06-12-2014 11:08 AM - edited 03-11-2019 09:19 PM
Hi Guys,
I am running two ASA at two different sites, with versions 8.4(5) and 8.2(3).
I have inside users with a client-software having issue connecting to a third part site, which runs a specific application requires, some ports open for their application to work correctly.
I was told by the their party vendor: "If you are connecting from a personal computer that is behind a corporate firewall, the following ports should be opened:"
|
I guess, I have to create a class, ACL and inspect them under the "policy-map global_policy".
Does anyone knows the full syntax, what need to be created as per above bullet points requirement?
Thanks in advance.
Rizwan Rafeek.
06-13-2014 04:15 AM
Hi Rizwan,
I beleive ACL and NAT alone will be enough for this requirement. If needed you can have the Qos for the specified traffic.
Sample config:
object-group service <Name> tcp
port-object eq 443
port-object eq 17992
port-object eq 17990
!
on your inside interface binded ACL ( Outbound)
access-list <outbound> permit tcp < LAN Subnet> <Mask> 66.xxx.46.0 255.255.255.0 object-group <Name of the Object Group>
access-list <outbound> permit udp < LAN Subnet> <Mask> 66.xxx.46.0 255.255.255.0 range 50000 53000
!
on your outside interface binded ACL ( inbound)
access-list <inbound> permit tcp 66.xxx.46.0 255.255.255.0 < LAN Subnet> <Mask> object-group <Name of the Object Group>
access-list <inbound> permit udp 66.xxx.46.0 255.255.255.0 < LAN Subnet> <Mask> range 50000 53000
!
Hope this helps
Regards
Karthik
06-14-2014 12:12 PM
Hi Karthik,
Thank you for taking the time to responding this thread.
There is a dynamic nat already in place for internal users to access Internet, therefore there is no need for permit-line required on the outside interface on any direction for that matter. This solution has been based on correctly inspecting the traffic via the globe policy.
Thanks
Rizwan
06-14-2014 09:31 PM
Hi Rizwan,
I agree with you. But for video conferencing and some other apps will require to be allowed vice versa. Because the traffic can be initiated from both the ends.
If you want inspect to happen for these specific requirement from customer. Then you can have an access-list and map it to the class-map following with mapping that class-map to the policy-map.
http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/inspect.html#wp1435177
Regards
Karthik
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide