure eq https &lt;BR /&gt;access-list outside_in extended permit tcp any host COOEPSII eq 1501 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host COOEPSII eq 1054 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any object-group CIKLOS object-group rpc &lt;BR /&gt;access-list outside_in extended permit tcp any object-group CIKLOS eq 1501 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any object-group CIKLOS eq 1054 inactive &lt;BR /&gt;access-list outside_in extended permit object-group TCPUDP any object-group CIKLOS object-group sunrpc &lt;BR /&gt;access-list outside_in extended permit udp any host Clementine_SPSS eq isakmp inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Clementine_SPSS range 1027 1028 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Clementine_SPSS eq 1029 inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Clementine_SPSS eq 4500 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate range 49152 49155 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate range 9090 9091 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate eq 7070 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate eq 7443 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate eq 7777 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate eq 5222 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate eq 5269 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Autorizate eq 3306 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Cluster_SQL range 49152 49155 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Cluster_SQL eq www inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Cluster_SQL eq isakmp inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Cluster_SQL eq 1094 inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Cluster_SQL eq 1434 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Cluster_SQL eq 2382 inactive &lt;BR /&gt;access-list outside_in extended permit udp any host Cluster_SQL eq 4500 inactive &lt;BR /&gt;access-list outside_in extended permit tcp any host Cluster_SQL eq 49324 inactive &lt;BR /&gt;access-list outside_in extended permit udp any host PagosMP eq sunrpc inactive &lt;BR /&gt;access-list outside_in extended permit icmp any any &lt;BR /&gt;access-list outside_in extended permit ip any any &lt;BR /&gt;access-list salud_in extended permit icmp any any &lt;BR /&gt;access-list salud_in extended permit ip any any &lt;BR /&gt;access-list p-salud_in extended permit icmp any any &lt;BR /&gt;access-list p-salud_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging standby&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu salud 1500&lt;BR /&gt;mtu p-salud 1500&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;access-group salud_in in interface salud&lt;BR /&gt;access-group p-salud_in in interface p-salud&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.52.37.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 1:00:00 h225 1:00:00 mgcp 0:05:00&lt;BR /&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;username desca password ci9jkLeed3cPxSSg encrypted privilege 15&lt;BR /&gt;username banm7970 password mCuFDqKh/mYI2y2q encrypted privilege 15&lt;BR /&gt;username dncapr11 password JbmDdwc8I32IjGbz encrypted privilege 15&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Cryptochecksum:e4264b2a118ff35838322fad50b54d99&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405427#M776107</guid>
      <dc:creator>julrodrig</dc:creator>
      <dc:date>2019-03-11T16:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: FSWM and Netscaler.</title>
      <link>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405428#M776109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems like pretty simple config. Citrix directly connected to the higher security interface which has permit ip any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do the logs say when this breaks when you try to access the virtual IP from the other side of the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logg | i 10.11.33.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming you have no nat-control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run all | i nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jan 2010 20:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405428#M776109</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-06T20:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: FSWM and Netscaler.</title>
      <link>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405429#M776112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any luck?&amp;nbsp; We are seeing the same problem.&amp;nbsp; When we have the Netscaler interfaces are behind the FWSM, we can't connect.&amp;nbsp; When we move the Netscaler interfaces behind a plain old routed link they work great.&amp;nbsp; We also did some packet captures and can see that the Netscaler is sending a RST back to the inquiring host.&amp;nbsp; We are doing captures on the Netscaler and on the host, and both agree that the Netscaler is sending the RST.&amp;nbsp; Once the Netscaler is moved to a routed network not behind the fwsm, everything works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also we do not see anything in the logs about something being blocked.&amp;nbsp; We also tried it with http inspect on and off.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 May 2011 20:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405429#M776112</guid>
      <dc:creator>k.mattson</dc:creator>
      <dc:date>2011-05-18T20:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: FSWM and Netscaler.</title>
      <link>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405430#M776121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a few things the FWSM does to the draffic by default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) TCP Sequence number randomization. You can disable this:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; access-list no_tcp_seq_rand_acl permit tcp x.x.x.0 255.255.255.0 y.y.y.0 255.255.255.0&lt;BR /&gt; !&lt;BR /&gt; class-map no_tcp_seq_rand_class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match access-list no_tcp_seq_rand_acl&lt;BR /&gt; !&lt;BR /&gt; policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp; class no_tcp_seq_rand_class&lt;BR /&gt;&amp;nbsp;&amp;nbsp; set connection random-sequence-number disable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Change the TCP MSS to 1380.&amp;nbsp; To disable this:&lt;/P&gt;&lt;P&gt;sysopt connection tcpmss 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If neither of these help, I would run some captures and make sure there is no asymmetric routing. Any irregularites in the TCP flows will be dropped by the FWSM and as soon as that connection is reset, all subsequent traffic will be dropped until a new 3-way handshake starts a new session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 May 2011 13:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405430#M776121</guid>
      <dc:creator>brquinn</dc:creator>
      <dc:date>2011-05-19T13:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: FSWM and Netscaler.</title>
      <link>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405431#M776137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And a complete wild stab in the dark from me. We had a similar issue using some encryption devices behind an ASA which worked fine behind a 3800 router. Turns out the ASA was stripping some of the TCP options from the handshake. We had to write a service policy to put them back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We worked it out by performing a wireshark capture on the inside and outside interfaces at the same time and looking at how the packets differed before and after they had been processed by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Barry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 May 2011 13:41:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fswm-and-netscaler/m-p/1405431#M776137</guid>
      <dc:creator>barry</dc:creator>
      <dc:date>2011-05-19T13:41:22Z</dc:date>
    </item>
  </channel>
</rss>

