hi everyone we have an outside vendor requesting access to a server they manage through our firewall. They are asking for 3 ports open from their public ip range. They have a unix server that needs to connect to their unix server inside our network that they support.
On the asdm 6.4 I set up network objects for their public IP range, ports requested, and the internal server. I added an access rule for the outside interface to allow their source > inside server > tcp ports. They are able to ping our outside public IP, but when attempting to initiate a connection from their server to ours, it is timing out. How can I troubleshoot this ACL? when they ping or attempt the connection, nothing appears in the asdm syslog messages. I have turned all logging to informational and pushed it to my desktop and nowhere in the log does it show any of their IP's. The hitcount on the access list is zero. The list entry is enabled. Pasted below is a sanitized [hopefully] firewall config. Thanks in advance for any help.
27
subnet 192.168.22.96 255.255.255.224
object network VENDORXXX_server
host 192.168.100.1
description VENDORXXX server
object network vendorxxx_external
range xx.xx.57.160 xx.xx.57.168
description vendorxxx public IP's
object-group service VENDORXXX_service_group
description One object to group together mulitple ports and services for outside VENDORXXX IP objects to access inside VENDORXXX server object
service-object tcp destination eq 1026
service-object tcp destination eq 4433
service-object tcp destination eq 4434
access-list ISP-INBOUND extended permit icmp any any echo-reply
access-list ISP-INBOUND extended permit icmp any any unreachable
access-list ISP-INBOUND extended permit icmp any any echo
access-list ISP-INBOUND extended permit icmp any any time-exceeded
access-list ISP-INBOUND extended permit tcp host xx.xx.xx.151 eq www any inactive
access-list ISP-INBOUND extended permit tcp host xx.xx.xx.151 eq 6338 any inactive
access-list ISP-INBOUND extended permit udp host xx.xx.xx.151 eq 6338 any inactive
access-list ISP-INBOUND extended permit tcp host xx.xx.xx.149 eq smtp any
access-list ISP-INBOUND extended permit tcp host xx.xx.xx.149 eq www any
access-list ISP-INBOUND extended permit tcp host xx.xx.xx.149 eq https any
access-list ISP-INBOUND extended deny tcp any host xx.xx.xx.149 eq 3389
access-list ISP-INBOUND extended deny tcp any host xx.xx.xx.151 eq 3389
access-list ISP-INBOUND extended permit udp any eq domain any
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.151 eq 1433 inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.151 eq 8080 inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.151 eq 6400 inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq www inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 6338 inactive
access-list ISP-INBOUND extended permit udp any host xx.xx.xx.150 eq 6338 inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 1433 inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 8080 inactive
access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 6400 inactive
access-list ISP-INBOUND extended deny ip any host xx.xx.xx.151 log
access-list ISP-INBOUND extended deny ip any host xx.xx.xx.150 log
access-list ISP-INBOUND extended permit ip any any
access-list ISP-INBOUND extended permit tcp host xx.xx.xx.153 eq 2427 any inactive
access-list ISP-INBOUND extended permit udp host xx.xx.xx.153 eq 2427 any inactive
access-list ISP-INBOUND extended permit udp host xx.xx.xx.153 range 16400 16990 any inactive
access-list ISP-INBOUND extended permit ip host xx.221.32.59 any inactive
access-list ISP-INBOUND extended permit ip host xx.250.71.186 host xx.xx.xx.151 inactive
access-list ISP-INBOUND extended permit ip host xx.7.229.50 host xx.xx.xx.150 inactive
access-list ISP-INBOUND extended permit ip host xx.7.229.50 host xx.xx.xx.151 inactive
access-list ISP-INBOUND remark Allows specific services from external vendorxxx IP's access to the internal vendorxxx server
access-list ISP-INBOUND extended permit object-group VENDORXXX_service_group object vendorxxx_external object VENDORXXX_server log
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.180.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.180.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.180.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.150.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xxxxLAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.160.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.140.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xxxxxLAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.110.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xxxxx LAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.170.0 255.255.255.0
access-list NO-NAT remark - Don't NAT xxxxxLAN to remote sites' PIX/ASA networks
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.110.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.130.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.140.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.150.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.160.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.170.0 255.255.255.0
access-list NO-NAT remark - Don't NAT office LANs to VPN clients
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.105.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.110.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.120.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.130.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.140.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.150.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.160.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.170.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT remark - Rules to remove after all sites are migrated
access-list NO-NAT remark - Do not NAT traffic from any site to xxxxxLAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.105.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xx xxxxLAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.120.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xx LAN
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.130.0 255.255.255.0
access-list NO-NAT remark - Do not NAT traffic from any site to xxx Center LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxx xxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx Center LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxxxx LAN
access-list NO-NAT remark - Don't NAT xxxx xxxx LAN to remote sites' PIX/ASA networks
access-list NO-NAT remark - Don't NAT office LANs to VPN clients
access-list NO-NAT remark - Rules to remove after all sites are migrated
access-list NO-NAT remark - Do not NAT traffic from any site to xxx xxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxx xx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxx xxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN
access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxx LAN
access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.190.0 255.255.255.0
access-list NO-NAT extended permit ip 192.168.190.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.190.0 255.255.255.0
access-list ALLOW-ALL extended permit ip any any
access-list SPLIT-TUNNEL extended permit ip 192.168.100.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.105.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.110.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.120.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.130.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.140.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.150.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.160.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.170.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.180.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list SPLIT-TUNNEL extended permit ip 192.168.190.0 255.255.255.0 192.168.22.96 255.255.255.224
access-list standard-split-tunnel-test remark testing split tunnel
access-list standard-split-tunnel-test standard permit 192.168.0.0 255.255.0.0
access-list standard-split-tunnel-test remark testing split tunnel
access-list global_mpc extended permit ip any any
pager lines 24
logging enable
logging timestamp
logging standby
logging console informational
logging monitor informational
logging buffered informational
logging trap informational
logging history informational
logging asdm informational
logging mail informational
logging device-id hostname
logging host inside 192.168.100.10
logging debug-trace
no logging message 313005
no logging message 305012
no logging message 305011
no logging message 710005
no logging message 715075
no logging message 733100
no logging message 715047
no logging message 715046
no logging message 304001
no logging message 715036
no logging message 111005
no logging message 713236
no logging message 609002
no logging message 609001
flow-export destination inside 192.168.100.10 2055
flow-export delay flow-create 60
mtu outside 1500
mtu inside 1500
ip local pool vpn-pool 192.168.22.96-192.168.22.127 mask 255.255.255.224
failover
failover lan unit primary
failover lan interface failover Ethernet0/3
failover link failover Ethernet0/3
failover interface ip failover 10.10.10.1 255.255.255.252 standby 10.10.10.2
icmp unreachable rate-limit 1 burst-size 1
icmp permit any echo-reply outside
icmp permit any unreachable outside
icmp permit any echo outside
icmp permit any inside
no asdm history enable
arp timeout 14400
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.22.96_27 NETWORK_OBJ_192.168.22.96_27 no-proxy-arp route-lookup
!
object network xxxcrystal
nat (inside,outside) static xx.xx.xx.152
object network xxxx
nat (inside,outside) static xx.xx.xx.151
object network xx-xxxx
nat (inside,outside) static xx.xx.xx.150
object network exchange
nat (inside,outside) static xx.xx.xx.149
!
nat (inside,outside) after-auto source dynamic any interface
access-group ISP-INBOUND in interface outside
access-group ALLOW-ALL in interface inside
route outside 0.0.0.0 0.0.0.0 xx.xx.xx.145 1
route inside xxxxxxxxxxx 255.255.255.252 192.168.100.254 1
route inside 192.168.100.0 255.255.255.0 192.168.100.254 1
route inside 192.168.105.0 255.255.255.0 192.168.100.254 1
route inside 192.168.110.0 255.255.255.0 192.168.100.254 1
route inside 192.168.120.0 255.255.255.0 192.168.100.254 1
route inside 192.168.130.0 255.255.255.0 192.168.100.254 1
route inside 192.168.140.0 255.255.255.0 192.168.100.254 1
route inside 192.168.150.0 255.255.255.0 192.168.100.254 1
route inside 192.168.160.0 255.255.255.0 192.168.100.254 1
route inside 192.168.170.0 255.255.255.0 192.168.100.254 1
route inside 192.168.180.0 255.255.255.0 192.168.100.254 1
route inside 192.168.190.0 255.255.255.0 192.168.100.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server LDAP protocol ldap
aaa-server LDAP (inside) host xxxxxx
server-port 636
ldap-base-dn ou=users,dc=xxxxxx,dc=com
ldap-naming-attribute sAMAccountName
ldap-login-password xxxxxx
ldap-login-dn xxxxxx\xxxxxxx
ldap-over-ssl enable
server-type microsoft
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication telnet console LOCAL
aaa authorization command LOCAL
http server enable
http 192.168.100.10 255.255.255.255 inside
http 192.168.100.135 255.255.255.255 inside
http 192.168.100.13 255.255.255.255 inside
http redirect outside 80
snmp-server host inside 192.168.100.96 community xxxxxx version 2c
snmp-server location xxxx
snmp-server contact xxxxxx@xxxxxx.comsnmp-server community xxxxxxx
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
ssh xxxxx 255.255.255.0 outside
ssh xxxxxxxx0 255.255.255.0 inside
ssh timeout 30
console timeout 0
threat-detection basic-threat
threat-detection scanning-threat shun except ip-address 192.168.100.0 255.255.255.0
threat-detection scanning-threat shun duration 7200
threat-detection statistics
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 132.249.20.88 source outside prefer
x
username xxxxattributes
service-type remote-access
username vendorxxxuser passwordxxxxxencrypted privilege 3
username vendorxxxuser attributes
service-type remote-access
username xxxxpassword xxxxxencrypted privilege 3
username xxxxxxattributes
service-type remote-access
username xxxxpassword xxxxencrypted privilege 3
username xxxxxxattributes
service-type remote-access
username xxxxxpassword xxxxxencrypted privilege 15
username xxxxxpassword xxxxxxencrypted privilege 15
username xxxxpassword xxxxx. encrypted privilege 15
username xxxxpassword xxxxencrypted privilege 15
username xxxxxpassword xxxxxencrypted privilege 5
username xxxxattributes
service-type remote-access
username xxxxpassword FFN.xxxxxencrypted privilege 3
username xxxxxxattributes
vpn-group-policy "GroupPolicy_anyconnect vpn"
service-type remote-access
username xxxxpassword Pj.xxxxencrypted privilege 3
username xxxxattributes
service-type remote-access
username xxxxxpassword /xxxxencrypted privilege 3
username xxxxxxattributes
service-type remote-access
username xxxxxxpassword xxxxxxxxxxxencrypted privilege 3
username xxxxxxattributes
service-type remote-access
username xxxxpassword xxxxencrypted privilege 3
username xxxxattributes
service-type remote-access
username xxxxpassword xxxxx.wS.2jUn encrypted privilege 3
username xxxxattributes
service-type remote-access
username xxxxxpassword xxxxencrypted privilege 3
username xxxxxattributes
service-type remote-access
tunnel-group "anyconnect vpn" type remote-access
tunnel-group "anyconnect vpn" general-attributes
address-pool vpn-pool
default-group-policy "GroupPolicy_anyconnect vpn"
tunnel-group "anyconnect vpn" webvpn-attributes
group-alias "anyconnect vpn" enable
!
class-map global-class
match access-list global_mpc
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
description netflow to 192.168.100.10
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
class global-class
flow-export event-type all destination 192.168.100.10
class class-default
user-statistics accounting
!
service-policy global_policy global
privilege cmd level 3 mode exec command perfmon
privilege cmd level 3 mode exec command ping
privilege cmd level 3 mode exec command who
privilege cmd level 3 mode exec command logging
privilege cmd level 3 mode exec command failover
privilege cmd level 3 mode exec command vpn-sessiondb
privilege cmd level 3 mode exec command packet-tracer
privilege show level 5 mode exec command import
privilege show level 5 mode exec command running-config
privilege show level 3 mode exec command reload
privilege show level 3 mode exec command mode
privilege show level 3 mode exec command firewall
privilege show level 3 mode exec command asp
privilege show level 3 mode exec command cpu
privilege show level 3 mode exec command interface
privilege show level 3 mode exec command clock
privilege show level 3 mode exec command dns-hosts
privilege show level 3 mode exec command access-list
privilege show level 3 mode exec command logging
privilege show level 3 mode exec command vlan
privilege show level 3 mode exec command ip
privilege show level 3 mode exec command ipv6
privilege show level 3 mode exec command failover
privilege show level 3 mode exec command asdm
privilege show level 3 mode exec command arp
privilege show level 3 mode exec command route
privilege show level 3 mode exec command ospf
privilege show level 3 mode exec command aaa-server
privilege show level 3 mode exec command aaa
privilege show level 3 mode exec command eigrp
privilege show level 3 mode exec command crypto
privilege show level 3 mode exec command ssh
privilege show level 3 mode exec command vpn-sessiondb
privilege show level 3 mode exec command vpn
privilege show level 3 mode exec command dhcpd
privilege show level 3 mode exec command blocks
privilege show level 3 mode exec command wccp
privilege show level 3 mode exec command dynamic-filter
privilege show level 3 mode exec command webvpn
privilege show level 3 mode exec command service-policy
privilege show level 3 mode exec command module
privilege show level 3 mode exec command uauth
privilege show level 3 mode exec command compression
privilege show level 3 mode configure command interface
privilege show level 3 mode configure command clock
privilege show level 3 mode configure command access-list
privilege show level 3 mode configure command logging
privilege show level 3 mode configure command ip
privilege show level 3 mode configure command failover
privilege show level 5 mode configure command asdm
privilege show level 3 mode configure command arp
privilege show level 3 mode configure command route
privilege show level 3 mode configure command aaa-server
privilege show level 3 mode configure command aaa
privilege show level 3 mode configure command crypto
privilege show level 3 mode configure command ssh
privilege show level 3 mode configure command dhcpd
privilege show level 5 mode configure command privilege
privilege clear level 3 mode exec command dns-hosts
privilege clear level 3 mode exec command logging
privilege clear level 3 mode exec command arp
privilege clear level 3 mode exec command aaa-server
privilege clear level 3 mode exec command crypto
privilege clear level 3 mode exec command dynamic-filter
privilege cmd level 3 mode configure command failover
privilege clear level 3 mode configure command logging
privilege clear level 3 mode configure command arp
privilege clear level 3 mode configure command crypto
privilege clear level 3 mode configure command aaa-server
prompt hostname context
call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http
https://tools.cisco.com/its/service/oddce/services/DDCEService destination address email callhome@cisco.com destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
hpm topN enable
Cryptochecksum:xxxxxx