10-01-2014 02:13 PM - edited 03-11-2019 09:51 PM
I'm attempting to setup a Windows domain to manage our DMZ environments, and am having some issues. Have opened what I believe are the necessary ports to allow a client Windows server in one DMZ (behind our ASA) to access a Windows DC in another DMZ (same ASA), yet the client Server shows an error when you try to add it to the domain (see attached). Here are the ACL entries [scrubbed] between the two DMZ networks:
!--Object groups
object-group service Directory-Services-TCP_SG tcp
port-object eq 135
port-object eq ldaps
port-object eq 3268
port-object eq 3269
port-object eq 5722
port-object eq 9389
port-object eq netbios-ssn
object-group service Directory-Services-UDP_SG udp
port-object eq netbios-dgm
port-object eq netbios-ns
object-group service Directory-Services-TCP-UDP_SG tcp-udp
description Various Active Directory TCP and UDP ports
port-object eq domain
port-object eq 88
port-object eq 389
port-object eq 464
port-object eq 445
object-group service NTP-UDP_SG udp
port-object eq ntp
object-group service Sophos_Ports tcp
port-object eq 8192
port-object eq 8194
port-object eq 445
port-object eq netbios-ssn
port-object eq 135
port-object eq 137
port-object eq www
port-object eq 3268
port-object eq ldap
!--PRD-Mgmt Network (Where DC's live)
access-list PRD-Mgmt_access_in remark Permit DC01 access to 192.168.2.0 via TCP Directory Services
access-list PRD-Mgmt_access_in extended permit tcp host 192.168.1.11 192.168.2.0 255.255.255.128 object-group Directory-Services-TCP_SG
access-list PRD-Mgmt_access_in remark Permit DC01 access to 192.168.2.0 via UDP Directory Services
access-list PRD-Mgmt_access_in extended permit udp host 192.168.1.11 192.168.2.0 255.255.255.128 object-group Directory-Services-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC01 access to 192.168.2.0 via TCP-UDP Directory Services
access-list PRD-Mgmt_access_in extended permit object-group TCPUDP host 192.168.1.11 192.168.2.0 255.255.255.128 object-group Directory-Services-TCP-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC01 access to 192.168.2.0 via NTP
access-list PRD-Mgmt_access_in extended permit udp host 192.168.1.11 192.168.2.0 255.255.255.128 object-group NTP-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC01 access to INT-DC-A via DNS
access-list PRD-Mgmt_access_in extended permit object-group TCPUDP host 192.168.1.11 host 10.1.2.211 eq domain
access-list PRD-Mgmt_access_in remark Permit DC01 access to INT-DC-A via NTP
access-list PRD-Mgmt_access_in extended permit udp host 192.168.1.11 host 10.1.2.211 object-group NTP-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC02 access to 192.168.2.0 via TCP Directory Services
access-list PRD-Mgmt_access_in extended permit tcp host 192.168.1.13 192.168.2.0 255.255.255.128 object-group Directory-Services-TCP_SG
access-list PRD-Mgmt_access_in remark Permit DC02 access to 192.168.2.0 via UDP Directory Services
access-list PRD-Mgmt_access_in extended permit udp host 192.168.1.13 192.168.2.0 255.255.255.128 object-group Directory-Services-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC02 access to 192.168.2.0 via TCP-UDP Directory Services
access-list PRD-Mgmt_access_in extended permit object-group TCPUDP host 192.168.1.13 192.168.2.0 255.255.255.128 object-group Directory-Services-TCP-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC02 access to 192.168.2.0 via NTP
access-list PRD-Mgmt_access_in extended permit udp host 192.168.1.13 192.168.2.0 255.255.255.128 object-group NTP-UDP_SG
access-list PRD-Mgmt_access_in remark Permit DC02 access to INT-DC-A via DNS
access-list PRD-Mgmt_access_in extended permit object-group TCPUDP host 192.168.1.13 host 10.1.2.211 eq domain
access-list PRD-Mgmt_access_in remark Permit DC02 access to INT-DC-A via NTP
access-list PRD-Mgmt_access_in extended permit udp host 192.168.1.13 host 10.1.2.211 object-group NTP-UDP_SG
access-list PRD-Mgmt_access_in extended permit icmp 192.168.1.0 255.255.255.128 host 10.1.1.100
access-list PRD-Mgmt_access_in remark Permit 192.168.1.0 access to Sophos for Sophos communication
access-list PRD-Mgmt_access_in extended permit tcp 192.168.1.0 255.255.255.128 host 10.1.1.100 object-group Sophos_Ports
access-list PRD-Mgmt_access_in remark Permit 192.168.1.0 access to 192.168.2.0 via ICMP
access-list PRD-Mgmt_access_in extended permit icmp 192.168.1.0 255.255.255.128 192.168.2.0 255.255.255.128
!--PRD-App Network (Where client Servers live)
access-list PRD-App_access_in remark Permit 192.168.2.0 access to DC01 via TCP Directory Services
access-list PRD-App_access_in extended permit tcp 192.168.2.0 255.255.255.128 host 192.168.1.11 object-group Directory-Services-TCP_SG
access-list PRD-App_access_in remark Permit 192.168.2.0 access to DC01 via UDP Directory Services
access-list PRD-App_access_in extended permit udp 192.168.2.0 255.255.255.128 host 192.168.1.11 object-group Directory-Services-UDP_SG
access-list PRD-App_access_in remark Permit 192.168.2.0 access to DC01 via TCP-UDP Directory Services
access-list PRD-App_access_in extended permit object-group TCPUDP 192.168.2.0 255.255.255.128 host 192.168.1.11 object-group Directory-Services-TCP-UDP_SG
access-list PRD-App_access_in remark Permit 192.168.2.0 access to DC02 via TCP Directory Services
access-list PRD-App_access_in extended permit tcp 192.168.2.0 255.255.255.128 host 192.168.1.13 object-group Directory-Services-TCP_SG
access-list PRD-App_access_in remark Permit 192.168.2.0 access to DC02 via UDP Director Services
access-list PRD-App_access_in extended permit udp 192.168.2.0 255.255.255.128 host 192.168.1.13 object-group Directory-Services-UDP_SG
access-list PRD-App_access_in remark Permit 192.168.2.0 access to DC02 via TCP-UDP Directory Services
access-list PRD-App_access_in extended permit object-group TCPUDP 192.168.2.0 255.255.255.128 host 192.168.1.13 object-group Directory-Services-TCP-UDP_SG
access-list PRD-App_access_in extended permit udp 192.168.2.0 255.255.255.128 host 192.168.1.11 object-group NTP-UDP_SG
access-list PRD-App_access_in extended permit udp 192.168.2.0 255.255.255.128 host 192.168.1.13 object-group NTP-UDP_SG
access-list PRD-App_access_in remark Permit 192.168.2.0 access to Sophos for Sophos communication
access-list PRD-App_access_in extended permit tcp 192.168.2.0 255.255.255.128 host 10.1.1.100 object-group Sophos_Ports
access-list PRD-App_access_in remark Permit 192.168.2.0 access to 192.168.1.0 via ICMP
access-list PRD-App_access_in extended permit icmp 192.168.2.0 255.255.255.128 192.168.1.0 255.255.255.128
Solved! Go to Solution.
10-02-2014 12:39 AM
run a packet tracer on the ASA and see where the packet is being dropped...if at all.
packet-tracer input tcp <DMZ PC interface> 12345 <DMZ DC interface> 53 detail
packet-tracer input udp <DMZ PC interface> 12345 <DMZ DC interface> 53 detail
--
Please remember to select a correct answer and rate helpful posts
10-02-2014 12:39 AM
run a packet tracer on the ASA and see where the packet is being dropped...if at all.
packet-tracer input tcp <DMZ PC interface> 12345 <DMZ DC interface> 53 detail
packet-tracer input udp <DMZ PC interface> 12345 <DMZ DC interface> 53 detail
--
Please remember to select a correct answer and rate helpful posts
10-02-2014 08:37 AM
Found the problem!! Was related to an issue with DCERPC on the ASA, and the creation of a class-map to allow the Windows RPC process to function as needed.
This blog explains the steps necessary to fix this issue:
http://clintboessen.blogspot.com/2011/06/allowing-domain-membership-through.html
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide