08-30-2021 01:44 PM
Doing a conversion to office 365. O365 needs access to barracuda archiver on inside network.
Inside archiver is at 192.168.1.240
outside address 199.36.135.99
Created translation and access rules.
Access rules allow port 443, 80 , 8000 and 25.
https:/ and http and http to port 8000 all work
Port 25 shows to translate and connect. but nothing ever happens. Stuck waiting for SYN ack. Data below is working 443 connection and non working 25 connection. SMTP fixup is off.
TCP Outside 199.36.132.62:24256 Inside 192.168.1.240:25, idle 0:00:01, bytes 0, flags SaAXB
TCP Outside 199.36.132.62:24090 Inside 192.168.1.240:443, idle 0:01:04, bytes 21982, flags UIOXB
Access list:
access-list Outside_access_in extended permit tcp any object Archiver object-group DM_INLINE_TCP_4
access-list Outside_access_in extended permit tcp any host 199.36.135.199 object-group DM_INLINE_TCP_5
Any ideas on what is blocking port 25?
Thanks in advance.
08-30-2021 02:17 PM
SMTP fixup is off.
need fix on to work as per the guide :
O365 using SMTP TLS:
may be worth looking below config :
https://arjanlobbezoo.nl/asa-5505-force-smtp-tls-connection-to-office-365-relay/
08-30-2021 02:21 PM
08-30-2021 02:27 PM
first is your Local SMTP running ok ? are you able to locally do the same telnet x.x.x.x 25 port ? and you see SMTP replies and you get smtp open connection?
once that is confirmed then try other options.
Look at the flags meaning :
flags SaAXB
08-30-2021 02:42 PM
08-31-2021 05:42 AM
08-31-2021 05:47 AM
Never mind, I see what you are saying. Anyways SMTP fixup is off. I dont think I am getting far enough into the box for that to make a difference yet.
08-31-2021 02:04 PM
is that locally working ? as i have asked before go to next leve ?
08-31-2021 02:23 PM
08-31-2021 03:15 PM
@Ken Stieers suggesting that worth disable as mentioned in the document and test it.
https://www.petenetlive.com/KB/Article/0000536
08-30-2021 05:13 PM
09-01-2021 12:34 AM
Could you please run packet capture on the inside interface for the traffic destined and coming from the host 192.168.1.240 on port 25 and share the output?
A side note, you wouldn't need this rule as it is using the public IP, but this shouldn't affect anything as this rule won't have any hits:
access-list Outside_access_in extended permit tcp any host 199.36.135.199 object-group DM_INLINE_TCP_5
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide