10-08-2015 06:10 AM - edited 03-11-2019 11:43 PM
HI There,
We are setting up a DMZ for our VPS Virtual Machines.
We have our esxi host behind the firewall on 192.168.1.101
Our VMs internally are all working fine.
Our issue is we want to create VPS VMs with a static public IP address on the DMZ. We have a public ip address assigned on the DMZ ( 12.12.12.13 ) and on our VM we have assigned another IP address ( 12.12.12.14 with a Gateway of 12.12.12.13 ).
We have setup acl for the DMZ to allow any as we want to use IPtables on the VPS machines.
We cannot seem to get this to work so what are we doing wrong?
We want to setup a number of VPS machines with static ip addresses and use the DMZ interface for this type of traffic.
Are we on the right track or have we missed something??
Thank you in advance
Solved! Go to Solution.
10-08-2015 06:24 AM
Hi,
- Are you able to ping the ASA DMZ interface (12.12.12.13) IP from your host?
- Also what kind of traffic you are testing?(what is the traffic flow - from where you are initiating)
- As i could understand that you are now using the third vlan (one is inside, one is outside and this is DMZ) , could you please check the output of 'show activation-key' and see if it says 3 vlans, DMZ restricted?
- If you are testing with icmp traffic, have you permitted the return traffic on outside interface or run the command in global mode 'fixup protocol icmp'
- Also if all are set then could you please provide the output of :
"packet-tracer input DMZ tcp 12.12.12.14 12345 4.2.2.2 80 detail"
Regards,
Akshay Rastogi
10-13-2015 09:47 AM
Hi,
Again you are using a wrong packet-tracer. Please watch the interface you are using for the input packet. You are using interface as DMZ but initiating a traffic from the host of Outside interface.
Please use the link below to understand the captures :
https://supportforums.cisco.com/document/69281/asa-using-packet-capture-troubleshoot-asa-firewall-configuration-and-scenarios
Also, I do not see any arp entry for VM .50. These are the only present ARP entry :
fw-001# sh arp
outside 216.245.198.73 000d.bcf3.e580 125
inside cPanel-VM-Internal 000c.2969.2b58 407
inside ESXi-Host-Internal 0050.5669.b82b 508
inside Tes-VM 000c.29ce.4a2d 993
DMZ 69.162.90.49 000d.bcf3.e580 8
So please check connectivity for your VM to DMZ interface. ASA is fine at this point of time. I don't see any issue with ASA configuration as of now.
Regards,
Akshay Rastogi
10-08-2015 06:24 AM
Hi,
- Are you able to ping the ASA DMZ interface (12.12.12.13) IP from your host?
- Also what kind of traffic you are testing?(what is the traffic flow - from where you are initiating)
- As i could understand that you are now using the third vlan (one is inside, one is outside and this is DMZ) , could you please check the output of 'show activation-key' and see if it says 3 vlans, DMZ restricted?
- If you are testing with icmp traffic, have you permitted the return traffic on outside interface or run the command in global mode 'fixup protocol icmp'
- Also if all are set then could you please provide the output of :
"packet-tracer input DMZ tcp 12.12.12.14 12345 4.2.2.2 80 detail"
Regards,
Akshay Rastogi
10-08-2015 06:28 AM
OK. I will provide these outputs now
10-08-2015 06:30 AM
fw-001# packet-tracer input DMZ tcp 69.162.90.50 12345 4.2.2.2 80 detail
Phase: 1
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 outside
Phase: 3
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x415d038, priority=11, domain=permit, deny=true
hits=1671, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Result:
input-interface: dmz-VPS
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
10-08-2015 06:44 AM
Hi,
Thanks for the output.
First thing here is that you have only two fully functional Vlans. To enable the third vlan which would be able to initiate only in one direction.
"With the Base license, the third VLAN can only be configured to initiate traffic to one other VLAN. You limit the third VLAN using the no forward interface command".
This means if you want to have communication between DMZ and Outside then you need to configure 'no forward interface <inside-vlan>'. Please configure this and test.
Also provide the access-list you have configure and placed on DMZ interface and Outside Interface
Also provide the output of 'show run policy-map'.
Regards,
Akshay Rastogi
10-08-2015 06:48 AM
Hi,
Thanks for the response.
The no forward interface command needs to be run on vlan2 yes?
10-08-2015 06:50 AM
Hi,
If you want to have communication of DMZ host to only Outside host (not Inside) then 'no forward interface <inside-interface vlan>.
Regards,
Akshay Rastogi
10-08-2015 06:54 AM
fw-001# conf t
fw-001(config)# no forward interface vlan11
^
ERROR: % Invalid input detected at '^' marker.
It seems that command does not work
10-08-2015 06:59 AM
Hi,
I am sorry. I forgot to mention that it is an interface based command.
You need to configure this command under the DMZ vlan interface.
For clear understanding, use the link below:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/int5505.html#wp1051819
Regards,
Akshay Rastogi
10-08-2015 07:02 AM
hi,
If it is already configured then remove access-group from DMZ vlan interface(bydefault it allows all the traffic from High Security level to low).
It is the access-list issue then(it has not given any license error in packet-tracer).
Regards,
Akshay Rastogi
10-08-2015 07:12 AM
Hi,
I do not know what you mean by "remove access-group from DMZ vlan interface"
I have attached our ACL via ADSM and the network object in the DMZ ( VPS-Customers ) has a public ip of the VPS Machine.
I believe we do not need to setup anything in inside or outside interfaces so why is traffic trying to go out the outside interface?
Yes it seems to be an ACL issue but where??
10-08-2015 07:42 AM
Hi,
I think there is a misunderstanding. I had asked in the starting what is the communication flow(from where it is initiating and to what destination(behind which interface of ASA) it is going.
From the snapshot, i could see that you have configured destination as VPC-customer. So where is this VPC-customer subnet?
Packet-tracer is a way to create a dumy packet and sent through ASA. The example was for host coming from the subnet of DMZ to 4.2.2.2(it is a google server ip) which lies behind Outside Interface.
Please explain in detail what is the communication flow.
Regards,
Akshay Rastogi
10-08-2015 07:54 AM
The traffic flow should be from the internet to the DMZ interface which has an IP of 69.162.90.49. The VPS-Customer object in the DMZ has a public IP of 69.162.90.50.
The DMZ subnet VPS customer is a VM on an ESXi host that I want to be able to bypass the access rules on the ASA and manage the VPS-customer VM firewall via iptables.
To explain further:-
I have an ESXi Host
An ASA Firewall
There are three VMs on the ESXi Host
Two VMs are setup with NAT and are working fine on the inside interface
The third VM has a public IP address and is also on the ESXi Host but this VM needs to use the DMZ ( VPS-customer) and not use the firewall rules of the other VMs. I want to allow 'Any" on the DMZ and also come in and out via the DMZ. Is this how it works or does it still need to go out via the outside interface?
I have made a quick net diagram.
10-08-2015 08:08 AM
Hi,
Thanks for the detailed explanation.
We need to understand that traffic is by default allowed from High security zone interface to low(return traffic is allowed). Vice versa is not allowed(initiated from lower security zone until there is an access-list configured on the lower interface to allow the traffic).
- Now in your case traffic is initiated form Outside (which is a lower security zone) then you need to allow traffic with access-list source from outside host(any) to your server IP for TCP or IP traffic(whatever is your profile) and apply it on Outside interface(you have already configured access-list on Outside, you can just add one more entry to allow the traffic as mentioned above).
- Also your access-list on DMZ is wrong as VPC-customer is already behind DMZ so this network object should be source not destination(you have configured) and destination should be any(configure specific destination IP on Internet if you are aware of).
Please let me know if you have any query.
Regards,
Akshay Rastogi
10-08-2015 09:19 AM
I have made those changes and ran the packet tracer....Traffic still gets blocked by the implicit rule....I am pulling my hair out
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide