09-19-2024 08:58 PM
Dear All,
In one of our IPSEC VPN , We are having issues in FTP, when client is trying to access a FTP server in AWS cloud. while having captures and system trace we found that at snort ,the route lookup is not taking correct egress zone instead it takes the same ingress zone as egress.
Starting rule matching, zone 4 -> 4, geo 0 -> 0, vlan 0, src sgt: 0, src sgt type: unknown, dst sgt: 0, dst sgt type: unknown, user 9999997, no url or host, no xff
Matched rule ids 268454094 - Allow
The correct zone mapping should be: 4 -> 5.
Again from the packet debugs I can basically confirm that Snort is selecting the wrong egress zone:
Packet details: asa_flow_id(45021582) conn_meta_id(1588393) ingress_meta(8) ingress_index(5) ingress_group(1) egress_meta(8) egress_index(5) egress_group(1) asid(0)
These IDs should be different.
It works if we bypass the snort with pre-filter and also if we have action trust on the policy instead of allow. But we are suppose to keep it as allow and go through the snort inspection.
Do you have any workarounds or fix for this..?
It takes the FMC Auto Generated NAT Exempt rule from VPN Topology, instead of a exempt rule which we created.
09-20-2024 02:12 AM
The VPN end in your FTD or in router behind FTD
MHM
09-23-2024 12:29 AM
It is on the FTD.And it has the auto generated NAT exemption on FTD.
09-22-2024 12:05 PM
it appears you're experiencing an issue with zone mapping and routing in your IPSec VPN setup for FTP traffic between a client and an AWS-hosted FTP server. some potential solutions:
Problem
Potential Solutions
1. Review and Adjust Zone Configuration
Ensure that your zones are correctly configured in your Firepower Management Center (FMC). Double-check the interface assignments and make sure they are mapped to the correct security zones.
2. Modify Access Control Policy
Review your access control policy and ensure that the rules are correctly configured to use the appropriate zones for ingress and egress traffic.
3. Custom NAT Exempt Rule
Create a more specific custom NAT exempt rule for your VPN traffic that takes precedence over the auto-generated rule. Ensure this rule correctly specifies the source and destination zones.
4. Policy Reorder
Check the order of your NAT and access control policies. Make sure your custom rules are placed above the auto-generated rules to ensure they are evaluated first.
5. Snort Configuration
Review your Snort configuration to ensure it's correctly identifying and processing the zones. You may need to update or reconfigure Snort rules related to zone handling.
6. Firepower Threat Defense (FTD) Upgrade
If you're running an older version of FTD, consider upgrading to the latest version. Newer versions often include bug fixes and improvements in traffic handling and zone mapping.
Logging and Monitoring: Enable detailed logging for your VPN and FTP traffic to gather more information about how packets are being processed.
Traffic Flow Analysis: Use packet capture tools on both ends of the VPN to analyze the complete traffic flow and identify where exactly the routing issue occurs.
AWS Configuration: Verify that your AWS VPC and security group configurations are correctly set up to allow the FTP traffic from your VPN.
09-23-2024 01:34 AM
Thanks for your detailed analysis and potential solutions, we have bypassed the snort with Prefilter rules and it worked. Also the same was achieved if we change the Action from allow to trust in the ACP. So the problem presides with Snort engine, we will have the try of creating custom NAT.
Could you get me the steps for removing the Auto NAT exemption from VPN and apply the custom NAT
09-23-2024 02:20 AM
- Source: Your local VPN network
- Destination: Remote VPN network
- Source Translation: Original
Destination Translation: Original
Place this rule at the top of your NAT policy to ensure it's evaluated first.
09-23-2024 02:35 AM - edited 09-23-2024 02:42 AM
It not NAT issue,
You need for VPN traffic using ACP trust to bypass the traffic from inspect by snort.
Or you can use option ACP bypass in vpn ipsec.
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide