08-02-2017 01:18 PM - edited 03-08-2019 11:35 AM
Client is in need of using his other interfaces as DMZs. We found that ping and smb were allowed from the DMZ2, and I'm fairly certain this is because Global Rules are used with any any for a given network, even though there are interface specific access rules; it's simply ignoring for the global:
access-list global_access extended permit ip 192.168.0.0 255.255.255.0 any
and
access-list global_access extended permit ip 192.168.2.0 255.255.255.0 any
LAN is 192.168.0.0 and DMZ2 is 192.168.2.0
Just confirming that we can just change the global access lists above from ANY to the WAN interface to allow traffic outbound for those rules, and the other global access lists below, to allow an internal network (LAN, or any DMZ) to traverse outbound to the internet. Maybe it's better we drop all these global access lists and only use Interface specific access lists.
Finally, it seems we need to remove the "same-security-traffic permit intra-interface" command to prevent the DMZs at sec level 50 from passing traffic between as well. While we can make each DMZ different sec levels, higher levels would still have access to the lower, and they simply do not want any interface of LAN or DMZ to be able to access each other unless explicitly allowed with an access list, or obviously there is no DMZ.
Your input and help is greatly appreciated.
PS ASA5515x doesn't allow for DHCP reservations? Haven't checked command line yet, but ASDM gui doesn't offer.
Config follows:
ASA Version 8.6(1)2
!
hostname somehostname
domain-name domain.local
enable password encrypted
passwd encrypted
names
!
interface GigabitEthernet0/0
nameif WAN
security-level 0
ip address w1.w1.124.34 255.255.255.252
!
interface GigabitEthernet0/1
nameif LAN
security-level 100
ip address 192.168.0.253 255.255.255.0
!
interface GigabitEthernet0/2
nameif DMZ2
security-level 50
ip address 192.168.2.1 255.255.255.0
!
interface GigabitEthernet0/3
nameif DMZ3
security-level 50
ip address 192.168.3.1 255.255.255.0
!
interface GigabitEthernet0/4
nameif DMZ4
security-level 50
ip address 192.168.4.1 255.255.255.0
!
interface GigabitEthernet0/5
nameif DMZ5
security-level 50
ip address 192.168.254.1 255.255.255.0
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
boot system disk0:/asa861-2-smp-k8.bin
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup WAN
dns domain-lookup LAN
dns domain-lookup DMZ2
dns domain-lookup DMZ5
dns domain-lookup management
dns server-group DefaultDNS
name-server ns1.ns1.ns1.ns1
name-server ns2.ns2.ns2.ns2
domain-name domain.local
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network gwava_smtp
host 192.168.0.252
object network gwava_123
host 192.168.0.252
object network gwava_ssh
host 192.168.0.252
object network sanderling_https
host 192.168.0.241
object service gwavaRAS
service tcp destination eq 49282
object service sandRAS
service tcp destination eq 6523
object network gwava_ras
host 192.168.0.252
object network sanderling_ras
host 192.168.0.241
object service SSLvpn
service tcp destination eq 6666
object network NETWORK_OBJ_192.168.168.0_26
subnet 192.168.168.0 255.255.255.192
object network NETWORK_OBJ_192.168.0.0_24
subnet 192.168.0.0 255.255.255.0
object network sanderling_https_nat
host 192.168.0.241
object network RSAPort5500
host 192.168.0.254
description RSA
object network RSAport7004
host 192.168.0.254
description RSA
object network RSAport7072
host 192.168.0.254
description RSA
object network WAN
host w1.w1.124.34
object network RSAServer
host 192.168.0.254
object service 7004
service tcp source eq 7004
object network RSAport7004_1
host 192.168.0.254
object network LANVPN_Network
subnet 192.168.168.0 255.255.255.0
description VPN Clients
object network Merganser
host 192.168.0.240
description Merganser DNS
object network musconetcong
host 192.168.0.235
description RDS RDWeb
object network ISP_STATIC_1
host w2.w2.244.241
object network LAN_HOST_1
host 192.168.0.241
object network ISP_STATIC_2
host w3.w3.244.242
object-group network BLOCKLIST
network-object host b1.b1.b1.b1
network-object host b2.b2.b2.b2
object-group service RDP tcp
description Remote Desktop
port-object eq 3389
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group network HTTPS_Hosts_via_VPN
description OWA and RDWeb
network-object object musconetcong
network-object object sanderling_https
access-list WAN_access_in_1 extended permit udp any host 192.168.0.254 eq 5500
access-list WAN_access_in_1 extended permit tcp any host 192.168.0.254 eq 7072
access-list WAN_access_in_1 extended permit tcp any host 192.168.0.254 eq 7004
access-list WAN_access_in_1 extended permit tcp any object gwava_smtp eq smtp
access-list WAN_access_in_1 extended permit udp any object gwava_123 eq ntp
access-list WAN_access_in_1 extended permit tcp any object gwava_ssh eq ssh inactive
access-list WAN_access_in_1 extended permit tcp any object sanderling_https eq https
access-list WAN_access_in_1 extended permit tcp any object gwava_ras eq 49282 inactive
access-list WAN_access_in_1 extended permit object SSLvpn any any
access-list WAN_access_in_1 extended deny ip object-group BLOCKLIST any
access-list VPN_Tunnel_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0
access-list global_access extended permit tcp 192.168.0.0 255.255.255.0 any eq www
access-list global_access extended permit ip 192.168.0.0 255.255.255.0 any
access-list global_access extended permit object-group TCPUDP object Merganser any eq domain
access-list global_access extended permit tcp object LANVPN_Network 192.168.0.0 255.255.255.0 object-group RDP
access-list global_access extended permit object-group TCPUDP object LANVPN_Network 192.168.0.0 255.255.255.0 eq domain
access-list global_access remark allow access to RDS RDWeb
access-list global_access extended permit tcp object LANVPN_Network object-group HTTPS_Hosts_via_VPN eq https
access-list global_access extended permit ip 192.168.2.0 255.255.255.0 any
access-list global_access extended permit tcp 192.168.2.0 255.255.255.0 any eq domain
access-list global_access extended permit ip 192.168.254.0 255.255.255.0 any
access-list global_access extended permit object-group TCPUDP 192.168.254.0 255.255.255.0 any eq domain
access-list global_access extended permit ip 192.168.3.0 255.255.255.0 any
access-list global_access extended permit object-group TCPUDP 192.168.3.0 255.255.255.0 any eq domain
access-list DMZ2_access_out extended permit ip any any
access-list DMZ2_access_out extended permit tcp any any eq www
access-list DMZ2_access_out extended permit tcp any any eq domain
access-list DMZ3_access_out extended permit ip any any
access-list DMZ3_access_out extended permit tcp any any eq www
access-list DMZ3_access_out extended permit object-group TCPUDP any any eq domain
pager lines 24
logging enable
logging buffer-size 20000
logging buffered debugging
logging asdm informational
mtu WAN 1500
mtu LAN 1500
mtu DMZ2 1500
mtu DMZ5 1500
mtu management 1500
mtu DMZ3 1500
mtu DMZ4 1500
ip local pool VPN_POOL 192.168.168.1-192.168.168.50 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-66114.bin
no asdm history enable
arp timeout 14400
nat (LAN,WAN) source static RSAport7004_1 interface service 7004 7004
nat (LAN,WAN) source static NETWORK_OBJ_192.168.0.0_24 NETWORK_OBJ_192.168.0.0_24 destination static NETWORK_OBJ_192.168.168.0_26 NETWORK_OBJ_192.168.168.0_26
!
object network gwava_smtp
nat (LAN,WAN) static interface service tcp smtp smtp
object network gwava_123
nat (LAN,WAN) static interface service udp ntp ntp
object network gwava_ssh
nat (LAN,WAN) static interface service tcp ssh ssh
object network gwava_ras
nat (LAN,WAN) static interface service tcp 49282 49282
object network NETWORK_OBJ_192.168.168.0_26
nat (WAN,WAN) dynamic interface
object network sanderling_https_nat
nat (LAN,WAN) static interface service tcp https https
object network RSAPort5500
nat (LAN,WAN) static interface service udp 5500 5500
object network RSAport7072
nat (LAN,WAN) static interface service tcp 7072 7072
object network LAN_HOST_1
nat (LAN,WAN) static ISP_STATIC_1 service tcp 3389 3389
!
nat (LAN,WAN) after-auto source dynamic any interface
nat (DMZ2,WAN) after-auto source dynamic any interface
nat (DMZ3,WAN) after-auto source dynamic any ISP_STATIC_2
nat (DMZ5,WAN) after-auto source dynamic any interface
access-group WAN_access_in_1 in interface WAN
access-group DMZ2_access_out out interface DMZ2
access-group DMZ3_access_out out interface DMZ3
access-group global_access global
route WAN 0.0.0.0 0.0.0.0 w1.w1.124.33 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server RSA_Group protocol radius
aaa-server RSA_Group (LAN) host 192.168.0.254
key *****
radius-common-pw *****
no mschapv2-capable
user-identity default-domain LOCAL
http server enable 4443
http 192.168.0.0 255.255.255.0 LAN
http 0.0.0.0 0.0.0.0 LAN
http 0.0.0.0 0.0.0.0 WAN
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
no sysopt connection permit-vpn
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev2 ipsec-proposal AES256
protocol esp encryption aes-256
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
protocol esp encryption aes-192
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
protocol esp encryption aes
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
protocol esp encryption des
protocol esp integrity sha-1 md5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map WAN_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map WAN_map interface WAN
crypto map LAN_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map LAN_map interface LAN
crypto ca trustpoint ASDM_TrustPoint0
enrollment self
subject-name CN=somename
ip-address w1.w1.124.34
crl configure
crypto ca trustpoint ASDM_TrustPoint1
crl configure
crypto ca trustpoint ASDM_TrustPoint2
keypair ASDM_TrustPoint2
crl configure
crypto ca trustpoint ASDM_TrustPoint2-1
crl configure
crypto ca certificate chain ASDM_TrustPoint0
certificate bba8a458
quit
crypto ca certificate chain ASDM_TrustPoint2
certificate ca 03eda3eb6eca75c888438b724bcfbc91
quit
certificate 56072c9e13a41991cf66ec21cd5567c0
quit
crypto ca certificate chain ASDM_TrustPoint2-1
certificate ca 064ee056904246b1a1756ac95991c74a
quit
crypto ikev2 policy 1
encryption aes-256
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 10
encryption aes-192
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 20
encryption aes
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 30
encryption 3des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 policy 40
encryption des
integrity sha
group 5 2
prf sha
lifetime seconds 86400
crypto ikev2 enable WAN client-services port 4043
crypto ikev2 enable LAN client-services port 4043
crypto ikev2 remote-access trustpoint ASDM_TrustPoint2
crypto ikev1 enable WAN
crypto ikev1 enable LAN
crypto ikev1 policy 10
authentication crack
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 40
authentication crack
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 70
authentication crack
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 100
authentication crack
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 130
authentication crack
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
telnet 0.0.0.0 0.0.0.0 LAN
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 LAN
ssh timeout 5
console timeout 0
management-access LAN
dhcpd address 192.168.0.100-192.168.0.149 LAN
dhcpd dns 192.168.0.240 interface LAN
dhcpd domain domain.internal interface LAN
dhcpd enable LAN
!
dhcpd address 192.168.2.50-192.168.2.99 DMZ2
dhcpd dns ns1.ns1.ns1.ns1 ns2.ns2.ns2.ns2 interface DMZ2
dhcpd enable DMZ2
!
dhcpd address 192.168.254.50-192.168.254.99 DMZ5
dhcpd dns ns1.ns1.ns1.ns1 ns2.ns2.ns2.ns2 interface DMZ5
dhcpd enable DMZ5
!
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
dhcpd address 192.168.3.50-192.168.3.99 DMZ3
dhcpd dns ns1.ns1.ns1.ns1 ns2.ns2.ns2.ns2 interface DMZ3
dhcpd enable DMZ3
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp authenticate
ntp server 192.168.0.240 source LAN prefer
ssl encryption 3des-sha1 aes128-sha1 aes256-sha1 des-sha1
ssl trust-point ASDM_TrustPoint2 WAN
ssl trust-point ASDM_TrustPoint2 LAN
webvpn
port 6666
enable WAN
enable LAN
dtls port 4043
anyconnect image disk0:/anyconnect-win-4.4.01054-webdeploy-k9.pkg 1
anyconnect image disk0:/anyconnect-macos-4.4.01054-webdeploy-k9.pkg 2
anyconnect profiles Default_client_profile disk0:/Default_client_profile.xml
anyconnect enable
tunnel-group-list enable
tunnel-group-preference group-url
group-policy VPN_Tunnel internal
group-policy VPN_Tunnel attributes
wins-server none
dns-server value 192.168.0.240 ns1.ns1.ns1.ns1
vpn-idle-timeout 90
vpn-session-timeout 420
vpn-tunnel-protocol ikev1 ikev2 ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPN_Tunnel_splitTunnelAcl
default-domain value domain.internal
group-policy DfltGrpPolicy attributes
banner value You are connected.
vpn-tunnel-protocol ikev1 ikev2 ssl-clientless
group-policy GroupPolicy_Default internal
group-policy GroupPolicy_Default attributes
wins-server none
dns-server value 192.168.0.240 ns1.ns1.ns1.ns1
vpn-tunnel-protocol ikev2 ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPN_Tunnel_splitTunnelAcl
default-domain value domain.internal
webvpn
anyconnect profiles value Default_client_profile type user
tunnel-group VPN_Tunnel type remote-access
tunnel-group VPN_Tunnel general-attributes
address-pool VPN_POOL
authentication-server-group RSA_Group LOCAL
default-group-policy VPN_Tunnel
tunnel-group VPN_Tunnel ipsec-attributes
ikev1 pre-shared-key ********************
tunnel-group Default type remote-access
tunnel-group Default general-attributes
address-pool VPN_POOL
authentication-server-group RSA_Group
default-group-policy VPN_Tunnel
tunnel-group Default webvpn-attributes
group-alias Default enable
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:fefe992ed11ea5f192f887b7924a8f4b
: end
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide