12-18-2014 08:05 AM - edited 03-11-2019 10:14 PM
Hi All,
Trying to set up a flow from a Barracuda server located in my DMZ, to an outside NTP website on port 123, but my ASA logs show the following:
|106023|scrubbed|123|205.158.110.60|123|Deny udp src DMZ:scrubbed/123 dst outside:205.158.110.60/123 by access-group "DMZ_access_in"
My DMZ is security-level 50, and outside is security-level 0.
interface GigabitEthernet0/2
description To_DMZ
nameif DMZ
security-level 50
ip address scrubbed 255.255.255.0
interface GigabitEthernet0/0
description OUT
nameif outside
security-level 0
ip address scrubbed 255.255.255.224
My NAT rules are correct as follows to NAT server with DMZ address to public access address:
nat (DMZ,outside) static scrubbed
DMZ_access_in ACL has no deny statements in it.
Same security is implemented:
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
Why is this getting stuck in my DMZ ACL? Shouldn't a stateful firewall permit the return traffic for traffic initiated from a higher security level to a lower security level as long as NAT rules are correct?
Solved! Go to Solution.
12-19-2014 08:29 AM
The second part is correct. If the initial traffic is allowed, the return-traffic will be allowed automatically by the statefull inspection.
For the initial-traffic, you have the default-rule that traffic from a higher to lower security-level interface is allowed. But the moment you add an ACL to an interface, this default is not in place any more. From now on every wanted traffic has to be allowed explicitly as each ACL has an implicit "deny any any" at the end (depending on your ASA-version this line can be in the interface- or the global ACL) that will deny all traffic that is not explicitly allowed.
12-18-2014 08:42 AM
12-19-2014 08:23 AM
Hi Karsten,
I'm not sure I understand why I need a permit statement for the initiating traffic. If the server in my DMZ is the initiator, which it is, then shouldn't security 50 traffic be permitted over security 0 by design, and the return traffic permitted by the stateful function?
12-19-2014 08:29 AM
The second part is correct. If the initial traffic is allowed, the return-traffic will be allowed automatically by the statefull inspection.
For the initial-traffic, you have the default-rule that traffic from a higher to lower security-level interface is allowed. But the moment you add an ACL to an interface, this default is not in place any more. From now on every wanted traffic has to be allowed explicitly as each ACL has an implicit "deny any any" at the end (depending on your ASA-version this line can be in the interface- or the global ACL) that will deny all traffic that is not explicitly allowed.
12-22-2014 05:05 PM
Karsten,
If the ACL is applied inbound though, wouldn't that not affect the outbound traffic (i.e. initial traffic) from the DMZ? Or does direction not matter in terms of invalidating the default "higher to lower" behavior?
12-22-2014 11:09 PM
The ACL will control traffic in all directions. The ACL on the DMZ-interface will limit what you can send to the lower level (what was all by default) and at the same time makes it possible to send traffic to the higher levels. This ACL needs to allow all needed initial traffic regardless where the destination is.
12-23-2014 12:48 PM
Gotcha. Thank you much.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide