11-22-2014 01:14 PM - edited 03-11-2019 10:07 PM
Hello.
I'm trying to configure my ASA to allow domain memberships to exist between two zones. I have a zone that will house the Domain Controllers, and a zone that will house the members. I can't seem to get the membership between the 2 zones to work.
Here is what I've done so far:
I have an object group that has all the active directory ports.
object-group service ActiveDirectory
service-object tcp-udp eq 389
service-object tcp-udp eq 464
service-object tcp eq 135
service-object tcp eq 3268
service-object tcp eq 3269
service-object tcp eq ldaps
service-object udp eq ntp
service-object tcp-udp eq 445
service-object tcp-udp eq 88
service-object tcp-udp eq domain
service-object tcp eq netbios-ssn
service-object udp eq netbios-ns
Then an ACL entry:
access-list servers_access_in extended permit object-group ActiveDirectory 192.168.25.0 255.255.255.0 192.168.28.0 255.255.255.0
Then a class map:
class-map class-DCERP
match port tcp eq 135
And a policy map:
policy-map type inspect dcerpc ActiveDirectory
parameters
endpoint-mapper lookup-operation timeout 0:05:00
policy-map inside-policy-DCERP
class class-DCERP
inspect dcerpc
policy-map servers-policy-DCERP
class class-DCERP
inspect dcerpc
And Applied:
service-policy inside-policy-DCERP interface inside
service-policy servers-policy-DCERP interface servers
However, everytime I try and get AD to work across the zone, I get an RPC error.
Does anybody see what's wrong with what I'm trying to do?
11-23-2014 09:33 PM
Hi,
can you do a packet-trace and check what ports are getting denied first.
Thank you
Murali
11-24-2014 07:31 AM
Thanks for the reply.
I've performed a packet trace on Port 135, which should be the port that is used to negotiate the port that communication will occur on. That works fine. I'm not sure how I can simulate the active directory functions since a random port is negotiated after Port 135 is used.
11-24-2014 11:18 PM
Hi ,
I noticed two things 1) There is no application of the inspect type policy map.
where you are calling this policy-map?
policy-map type inspect dcerpc ActiveDirectory
parameters
endpoint-mapper lookup-operation timeout 0:05:00
2) If you go through below link it says " DCERPC inspection only supports communication between an EPM server and clients to open pinholes through the ASA. Clients using RPC communication that does not use an EPM server is not supported with DCERPC inspection."
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/inspect_mgmt.html#wp1478733
HTH
Thanks
07-27-2015 02:48 PM
Had to use Cisco support to resolve the issue. Turns out it was a bug in the software. Updating the ASA fixed the issue.
08-19-2015 07:09 AM
Hello,
Can you please advise what version you were running and what you upgraded to?
Thanks!
08-19-2015 07:12 AM
I think I was on 8.4. We updated it to 9.1.6.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide