04-14-2020 06:09 PM
Hello everyone,
I am not much familiar with Cisco ASAs, however for the past few days I've been reading and trying to troubleshoot the following issue, but still I have not been successful. I hope somebody here can help me:
Cisco ASA 5505 - 9.2(1)
(using bogus IP details)
setup:
_____ (199.99.9.10) outside<---E0<--|Cisco| | ASA | |5505 | |_____|-->E1--->inside (192.168.1.0/24)
statically routed IP
199.99.9.12 is statically routed at the GW to 199.99.9.10
My requirement
Forward IP 199.99.9.12 port 443 (https) & 80 to inside IP 192.168.1.190:443 & 80
config is shown below:
interface Ethernet0/0 description CONNECTS TO WAN switchport access vlan 112 ! interface Ethernet0/1 description CONNECTS TO LAN switchport access vlan 113 interface Vlan112 description WAN nameif outside security-level 0 ip address 199.99.9.9 255.255.255.252 ! interface Vlan113 description LAN nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 ! object network obj_any subnet 0.0.0.0 0.0.0.0 object network webserver-https host 192.168.1.190 object network webserver-http host 192.168.1.190 object network hosted-external-ip host 199.99.9.12 access-list outside-in extended permit tcp any object webserver-http eq www access-list outside-in extended permit tcp any object webserver-https eq https access-list outside-in extended deny icmp any any log access-list inside-in extended permit ip any any access-list inside-in extended permit icmp any any object network obj_any nat (inside,outside) dynamic interface object network webserver-https nat (inside,outside) static hosted-external-ip service tcp https https object network webserver-http nat (inside,outside) static hosted-external-ip service tcp www www access-group outside-in in interface outside access-group inside-in in interface inside route outside 0.0.0.0 0.0.0.0 199.99.9.9 1
*******************************
I omitted a lot of config and just put what I thought was necessary
I've performed the following test:
Cisco-ASA5505# packet-tracer input outside tcp 1.1.1.1 1234 199.99.9.12 443 Phase: 1 Type: ACCESS-LIST Subtype: Result: ALLOW Config: Implicit Rule Additional Information: MAC Access list Phase: 2 Type: UN-NAT Subtype: static Result: ALLOW Config: object network webserver-https nat (inside,outside) static hosted-external-ip service tcp https https Additional Information: NAT divert to egress interface inside Untranslate 199.99.9.12/443 to 192.168.1.190/443 Phase: 3 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group outside-in in interface outside access-list outside-in extended permit tcp any object webserver-https eq https Additional Information: Phase: 4 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Phase: 5 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 6 Type: VPN Subtype: ipsec-tunnel-flow Result: ALLOW Config: Additional Information: Phase: 7 Type: NAT Subtype: rpf-check Result: ALLOW Config: object network webserver-https nat (inside,outside) static hosted-external-ip service tcp https https Additional Information: Phase: 8 Type: NAT Subtype: per-session Result: ALLOW Config: Additional Information: Phase: 9 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 10 Type: FLOW-CREATION Subtype: Result: ALLOW Config: Additional Information: New flow created with id 1054, packet dispatched to next module Result: input-interface: outside input-status: up input-line-status: up output-interface: inside output-status: up output-line-status: up Action: allow
__________________________________
However when I try to access it via a browser and did a show connections details, I can see the flag is set to SaAB, I have looked that up and found out that this is shown when a connection is not able to complete the TCP 3-way handshake:
TCP outside: 176.222.12.123/43628 inside: 192.168.1.190/443, flags SaAB , idle 2s, uptime 5s, timeout 30s, bytes 0 TCP outside: 176.222.12.123/43627 inside: 192.168.1.190/443, flags SaAB , idle 3s, uptime 6s, timeout 30s, bytes 0 TCP outside: 176.222.12.123/43626 inside: 192.168.1.190/443, flags SaAB , idle 3s, uptime 6s, timeout 30s, bytes 0
I am wondering whether there is nothing wrong with the firewall config at all and it is just the webserver that is not responding for some reason, but when I test it within the LAN, its accessible.
I have tried different scenarios but with the same results. I do not have access to the webserver in order to check what is going on. I appreciate any input you have to resolve this issue.
04-14-2020 06:44 PM
04-14-2020 07:19 PM
Hi Mohammed,
Thank you for your quick response.
I unfortunately do not have access to the server to check it. But I will ask somebody who does.
There is a another firewall that is doing a port forwarding to the same server using another public IP. That works fine. Can web servers be configured to accept connections from a specific specific port on a public IP and reject others?
Regards,
D.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide