06-26-2018 05:30 AM - edited 03-08-2019 03:29 PM
Please help anyone.
I have a Cisco ASA 5520. I need my web server with IP 192.168.200.6 in the DMZ to access my database server with IP 192.168.2.4 in the Inside interface on Port 1433.
I have tried creating an Access Rule for Port 1433 with on luck.
Microsoft SQL Database communicate over port 1433.
How can I do it on ASDM?
Many Thanks.
06-26-2018 06:40 AM
Hello,
You have to create an access rule in the "dmz interface" allowing traffic from de DMZ server to go to the data base server in that port, this should work... you can try allowing also icmp, in order to test the conexion using ping and logging it in the ASDM (this way you can see if traffic is really allowed by the ASA).
Please do not forget to rate useful post.
Best Regards,
06-26-2018 07:30 AM - edited 06-26-2018 07:33 AM
06-26-2018 07:40 AM
Hello!
The rule looks good (assuming sv0005 is the DMZ server and sv0003 is the Database one), Can you show me all the sentences in the interface (show me the rules configured)? maybe this rule is under another one that is blocking all the traffic between that devices, please try to log the session and show me that also, use the logging monitor from the ASDM and gen.
Please do not forget to rate useful post, your rating promotes our participation.
Best Regards,
06-26-2018 08:10 AM
06-26-2018 08:21 AM
Yes, you have an old IOS, however I really think you have to permit icmp traffic (or permit all ip traffic) in the ASA in order to test layer 3 conectivity between the devices (you can restrict the ports you want after doing this test), and also you have to log the session to see If the packets are being dropped and why, and if there are packets with ports different to the ones you permited.
Please do not forget to rate/mark useful post, your rating promotes our participation.
Best Regards,
06-26-2018 08:48 AM
06-27-2018 06:47 AM
On DMZ INSIDE, you should remove line 1, this permits that service to the entire LAN!
Line 2 is correct and should therefore work, are you sure your SQL instance is running on the default port? I also note you are using security groups, are they configured correctly?
If you have SQL Management Studio on the DMZ box, you can connect via this to test connectivity (in addition there is Packet tracer), but as said the logs are your friend here.
Martin
06-28-2018 05:06 AM
07-09-2018 08:40 AM
I believe the issue is that the DMZ ACL is applied outbound, opposed to inbound. Can you change this?
Martin
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide