01-18-2018 12:18 AM - edited 02-21-2020 07:09 AM
Hello,there may be some problems with the ASA's config, but I can find where are the problems.
Below is the basic config for this ASA:
DMZ ip address : 192.168.3.254/24
Outside ip address: 125.35.20.188/26
acs server ip address: 192.168.3.240/24 acs server version 5.2
DMZ access ACS server through HTTPS https:// 192.168.3.240/acsadmin successfully
Outside access ACS server through HTTPS https:// 192.168.3.240/acsadmin failed
https:// 125.35.20.145/acsadmin failed
where are the problems.thanks!
Please get the detailed config in the attached file
Solved! Go to Solution.
01-20-2018 08:53 PM
Hello,
From what I can tell, this is purely client-server issue and not a firewall issue. I checked the captures you attached, and:
-There is clearly a 3-way handshake done successfully
-There is a reset then sent from 218.247.232.86 at a certain time, could be the application specific traffic.
Couple of more things to figure out the issue:
1. Is the same traffic working from behind the firewall
2. Is there a WAF (Web Application Firewall) or any other appliance that could be causing this issue
3. There could be an IPS issue as well.
-HTH
AJ
01-18-2018 02:43 AM
Can you enable traffic from the lower security level to high security level and try it again.
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
Cheers
01-18-2018 06:05 PM
Thank you very much for your help.
but security level is different。
01-18-2018 03:29 AM
Hello,
The config looks okay, can you please take syslogs on ASA and attach here.
Also, could be an issue over internet routing for the NAT ip address 125.35.20.145.
You can take a capture:
capture capo interface outside match tcp any host 125.35.20.145
then initiate traffic from outside and take output of 'show cap capo'
Please take syslogs and attach these outputs. Same Security commands is not required since the security level is different for these interfaces.
-
HTH
AJ
01-18-2018 06:02 PM
Thank you very much for your advice。
I didn't change any configuration,I tried again today,only this command to collect logs (capture capo interface outside match tcp any host 125.35.20.145 )。
https://125.35.20.145/acsadmin/login.jsp successfully from Outside.
Please see the attached document,THAK YOUR VERY MUCH AGAIN.
01-20-2018 08:53 PM
Hello,
From what I can tell, this is purely client-server issue and not a firewall issue. I checked the captures you attached, and:
-There is clearly a 3-way handshake done successfully
-There is a reset then sent from 218.247.232.86 at a certain time, could be the application specific traffic.
Couple of more things to figure out the issue:
1. Is the same traffic working from behind the firewall
2. Is there a WAF (Web Application Firewall) or any other appliance that could be causing this issue
3. There could be an IPS issue as well.
-HTH
AJ
01-21-2018 06:25 PM
01-18-2018 10:35 AM
Can you check you have proper ACL and NAT rule on ASA. Could you do packet-tracer on ASA
packet-tracer input outside tcp <sourec ip> 1025 <ACS IP address> 443 de
01-18-2018 06:13 PM
Thank you very much for your help.
packet-tracer input outside tcp <sourec ip> 1025 <ACS IP address> 443 ,Why is the 1025 port?
01-18-2018 06:46 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide