pix 515E - acl

Discussion in 'Cisco' started by Mika Hanner, Jun 11, 2005.

  1. Mika Hanner

    Mika Hanner Guest

    I had following configuration but for example web connection was
    impossible. When I removed
    "
    access-group acl_outside in interface outside
    access-group acl_inside in interface inside
    "
    everything start working. What is wrong ?

    regards
    Mika



    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    nameif ethernet2 intf2 security4
    clock timezone GMT 0
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol icmp error
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    access-list compiled
    access-list acl_inside permit tcp 10.0.0.0 255.255.255.0 any eq www
    access-list acl_inside permit tcp 10.0.0.0 255.255.255.0 any eq ftp
    access-list acl_inside permit tcp host 10.0.0.3 any eq pop3
    access-list acl_inside permit tcp 10.0.0.0 255.255.255.0 any eq smtp
    access-list acl_inside permit icmp 10.0.0.0 255.255.255.0 any
    access-list acl_inside permit tcp 10.0.0.0 255.255.255.0 any eq https
    access-list acl_inside permit tcp host 10.0.0.12 any eq 3389
    access-list acl_inside deny tcp any any
    access-list acl_inside deny udp any any
    access-list acl_outside permit icmp any any
    access-list acl_outside permit tcp any host 22.205.22.21 eq pop3
    pager lines 24
    logging on
    logging timestamp
    logging buffered errors
    logging trap warnings
    mtu outside 1500
    mtu inside 1500
    mtu intf2 1500
    ip address outside 22.205.22.21 255.255.255.252
    ip address inside 10.0.0.1 255.255.255.0
    no ip address intf2
    ip verify reverse-path interface outside
    ip audit info action alarm
    ip audit attack action alarm
    pdm logging informational 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 1 10.0.0.0 255.255.255.0 0 0
    static (inside,outside) tcp 22.205.22.21 pop3 10.0.0.3 pop3 netmask
    255.255.255.255 0 0
    access-group acl_outside in interface outside
    access-group acl_inside in interface inside
    route outside 0.0.0.0 0.0.0.0 22.205.22.20 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225
    1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server TACACS+ max-failed-attempts 3
    aaa-server TACACS+ deadtime 10
    aaa-server RADIUS protocol radius
    aaa-server RADIUS max-failed-attempts 3
    aaa-server RADIUS deadtime 10
    aaa-server LOCAL protocol local
    aaa authentication ssh console LOCAL
    aaa authentication telnet console LOCAL
    http server enable
    snmp-server host inside 10.0.0.1
    no snmp-server location
    no snmp-server contact
    snmp-server community RO
    snmp-server enable traps
    floodguard enable
    telnet timeout 5
    ssh timeout 5
    console timeout 0
    Mika Hanner, Jun 11, 2005
    #1
    1. Advertising

  2. Mika Hanner

    Chris Guest

    "Mika Hanner" <> wrote in message
    news:d8ebpv$fa7$...
    >I had following configuration but for example web connection was
    >impossible. When I removed
    > "
    > access-group acl_outside in interface outside
    > access-group acl_inside in interface inside
    > "
    > everything start working. What is wrong ?
    >


    Maybe because you didn't allow DNS requests out from the LAN.

    Chris.
    Chris, Jun 11, 2005
    #2
    1. Advertising

  3. Mika Hanner

    Guest

    If you don't remove outside access-list , and you only remove inside
    access-list ....does it still cause the problem ?
    , Jun 11, 2005
    #3
  4. Mika Hanner

    Mika Hanner Guest

    Chris wrote:
    > "Mika Hanner" <> wrote in message
    > news:d8ebpv$fa7$...
    >
    >>I had following configuration but for example web connection was
    >>impossible. When I removed
    >>"
    >>access-group acl_outside in interface outside
    >>access-group acl_inside in interface inside
    >>"
    >>everything start working. What is wrong ?
    >>

    >
    >
    > Maybe because you didn't allow DNS requests out from the LAN.
    >
    > Chris.
    >


    I did it but situation is the same.
    Mika Hanner, Jun 11, 2005
    #4
  5. Mika Hanner

    Mika Hanner Guest

    wrote:
    > If you don't remove outside access-list , and you only remove inside
    > access-list ....does it still cause the problem ?
    >

    yes
    Mika Hanner, Jun 11, 2005
    #5
  6. Mika Hanner

    Chris Guest

    "Mika Hanner" <> wrote in message
    news:d8eob5$bia$...
    > Chris wrote:
    >> "Mika Hanner" <> wrote in message
    >> news:d8ebpv$fa7$...
    >>
    >>>I had following configuration but for example web connection was
    >>>impossible. When I removed
    >>>"
    >>>access-group acl_outside in interface outside
    >>>access-group acl_inside in interface inside
    >>>"
    >>>everything start working. What is wrong ?
    >>>

    >>
    >>
    >> Maybe because you didn't allow DNS requests out from the LAN.
    >>
    >> Chris.
    >>

    >
    > I did it but situation is the same.


    So, when you look at the syslog information when it;s not working, what you
    do see? If it works with no access list but not with the access list then
    the security rules are blocking 'something'. If that is the case then you
    will see an entry in syslog telling you what is blocked to where and on what
    port. Can you ping out via IP address. Can you resolve DNS? Can you send a
    DNS query to a DNS server using nslookup?

    Chris.

    Chris.
    Chris, Jun 11, 2005
    #6
  7. Mika Hanner

    Mika Hanner Guest

    Mika Hanner wrote:
    > wrote:
    >
    >> If you don't remove outside access-list , and you only remove inside
    >> access-list ....does it still cause the problem ?
    >>

    > yes


    Now I know what the problem was. I created rule
    for DNS based on TCP protocol. I changed it to UDP
    and the problem has been resolved.
    Mika Hanner, Jun 14, 2005
    #7
    1. Advertising

Want to reply to this thread or ask your own question?

It takes just 2 minutes to sign up (and it's free!). Just click the sign up button to choose a username and then you can ask your own questions on the forum.
Similar Threads
  1. Ian
    Replies:
    2
    Views:
    563
  2. Shad T
    Replies:
    0
    Views:
    614
    Shad T
    Jun 29, 2004
  3. Dustin
    Replies:
    3
    Views:
    632
    Matty M
    Nov 8, 2005
  4. Romeo
    Replies:
    1
    Views:
    466
    Walter Roberson
    Mar 20, 2006
  5. Vimokh
    Replies:
    3
    Views:
    5,668
    Vimokh
    Sep 6, 2006
Loading...

Share This Page