12-20-2022 09:51 AM - edited 12-20-2022 10:23 AM
Hello Cisco Community,
I am trying to allow port 80 through a ASA 5506 firewall from my DMZ to a INTERNAL zone for a HTTP server. I am having a problem with the access list, and have encountered a strange problem.
The ip address of my HTTP server is 192.168.2.1. When i use the access list command:
access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any gt www
It works fine, however when i use the command equal to www:
access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any eq www
It drops the HTTP packets, and doesn't allow it through the firewall. Does anyone know why?
I'm applying the access list to the DMZ 'in' interface.
access-group WEB-INSIDE in interface DMZ
I have attached two packet tracer files to demonstrate a working and non-working configuration. I may be doing something wrong. Thank you.
12-20-2022 09:58 AM
access-list WEB-INSIDE extended permit tcp any host 192.168.2.1 eq www
this right one I think to make OUT host access to server IN.
12-20-2022 10:13 AM
Hi MHM,
Thank you for your reply. I tried to implement your suggestion but couldn't get it to work. I thought I had the source/destination the right way round, but i may have it wrong. I don't use access lists very often.
It is strange because when i use the command:
access-list WEB-INSIDE extended permit icmp host 192.168.2.1 any
ICMP packets don't get dropped and ping works fine. Do you have any other suggests?
12-20-2022 10:17 AM
can I see full config ?
12-20-2022 10:29 AM
Yes, I have attached the packet tracer files, but i'll paste the configuration here too.
Here's a photo of the config:
ASA Firewall config:
interface GigabitEthernet1/1
nameif INSIDE
security-level 100
ip address 192.168.1.254 255.255.255.0
!
interface GigabitEthernet1/2
nameif DMZ
security-level 50
ip address 192.168.2.254 255.255.255.0
!
interface GigabitEthernet1/3
nameif OUTSIDE
security-level 0
no ip address
shutdown
!
object network DMZ-WEB
host 192.168.2.1
nat (DMZ,OUTSIDE) static 1.1.1.1
object network INSIDE
subnet 192.168.1.0 255.255.255.0
nat (INSIDE,OUTSIDE) dynamic interface
!
!
access-list WEB-INSIDE extended permit icmp host 192.168.2.1 any
access-list WEB-INSIDE extended permit tcp host 192.168.2.1 any eq www
!
!
access-group WEB-INSIDE in interface DMZ
!
!
class-map inspection_default
match default-inspection-traffic
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect tftp
!
service-policy global_policy global
12-20-2022 10:37 AM - edited 12-20-2022 10:39 AM
no need any access list,
since initiate traffic from the high security IN =100 to DMZ low =50.
for ICMP you need
policy-map global_policy
class inspection_default
inspect icmp <<- this what you need
12-20-2022 11:03 AM
Will that work for port 80 and 443 if i want https, or just for icmp?
12-20-2022 11:25 AM
I will run lab for you and check your config.
update you today.
12-20-2022 11:43 AM
Thank so much.
12-20-2022 01:18 PM
as I mention before since the traffic from High to low security level (from 100 to 50) no need any ACL
then what is issue ??
ISSUE is PKT limit you need to first
1- no policy-map global_policy
2-no service-policy global_policy global
3-
policy-map global_policy
class inspection_default
inspect http <<- add this
inspect icmp <<- add this
4-service-policy global_policy global
and as you see I can access HTTP in DMZ without any issue
see I change the hello message to be welcome to MHM
12-20-2022 03:52 PM
Thank you for trying. Still cannot get it working on my computer. I have tried multiple times - starting with a new 5506 firewall. It works perfectly on the 5505 with the same config, but not on the 5506 firewall. I am on a arm computer, so might be something to do with that.
12-20-2022 04:05 PM
only repeat same step I mention above and it will work.
12-20-2022 05:56 PM
Finally, got it to work thank you. There seems to be a bug with packet tracer saving the global policy-map. It does not always register it on my computer, and then when i restart packet tracer it restores it to default. Even when using 'Write memory' and 'copy running-config startup-config'.
12-21-2022 12:34 AM
You are so so welcome friend any time.
12-20-2022 10:16 AM - edited 12-20-2022 10:31 AM
Edit - mis-read the question.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide