Asa 5505 port fowarding

Mettete al sicuro la vostra rete!

Moderatore: Federico.Lagni

Rispondi
paulg
n00b
Messaggi: 1
Iscritto il: ven 23 apr , 2010 10:49 pm

Ciao a tutti,premetto che non son un esperto di firewall ASA 5505e volevo chiedere aiuto a qualcuno perche non riesco a far funzionare dall'esterno remote desktop,ne ftp ecc... all'inizio funzionava dopo ha smesso da solo,se lo spegnevo ripartiva ma dopo un po di tempo smetteva ulteriomente. Vi allego la conf.
Grazie x un eventuale aiuto.
ASA Version 7.2(4)
!
hostname ciscoasa
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.0.0.196 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 217.193.xxx.xxx 255.255.255.248
!
interface Vlan3
no forward interface Vlan1
nameif dmz
security-level 50
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
dns server-group DefaultDNS
domain-name default.domain.invalid
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group service TerminalServer tcp
port-object eq 3389
object-group service TCP3306 tcp
port-object eq 3306
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group service port83 tcp-udp
port-object eq 83
access-list outside_access_in extended permit icmp any 217.193.xxx.xxx 255.255.255.248
access-list outside_access_in extended permit object-group TCPUDP any 217.193.xxx.xxx 255.255.255.248 object-group port83
access-list outside_access_in extended permit tcp any 217.193.xxx.xxx
255.255.255.248 eq 3306
access-list outside_access_in extended permit tcp any 217.193.xxx.xxx255.255.255.248 eq ftp

access-list outside_access_in extended permit tcp any interface outside eq 3389
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 83 10.0.0.27 83 netmask 255.255.255.255
static (inside,outside) tcp interface 3389 10.0.0.27 3389 netmask 255.255.255.25
5
static (inside,outside) tcp interface 3306 10.0.0.27 3306 netmask 255.255.255.25
5
static (inside,outside) tcp interface ftp 10.0.0.27 ftp netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 217.193.xxx.xxx 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
http server enable
http 0.0.0.0 0.0.0.0 inside
http 192.168.10.0 255.255.255.0 inside
http 10.0.0.0 255.255.255.0 inside
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet 10.0.0.0 255.255.255.0 inside
telnet 192.168.10.0 255.255.255.0 inside
telnet 0.0.0.0 0.0.0.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config inside
!
dhcpd dns 164.128.36.34 164.128.36.39 interface inside
!

!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:beb87021d8924526d0ebda3db12e77d0
: end
ciscoasa#
marco.giuliani
Cisco fan
Messaggi: 42
Iscritto il: mar 06 ott , 2009 8:40 am
Località: Roma

Ciao,
prova intanto a semplificare un po' la configurazione.

Non usare gli object-group se devi indicare una sola porta: nelle acl indica direttamente la porta del servizio.

Anziché quattro regole di nat statico

Codice: Seleziona tutto

static (inside,outside) tcp interface 83 10.0.0.27 83 netmask 255.255.255.255
static (inside,outside) tcp interface 3389 10.0.0.27 3389 netmask 255.255.255.25
5
static (inside,outside) tcp interface 3306 10.0.0.27 3306 netmask 255.255.255.25
5
static (inside,outside) tcp interface ftp 10.0.0.27 ftp netmask 255.255.255.255 
mettine una sola

Codice: Seleziona tutto

 static (inside, outside) interface 10.0.0.27

ciao
Rispondi