04-27-2016 06:20 AM - edited 03-05-2019 03:54 AM
I have two firewalls in separate networks (FW1 and FW2), need to have both provide access for Windows Active Directory (in each network) to trust each domain controller on each side so they can communicate to both windows networks. Any assistance on the firewall configuration is much appreciated. Further info will be provided as needed.
04-27-2016 07:12 AM
You need to allow tcp/udp ports for Active Directory on Firewall.
Below ports are use for Active Directory communication
TCP and UDP 389
TCP 636
TCP 3268
TCP 3269
TCP and UDP 88
TCP and UDP 53
TCP and UDP 445
TCP 25
TCP 135
TCP 5722
UDP 123
TCP and UDP 464
UDP 138
TCP 9389
UDP 67 and UDP 2535
UDP 137
TCP 139
Suppose FW1 has network 10.10.10.0/24 and FW has 120.20.20.0/24 then your both firewall ACL configuration would be as below
Object-group Network Allow_FW1_Network
network-object 10.10.10.0 255.255.255.0
Object-group Network Allow_FW2_Network
network-object 20.20.20.0 255.255.255.0
object-group service AD_TCP tcp
port-object eq 389
port-object eq 636
port-object eq 3268
port-object eq 3269
port-object eq 88
port-object eq 53
port-object eq 445
port-object eq 25
port-object eq 135
port-object eq 5722
port-object eq 123
port-object eq 464
port-object eq 9389
port-object eq 139
object-group service AD_UDP udp
port-object eq 389
port-object eq 88
port-object eq 53
port-object eq 445
port-object eq 123
port-object eq 464
port-object eq 138
port-object eq 9389
port-object eq 67
port-object eq 2535
port-object eq 137
!
access-list TestACL extended permit tcp object-group Allow_FW1_Network object-group Allow_FW2_Network object-group AD_TCP
access-list TestACL extended permit udp object-group Allow_FW1_Network object-group Allow_FW2_Network object-group AD_UDP
access-list TestACL extended permit tcp object-group Allow_FW2_Network object-group Allow_FW1_Network object-group AD_TCP
access-list TestACL extended permit udp object-group Allow_FW2_Network object-group Allow_FW1_Network object-group AD_UDP
!
Please free to ask me if you need any help on this. Please rate the post if you find it useful.
Regards,
Pawan (CCIE 52104)
04-27-2016 08:30 AM
Thanks for your reply Pawan, however I see error after the changes made that the Object-group "Allow_FW1_Network" is empty. What is supposed to be in that group? Which network?
04-27-2016 09:09 AM
Hi you should configure the object-group Allow_FW1_Network and Allow_FW2_Network First
You to have allowed the network which is behind FW1 in object group Allow_FW1_Network and network behind FW2 in the group Allow_FW2_Network. Check your Firewall syntax for object-group configuration.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide