Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
delslo
Sep 20, 2003

I am in the process of upgrading my home/home office network and I have a thing for good equipment and slight 'overkill.' I was looking at the Pix 501 since I've deployed a few of them. While looking I came across the ASA 5505 and it appears to have a lot of kick rear end features/specs. Also looking in that price range at other entry level "small office" firewalls and none seem to compare (I won't touch the low end watchguards, also not a fan of sonicwall). That said, Has anyone had much experience with the ASA 5505 (or I guess the 5510)? Does it perform well for what it is? Any issues/problems with it?

Thanks!

Adbot
ADBOT LOVES YOU

delslo
Sep 20, 2003

^^ Thanks. none of those restrictions are important to me, so I should be OK. Also, pardon my n00bness, but the 10 user licenses refer to concurrent VPN connections, not devices/users accessing the internets at the same time? If that is how it works, how well does it handle the licenses? The only other concern is how stable the intel/OS X cisco VPN client is these days.

delslo
Sep 20, 2003

update: while troubleshooting a Watchguard Edge device for a client today, I became so annoyed with it and the idea that ANYONE, much less a MANAGER* at my company would recommend such a pile of poo poo to one of our clients... that I placed my order for the ASA 5505 as soon as I got off the phone.

Seriously, you shouldn't have to tell a client that: "when someone in your office can't get to the internet, please power cycle your brand new firewall" (that some rear end in a top hat didn't spec right for you guys) to allow that person to get on (while kicking someone else off)

delslo fucked around with this message at 01:51 on Aug 1, 2007

delslo
Sep 20, 2003

I have 2 questions relating to my ASA5505 that I had posted earlier about getting.

1) Comcast gives me a DHCP public IP, they said they won't offer static to home users. Is there a way/trick/whatever to get port forwarding to work with a dynamic IP on the outside interface? I already have a dyndns.org hostname pointing to the correct IP (updating using the windows client). The guy who was helping me had no clue how to do it because he couldn't just plug the outside IP in. For two examples, I'd like to forward:
Port 3389 to 10.0.1.99
Port 22 to 10.0.1.22

2) I set up VPN using the wizard, installed the OS X client on my Macbook Pro, everything works GREAT. Split tunneling is very nice, 3DES is also nice, the whole thing connects very quickly and access to internal resources is nice and snappy. However, at one of my clients, I'm behind a Pix 515 firewall that has PPTP passthrough enabled and is the endpoint for a handful of site-to-site VPN connections. The issue is this: I can connect to my home VPN from behind the Pix, but I cannot access any resources (ping/RDC/shares/etc.). Any idea where the issue is or what needs to be fixed?

Thanks!

edit: I'd post my running config, but thanks to #2, I can't access the config from here.

delslo
Sep 20, 2003

Girdle Wax posted:

The cisco VPN is not using PPTP, it's using IPSec/L2TP so there's a couple of things to check:
Do you have NAT traversal turned on on _your_ VPN config on the ASA? (Labelled NAT-T I believe in ASDM).
Is the PIX blocking AH or ESP protocols?
I should have clarified, the Pix 515 I'm behind is set up for PPTP Passthrough to a Windows server running Routing and Remote Access. I know, I know, but that's how it's set up.

The ASA is set up to allow NAT traversal.

Thanks guys, I'm going to take a look at the Pix first, if I can get to the ASA from here, I'll make the changes to that as well, if not, I'll have to wait till I get home.

delslo
Sep 20, 2003

Tremblay posted:

There is a bug that was fixed in ASA code. Basically PPTP + PAT == no no in 7.x code. It does work in 6.x but it turned the nat tables into spaghetti. What version of code is on the PIX and what is the ASA running?
Both the Pix and the ASA are running 7.2.

behold, my running config:
code:
: Saved
:
ASA Version 7.2(2) 
!
hostname ciscoasa
domain-name coronabeach.local
enable password <LOLPASSWORD> encrypted
names
name 68.34.60.30 comcast1 description comcast1
ddns update method coronab.dyndns.org
 ddns both
!
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.0.1.1 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ddns update hostname coronab.dyndns.org
 ddns update coronab.dyndns.org
 dhcp client update dns
 ip address dhcp setroute 
!
interface Vlan3
 no nameif
 security-level 50
 no ip address
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd <LOLPASSWORD> encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name coronabeach.local
same-security-traffic permit inter-interface
object-group network VPN-Group
 description VPN Group
 network-object 10.0.2.0 255.255.255.0
access-list coronabeach_splitTunnelAcl standard permit 10.0.1.0 255.255.255.0 
access-list corona_beach_splitTunnelAcl standard permit any 
access-list inside_nat0_outbound extended permit ip any 10.0.2.96 255.255.255.224 
access-list inside_nat0_outbound extended permit ip any 10.0.1.192 255.255.255.224 
access-list C_B_splitTunnelAcl standard permit 10.0.1.0 255.255.255.0 
access-list CB_splitTunnelAcl standard permit any 
access-list cbeach_splitTunnelAcl standard permit any 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool vpnpool 10.0.2.100-10.0.2.120 mask 255.255.255.0
ip local pool VPN_Pool 10.0.1.200-10.0.1.210 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-522.bin
asdm history enable
arp timeout 14400
global (inside) 1 10.0.1.99 netmask 255.0.0.0
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
nat (outside) 1 comcast1 255.255.255.255 outside
static (outside,inside) tcp 10.0.1.22 www comcast1 www netmask 255.255.255.255  dns 
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
group-policy cbeach internal
group-policy cbeach attributes
 dns-server value 10.0.1.22 4.2.2.1
 vpn-tunnel-protocol IPSec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value cbeach_splitTunnelAcl
 default-domain value coronabeach.local
username darwin password <LOLPASSWORD> encrypted privilege 0
username darwin attributes
 vpn-group-policy cbeach
http server enable
http 10.0.1.0 255.255.255.255 inside
http 10.0.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto dynamic-map outside_dyn_map 20 set pfs 
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 40 set pfs 
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 60 set pfs 
crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 80 set pfs 
crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 100 set pfs 
crypto dynamic-map outside_dyn_map 100 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
tunnel-group cbeach type ipsec-ra
tunnel-group cbeach general-attributes
 address-pool VPN_Pool
 default-group-policy cbeach
tunnel-group cbeach ipsec-attributes
 pre-shared-key *
telnet timeout 5
ssh timeout 5
console timeout 0
dhcp-client update dns server both
dhcpd address 10.0.1.100-10.0.1.130 inside
dhcpd dns 4.2.2.1 interface inside
dhcpd domain coronabeach.local interface inside
dhcpd enable inside
!

!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny 
  inspect sunrpc 
  inspect xdmcp 
  inspect sip 
  inspect netbios 
  inspect tftp 
!
service-policy global_policy global
prompt hostname context 
Cryptochecksum:fb00efaf8c0b2658eccdd31c80cff091
: end
asdm image disk0:/asdm-522.bin
asdm history enable
Now I ask you: I am currently on comcrap internets w/ DHCP. I would like to forward ports from outside to inside, for instance:
3389 to 10.0.1.99
32767 to 10.0.1.99 (lol files)
22 to 10.0.1.22

What commands or changes would need to be run to make this happen?

- Is there any way to also punch 1723 through for PPTP VPN? I have a few devices (iPhone) that I can't install the cisco vpn client on? If so, what changes would need to be made?

- I still have the problem accessing devices over the VPN ONLY if I am behind a Pix 515 (also running 7.2). Based on this config, can you guys make any suggestions?

- Anything else that should be cleaned out of this config? I know extra crap got added in troubleshooting.

Thanks!

delslo
Sep 20, 2003

Ray_ posted:

I think a ASA 5505 would fit perfectly for you, but it is probably out of your price range at $450 or so. It does have a few 10/100 ports (that you can VLAN!) and a shitload of pretty cool firewall stuff.

With a cable modem, you need a WIC-1ENET= for a 1700 series. Here's one at PCConnection:
http://www.pcconnection.com/ProductDetail?Sku=223326

You can probably get one for under $100 off ebay, or get a 1700 with one already in for $200 or so.

the ASA 5505 "base package" (10 users, 3DES, etc. etc.) is $391 from newegg... shipped, it comes out to ~$400

delslo
Sep 20, 2003

OK, I've tried this a few times before with no luck, want to resolve this. I've got an ASA5505 running 8.0.3, ASDM 6.1.3. the outside interface is hooked up to a comcast cable modem that gives my ASA a DHCP address. This address is dynamic but it does not change that often. I am trying to do NAT/port forwarding for various services such as http, bit torrent, etc. I've just run the device through the ASDM startup wizard for a quick reset to defaults/quick setup and enable telnet management. I realize that ASDM sucks.

I'm familiar enough with cisco CLI to get into it, run commands that are given to me and understand basically what they are doing, that's about it. Could someone please help me out (list of commands to run/etc. would be most helpful) based on the information below?

-----------
Internal IP: 10.0.1.22
ports: 80 (HTTP); 51413; I can figure the rest out from that

running config:
--
: Saved
:
ASA Version 8.0(3)
!
hostname ciscoasa
domain-name coronabeach.local
enable password LOLPASSWORD encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.0.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd LOLPASSWORD encrypted
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns server-group DefaultDNS
domain-name coronabeach.local
pager lines 24
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-522.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 10.0.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
no crypto isakmp nat-traversal
telnet 10.0.1.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd auto_config outside
!
dhcpd address 10.0.1.2-10.0.1.33 inside
dhcpd enable inside
!

threat-detection basic-threat
threat-detection statistics access-list
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:
: end
asdm image disk0:/asdm-522.bin
no asdm history enable

----------

Thanks in advance. After I get this working, I'll set up VPN aagain.

Adbot
ADBOT LOVES YOU

delslo
Sep 20, 2003

I've been looking around to see if this is possible and haven't found much so wanted to ask here:

I've got an ASA5505 running 8.2(5) that I would like to set up as a VPN client connecting to an OSX 10.7/Lion server's VPN service (L2TP/IPSec). I've got most of the config file for the device done, except for the "connect this ASA to that VPN server" bit.

a) is this setup possible?
b) If it is possible, can someone point me in the right direction towards making this work? The generic config strings would be wonderful.

Thanks!

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply