<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authenticating to Active Directory through DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806747#M973061</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The acl for the dmz is written in a particular order. You want to...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Permit what you need from dmz hosts to inside hosts(dns, active directory ports etc.)&lt;/P&gt;&lt;P&gt;2. Deny everything else from dmz hosts to inside hosts.&lt;/P&gt;&lt;P&gt;3. Permit ip any any. (This allows dmz access outbound, internet etc.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may need more ports for the AD logon. Kerberos possibly, tcp 88.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jul 2007 12:29:34 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-07-17T12:29:34Z</dc:date>
    <item>
      <title>Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806742#M973056</link>
      <description>&lt;P&gt;I have a PIX 515e with 3 interfaces, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside (sec100)  10.0.10.1&lt;/P&gt;&lt;P&gt;DMZ (sec50)     10.0.20.4&lt;/P&gt;&lt;P&gt;Outside (sec0)  64.69.117.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a server on the DMZ with RDP enabled, and from that server I can ping outside IPs by number, but not name.  I can ping the server itself from outside and inside fine as well.  The server IP is 10.0.20.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I have an ACL problem but I am afraid of opening up certain ports for fear of defeating the DMZ's purpose altogether.  So I ask you all what I need to do &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching my config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please let me know what I need to do to get to enable my servers on the DMZ to query the DNS servers on the inside network, also please let me know what I need to do to get Active directory logons working..currently when I try to logon to the server on the DMZ, it tells me that the System cannot log you on because the domain is not available.  I assume port 389 needed to be opened on the DMZ ACL but there may be others as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If oyu see any other problems let me know.  I will be moving all of the servers on this config to the DMZ once I get everything working properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:45:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806742#M973056</guid>
      <dc:creator>thebrom</dc:creator>
      <dc:date>2019-03-11T10:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806743#M973057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the attached config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806743#M973057</guid>
      <dc:creator>thebrom</dc:creator>
      <dc:date>2007-07-17T12:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806744#M973058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This will get the dns working. If dns server is 10.0.10.100...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz permit udp any host 10.0.10.100 eq domain&lt;/P&gt;&lt;P&gt;access-list dmz deny ip any 10.0.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz permit ip any any&lt;/P&gt;&lt;P&gt;access-group dmz in interface DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;edit: I'll edit this since your config is now posted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806744#M973058</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-17T12:11:38Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806745#M973059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, can you help explain that answer some and what each entry accomplishes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean prior to you postinbg I had screwed up and placed access-list dmz permit TCP any host 10.0.10.100 eq domain &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I forgto DNS is UDP, I am so burnt out right now, but I understand that entry, but what is the purpose of the DENY entry and then the permit IP any any?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume the order has a lot of signifigance as well.  At any rate the DNS is now working but I am still getting denials on AD logon.  This is really something I should know I am a CCSP, but there were no real details on the PIX exam regarding DNS configurations and I need to get up to speed on this stuff so it is all second nature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Rob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806745#M973059</guid>
      <dc:creator>thebrom</dc:creator>
      <dc:date>2007-07-17T12:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806746#M973060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, now I can see your config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit icmp any any &lt;/P&gt;&lt;P&gt;access-list acl_dmz permit udp any host &lt;DNS.SERVER.IP&gt; eq domain &lt;/DNS.SERVER.IP&gt;&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit tcp any host &lt;DOMAIN.CONTROLLER.IP&gt; eq ldap&lt;/DOMAIN.CONTROLLER.IP&gt;&lt;/P&gt;&lt;P&gt;access-list acl_dmz deny ip any 10.0.10.0 255.255.252.0&lt;/P&gt;&lt;P&gt;access-list acl_dmz permit ip any any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806746#M973060</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-17T12:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806747#M973061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The acl for the dmz is written in a particular order. You want to...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Permit what you need from dmz hosts to inside hosts(dns, active directory ports etc.)&lt;/P&gt;&lt;P&gt;2. Deny everything else from dmz hosts to inside hosts.&lt;/P&gt;&lt;P&gt;3. Permit ip any any. (This allows dmz access outbound, internet etc.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may need more ports for the AD logon. Kerberos possibly, tcp 88.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806747#M973061</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-17T12:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806748#M973062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok so when I open additional ports I need to put the permits above the deny that I have already entered?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure I understand what you're saying in regards to my ACL being written improperly, how should it look?  I am lost with what you're saying about the sourse addresses, etc&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806748#M973062</guid>
      <dc:creator>thebrom</dc:creator>
      <dc:date>2007-07-17T12:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806749#M973063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"ok so when I open additional ports I need to put the permits above the deny that I have already entered?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Yes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"I am not sure I understand what you're saying in regards to my ACL being written improperly, how should it look? I am lost with what you're saying about the sourse addresses, etc"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Sorry, this may be my fault, it takes longer to figure out an acl when it's using object groups etc. Forget what I said. What you had originally allows any on the dmz to public servers. Was this working?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806749#M973063</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-17T12:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806750#M973064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes I was able to get outbound PINGS to public IPs, just not public website names, now it is working with the DNS entry you supplied.  Thanks for your help there! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I just need to get the darn logons to work, I hate to dual home the servers. that would defeat the whole purpose of a DMZ IMO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the LDAP opened in line 1 of the dmz acl, but maybe like you said there are others needed although my syslog isn't showing much&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although I do see this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;07-17-2007	09:52:32	Local4.Warning	10.0.10.1	Jul 17 2007 09:43:45: %PIX-4-106023: Deny udp src outside:207.190.222.91/389 dst dmz:SP2DMZPUB/1182 by access-group "acl_outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I need to open LDAP  on the outside ACL?  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806750#M973064</guid>
      <dc:creator>thebrom</dc:creator>
      <dc:date>2007-07-17T12:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806751#M973065</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't imagine why that would be needed and is probably a bad idea. Here are the ports I use for the AD. You may not need them all but they work for me...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tcp 389&lt;/P&gt;&lt;P&gt;udp 389&lt;/P&gt;&lt;P&gt;udp 53&lt;/P&gt;&lt;P&gt;tcp 53&lt;/P&gt;&lt;P&gt;tcp 88&lt;/P&gt;&lt;P&gt;udp 88&lt;/P&gt;&lt;P&gt;tcp 445&lt;/P&gt;&lt;P&gt;tcp 135&lt;/P&gt;&lt;P&gt;tcp 1025&lt;/P&gt;&lt;P&gt;tcp 636&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope these help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 12:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806751#M973065</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-17T12:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806752#M973066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok I will try those, but I am still thinking that would need to be open on my otuside interface because my statics are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) SP2DMZPUB SP2DMZPRI netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the SP2DMZPUB is a public outside IP address and the SP2DMZPRI is a 10.0.20.0/24 address.  so wouldnt that stuff need to be allowed through my outside interface as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 13:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806752#M973066</guid>
      <dc:creator>thebrom</dc:creator>
      <dc:date>2007-07-17T13:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating to Active Directory through DMZ</title>
      <link>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806753#M973067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But you are not coming from the outside interface. You are coming from the dmz interface.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source of the traffic is the dmz address 10.0.20.x, not the public address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 13:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/authenticating-to-active-directory-through-dmz/m-p/806753#M973067</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-17T13:26:49Z</dc:date>
    </item>
  </channel>
</rss>

