<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cut-thru proxy on asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730255#M972814</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply . but unfortunately i am not looking for that solution . i completely understand the acl required to permit rdp traffic, (as mentioned in the link.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i need to know is , how to stop unauthorized access from getting across the asa. i want the unauthorized access to rdp to be denied by the acs server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;kirti.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Jul 2007 16:59:50 GMT</pubDate>
    <dc:creator>kirti_bapat</dc:creator>
    <dc:date>2007-07-26T16:59:50Z</dc:date>
    <item>
      <title>cut-thru proxy on asa</title>
      <link>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730253#M972812</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am configuring cut-thru proxy on asa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the config guide says that the authorization acl should be a subset of the acl used for authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in my scenario i am using telnet to auhenticate the user and i want to authorize traffic from 2.1.1.2 to 1.1.1.2 for http only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my asa config is as follows:&lt;/P&gt;&lt;P&gt;-------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa-server cisco proto tacacs+&lt;/P&gt;&lt;P&gt;aaa-server host 1.1.1.2&lt;/P&gt;&lt;P&gt;key cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l 101 permit tcp host 2.1.1.2 host 1.1.1.2 eq 23&lt;/P&gt;&lt;P&gt;access-l 102 permit tcp host 2.1.1.2 host 1.1.1.2 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in int outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication match 101 outside cisco&lt;/P&gt;&lt;P&gt;aaa authorization match 102 outside cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with this configuraion on the asa the user gets autheticated successfully , but cannot browse the webpage on 1.1.1.2.&lt;/P&gt;&lt;P&gt;this happened becoz my acl 101 applied on the outside does not allow http traffic ; and also acl 102 is not a subset of 101.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hence i reconfigured 101 as - access-l 101 permit ip host 2.1.1.2 host 1.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now the user gets autheticated successfully , also the authorization is a PASS and the webpage can be accessed on 1.1.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now if i try to access the remote desktop port of 1.1.1.2 it works successfully. i havent authorized this on the acs , why dont i get authorization failure for traffic destined for rdp on 1.1.1.2 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on acs for the user cisco , i have configured under the shell command authorization&lt;/P&gt;&lt;P&gt;---------------------------------&lt;/P&gt;&lt;P&gt;unmatched ios commands - deny&lt;/P&gt;&lt;P&gt;command - http&lt;/P&gt;&lt;P&gt;argument - permit 1.1.1.2&lt;/P&gt;&lt;P&gt;unlisted arguments - deny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please let me know where i am going wrong in the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;kirti.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:47:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730253#M972812</guid>
      <dc:creator>kirti_bapat</dc:creator>
      <dc:date>2019-03-11T10:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: cut-thru proxy on asa</title>
      <link>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730254#M972813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think in acl 101 you should only permit for port 80 (default port for http). Following link may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807d287e.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 14:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730254#M972813</guid>
      <dc:creator>bwalchez</dc:creator>
      <dc:date>2007-07-26T14:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: cut-thru proxy on asa</title>
      <link>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730255#M972814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply . but unfortunately i am not looking for that solution . i completely understand the acl required to permit rdp traffic, (as mentioned in the link.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i need to know is , how to stop unauthorized access from getting across the asa. i want the unauthorized access to rdp to be denied by the acs server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;kirti.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Jul 2007 16:59:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cut-thru-proxy-on-asa/m-p/730255#M972814</guid>
      <dc:creator>kirti_bapat</dc:creator>
      <dc:date>2007-07-26T16:59:50Z</dc:date>
    </item>
  </channel>
</rss>

