cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1894
Views
0
Helpful
0
Replies

Blocking DHCP at ASA

ihouse205
Level 1
Level 1

Good Day,

I have seven subnets that previously used public IPs exclusively w/helper addresses configured on a router that I *do not* control.

We recently installed an ASA 5550 to do nothing more than perform NAT for five on the subnets, the other two retain the use of public IPs.

The DHCP server we planned to use is on a public IP subnet. The ethernet port on this box is configured for Dot1q trunking and listens on all ports for DHCP broadcasts.

The problem, or peculiarity, I'm seeing is that the DHCP requests hit the server twice--once as a simple broadcast and again after passing through the ASA, hitting the router and being directed by the helper address. (all this in spite of using the ASA as an interim DHCP server)

I could request that the helper addresses be removed, but my first thought was to simply block port 67 and 68 from passing through the ASA. I have applied the "nodhcpout" acl to both inside and outside interfaces, but the traffic still passes. I have also disabled same-security traffic with the same result.

Any insight is appreciated. Here's the config from one context:

********

nat/vlan540# sh run

: Saved

:

ASA Version 8.0(4) <context>

!

hostname vlan540

domain-name domain.com

enable password

passwd

names

!

interface GigabitEthernet0/1

nameif 54lowerout

security-level 0

ip address xxx.xxx.xxx.2 255.255.255.128

!

interface GigabitEthernet1/0.3

nameif 54lowerin

security-level 0

ip address 172.18.0.1 255.255.0.0

!

dns domain-lookup 54lowerout

dns server-group DefaultDNS

name-server xxx.xxx.xxx.x

domain-name domain.com

access-list allow extended permit ip any any

access-list nodhcpout extended deny udp any any eq bootps

access-list nodhcpout extended deny udp any any eq bootpc

access-list nodhcpout extended permit ip any any

pager lines 24

logging enable

logging trap alerts

logging host 54lowerout x.x.x.x

logging message 305012 level alerts

logging message 305011 level alerts

logging message 305010 level alerts

logging message 305009 level alerts

mtu 54lowerout 1500

mtu 54lowerin 1500

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

global (54lowerout) 1 x.x.x.x netmask 255.255.255.128

global (54lowerout) 1 x.x.x.x

nat (54lowerin) 1 172.18.0.0 255.255.0.0

access-group allow in interface 54lowerout

access-group allow out interface 54lowerout

access-group nodhcpout in interface 54lowerin

access-group nodhcpout out interface 54lowerin

route 54lowerout 0.0.0.0 0.0.0.0 x.x.x.x 1

timeout xlate 0:06:00

timeout conn 0:06:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

aaa authentication ssh console LOCAL

no snmp-server location

no snmp-server contact

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

telnet timeout 5

ssh x.x.x.0 255.255.255.128 54lowerout

ssh timeout 15

dhcpd dns x.x.x.x

dhcpd lease 1800

!

dhcpd address 172.18.0.10-172.18.1.9 54lowerin

dhcpd enable 54lowerin

!

no threat-detection statistics tcp-intercept

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

message-length maximum 512

policy-map global_policy

class inspection_default

inspect dns preset_dns_map

inspect ftp

inspect h323 h225

inspect h323 ras

inspect netbios

inspect rsh

inspect rtsp

inspect skinny

inspect esmtp

inspect sqlnet

inspect sunrpc

inspect tftp

inspect sip

inspect xdmcp

!

service-policy global_policy global

Cryptochecksum:194296e16f28f367fd9988f2289b15bd

: end

nat/vlan540#

0 Replies 0
Review Cisco Networking for a $25 gift card