<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Domain Authentication through an ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906879#M960734</link>
    <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically this is my setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ - 10.10.xxx.xxx&lt;/P&gt;&lt;P&gt;Private - 192.168.xx.xxx&lt;/P&gt;&lt;P&gt;Outside - 66.38.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my new domain controller on the Private network where I house my database servers. I am trying to get my webservers from DMZ to authenticate through my ASA 5520 to the new domain controller on the Private side... I have tried a few things but haven't had any luck, does anyone know an easy way of explaining this configuration on the firewall, or have a document that could help me out? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 11:30:36 GMT</pubDate>
    <dc:creator>conversyschris</dc:creator>
    <dc:date>2019-03-11T11:30:36Z</dc:date>
    <item>
      <title>Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906879#M960734</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically this is my setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DMZ - 10.10.xxx.xxx&lt;/P&gt;&lt;P&gt;Private - 192.168.xx.xxx&lt;/P&gt;&lt;P&gt;Outside - 66.38.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my new domain controller on the Private network where I house my database servers. I am trying to get my webservers from DMZ to authenticate through my ASA 5520 to the new domain controller on the Private side... I have tried a few things but haven't had any luck, does anyone know an easy way of explaining this configuration on the firewall, or have a document that could help me out? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906879#M960734</guid>
      <dc:creator>conversyschris</dc:creator>
      <dc:date>2019-03-11T11:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906880#M960735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the security level of DMZ and Private interfaces? do you have any ACL's on these interfaces inbound/outbound? what is protocol/port used by Webserver to authenticate to the DC?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2007 15:08:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906880#M960735</guid>
      <dc:creator>jaravinthan</dc:creator>
      <dc:date>2007-10-25T15:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906881#M960736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chris, if I understand, DC in inside and webserver in DMZ , what does your access list look like can you post.. you may need to open up some tcp and udp ports, create a service object group with these ports, tcp/udp 445, 88,389,53 you may also need netbios ports for file directory access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;refer to this link for ports required,&lt;/P&gt;&lt;P&gt;you may also look into spcific ports in microsoft website knowledbase.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.jarmanator.net/kb/server2k3fwports.htm" target="_blank"&gt;http://www.jarmanator.net/kb/server2k3fwports.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://technet2.microsoft.com/windowsserver/WSS/en/library/5b000a77-471a-400d-b446-aa68a9526f3e1033.mspx?mfr=true" target="_blank"&gt;http://technet2.microsoft.com/windowsserver/WSS/en/library/5b000a77-471a-400d-b446-aa68a9526f3e1033.mspx?mfr=true&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this example is for just DNS tcp port &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assume  DC IP: 192.168.1.20&lt;/P&gt;&lt;P&gt;DMZ host IP : 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(inside,DMZ) 10.10.10.1 192.168.1.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in  permit tcp host 10.10.10.1 host 192.168.1.20 eq 53&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;apply same principle when you create tcp udp services object group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2007 16:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906881#M960736</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2007-10-25T16:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906882#M960737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jorge,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the response, I have attached a copy of my current ACLs loaded on the device, your post has already given me a great deal to work with, but hopefully you can take a look and determine a bit more of what I need for this setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2007 13:08:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906882#M960737</guid>
      <dc:creator>conversyschris</dc:creator>
      <dc:date>2007-10-26T13:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906883#M960738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Forgot to add these lines to my configuration doc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUT66 in interface Outside66&lt;/P&gt;&lt;P&gt;access-group DMZ in interface DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2007 17:01:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906883#M960738</guid>
      <dc:creator>conversyschris</dc:creator>
      <dc:date>2007-10-26T17:01:25Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906884#M960739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After doing some research and looking into a few things I assume that this is what I need to add.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 53&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 10.10.xxx.xxx 192.168.x.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following the same format, I will add more ACL entries for the other protocols used by Active Directory to allow my host(s) to access the Domain Controller on the Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that config look as though it will work? I am having some major issues with this configuration because we do not have a test environment and I cant afford any downtime on my firewall, my deadline for testing is coming up soon, any review/comments would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2007 12:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906884#M960739</guid>
      <dc:creator>conversyschris</dc:creator>
      <dc:date>2007-10-30T12:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906885#M960740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am adding my configuration and testing this Monday. I have come up with this so far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 53&lt;/P&gt;&lt;P&gt;access-list DMZ permit udp host 10.10.xxx.xxx host 192.168.x.xxx eq 53&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 445&lt;/P&gt;&lt;P&gt;access-list DMZ permit udp host 10.10.xxx.xxx host 192.168.x.xxx eq 445&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 389&lt;/P&gt;&lt;P&gt;access-list DMZ permit udp host 10.10.xxx.xxx host 192.168.x.xxx eq 389&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 88&lt;/P&gt;&lt;P&gt;access-list DMZ permit udp host 10.10.xxx.xxx host 192.168.x.xxx eq 88&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 389&lt;/P&gt;&lt;P&gt;access-list DMZ permit udp host 10.10.xxx.xxx host 192.168.x.xxx eq 389&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 636&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 1025&lt;/P&gt;&lt;P&gt;access-list DMZ permit tcp host 10.10.xxx.xxx host 192.168.x.xxx eq 3268&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 10.10.xxx.xxx 192.168.x.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I mentioned I have to add this configuration and test in my LIVE environment on Monday, if anyone could review my initial ACL configuration from the document I posted, and asses my new additions to tell me if this will work as planned I would appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2007 13:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906885#M960740</guid>
      <dc:creator>conversyschris</dc:creator>
      <dc:date>2007-11-02T13:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Domain Authentication through an ASA</title>
      <link>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906886#M960741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My old post with the config expired, here it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2007 13:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/domain-authentication-through-an-asa/m-p/906886#M960741</guid>
      <dc:creator>conversyschris</dc:creator>
      <dc:date>2007-11-02T13:07:50Z</dc:date>
    </item>
  </channel>
</rss>

