09-07-2019 10:28 AM - edited 09-07-2019 10:40 AM
Trying, through ongoing research and troubleshooting, to configure an ASA5525 running version 9.8(2) to allow bidirectional traffic from two ESXi 6.7 VMs from an UCS C240 M5 through the ASA to a remote server that “telnet <DNS Name> 443” from my laptop receives a response from, but not ping as it is configured to be restricted on the remote side, and that the two VMs currently have HTTPS access to through the COMM server switch the UCS is currently directly connected to.
Besides configuring the firewall to allow access for the additional required "mandatory” ports for ESXi as well as for LDAP port 636, I have started by just trying to configure and verify port 443 HTTPS bidirectional traffic from the UCS VMs through the firewall to the remote server but no access list and otherwise configuration variation on the firewall that I keep believing to be true from repeated research is allowing a successful telnet response from the firewall.
Attached is the current show run configuration of the ASA5525 with the following access lists that allows ICMP to work but not tcp,
access-list INBOUND extended permit icmp any any echo-reply
access-list INBOUND extended permit tcp host <Remote Server IP> host 172.18.151.0 eq https
access-list INBOUND extended permit tcp host <Remote Server IP> host 192.168.0.0 eq https
access-list OUTBOUND extended permit icmp any any echo
access-list OUTBOUND extended permit icmp any any time-exceeded
access-list OUTBOUND extended permit tcp host 172.18.151.0 host <Remote Server IP> eq https
access-list OUTBOUND extended permit tcp host 192.168.0.0 host <Remote Server IP> eq https
and results in,
ASA# packet-tracer input outside tcp 172.18.151.171 443 <Remote Server IP> detailed
Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 172.18.151.1 using egress ifc outside
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x2aaac8bb82d0, priority=501, domain=permit, deny=true
hits=30, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=172.18.151.171, mask=255.255.255.255, port=0, tag=any
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0
input_ifc=outside, output_ifc=any
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
ASA#
and since I am unsure how to telnet for an ASA, also tried,
ASA# ping tcp
Interface: outside
Target IP address: <Remote Server IP>
Destination port: [80] 443
Specify source? [n]: y
Source IP address: 172.18.151.171
Source port: [0]
Repeat count: [5]
Timeout in seconds: [2]
Type escape sequence to abort.
Sending 5 TCP SYN requests to <Remote Server IP> port 443
from 172.18.151.171, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)
ASA#
and previously altered configuration to try with what I believe would be more specifically with,
access-list OUTBOUND extended permit tcp host <Remote Server IP> host 172.18.151.<cimc> eq https
access-list OUTBOUND extended permit tcp host <Remote Server IP> host 172.18.151.<vm1> eq https
access-list OUTBOUND extended permit tcp host <Remote Server IP> host 172.18.151.<vm2> eq https
access-list INBOUND extended permit tcp 172.18.151.171 255.255.255.0 any eq https
and may be more broadly with,
access-list INBOUND extended permit tcp any any eq https
access-list INBOUND extended permit tcp 172.0.0.0 255.0.0.0 any eq https
access-list OUTBOUND extended permit tcp 172.0.0.0 255.0.0.0 any eq https
with neither giving favorable results.
So, any feedback that may provide further clarity about progressing through this issue would be greatly appreciated.
Solved! Go to Solution.
09-07-2019 11:39 AM
Hi,
You should run packet-tracer from inside to outside, not from the IP address of the ASA.
E.g. - "packet-tracer input inside tcp 192.168.0.5 3000 <remote ip> 443"
That being said, your ACL is referencing a host 192.168.0.0 not a network/subnet. This is probably what you require:-
access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host <Remote Server IP> eq https
The ACL is used for traffic going through the ASA, not originating from it, the network 172.18.151.0 is the outside network of the ASA and shouldn't need to be in the ACL.
HTH
09-07-2019 11:39 AM
Hi,
You should run packet-tracer from inside to outside, not from the IP address of the ASA.
E.g. - "packet-tracer input inside tcp 192.168.0.5 3000 <remote ip> 443"
That being said, your ACL is referencing a host 192.168.0.0 not a network/subnet. This is probably what you require:-
access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host <Remote Server IP> eq https
The ACL is used for traffic going through the ASA, not originating from it, the network 172.18.151.0 is the outside network of the ASA and shouldn't need to be in the ACL.
HTH
09-13-2019 10:46 AM - edited 09-13-2019 10:47 AM
Yeah that corrected it, much appreciated and if the domain name that the <Remote Server IP> has been behind was configured in the access list instead, since the IP address may alter over time, the configuration would change, with the listed public DNS server to start since no private DNS server on hand, to the following or similar?
dns domain-lookup outside
DNS server-group DefaultDNS
name-server 4.2.2.2
object network obj-<Domain Name>
fqdn <domain Name>
access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host obj-<domain Name> eq https
that currently results in,
ASA(config)# access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255$
access-list OUTBOUND extended permit tcp 192.168.0.0 255.255.255.0 host <Domain
^Name> eq https
ERROR: % Invalid input detected at '^' marker.
ASA(config)# $ed permit tcp 192.168.0.0 255.255.255.0 host ?
configure mode commands/options:
A.B.C.D Destination host IPv4 address
X:X:X:X::X Destination host IPv6 address
ACVP(config)# $ed permit tcp 192.168.0.0 255.255.255.0 host
as further further research continues.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide