Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Access List allow outbound HTTPS

Status
Not open for further replies.

kevmullet

Technical User
Feb 12, 2002
56
GB
Hello,

I have been given the task of securing out ASA 5505 to only allow outbound HTTP and HTTPS traffic. (so machines on the inside interface can only browse web traffic)

I have done the below and it works a treat for the HTTP traffic but not for the HTTPS. Everything else outbound is blocked as we want it but HTTPS traffic does not work either. My guess is its something to do with the handshake, but I can't quite figure it out.

Any help appreciated




: Saved
:
ASA Version 7.2(2)
!
hostname ASA
domain-name XXX
enable password y/Pr2LedIYfv7ya4 encrypted
names
!
interface Ethernet0/0
nameif outside
security-level 50
ip address XXXX 255.255.255.248
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
passwd 4wIEQrQMzMQLJXYV encrypted
banner exec ******************************************************************
banner exec * WARNING *
banner exec IF YOU ARE NOT AUTHORISED TO ACCESS THIS SYSTEM EXIT IMMEDIATELY
banner exec Unauthorised users are subject to criminal and civil penalties
banner exec as well as company initiated disciplinary proceedings.
banner exec By entry into this system you acknowledge that you are
banner exec authorised to access it and have the level of privilege at which
banner exec you subsequently operate on this system. You consent by entry
banner exec into this system to the monitoring of your activities.
banner exec ******************************************************************
banner login ******************************************************************
banner login * WARNING *
banner login IF YOU ARE NOT AUTHORISED TO ACCESS THIS SYSTEM EXIT IMMEDIATELY
banner login Unauthorised users are subject to criminal and civil penalties
banner login as well as company initiated disciplinary proceedings.
banner login By entry into this system you acknowledge that you are
banner login authorised to access it and have the level of privilege at which
banner login you subsequently operate on this system. You consent by entry
banner login into this system to the monitoring of your activities.
banner login ******************************************************************
banner motd ******************************************************************
banner motd * WARNING *
banner motd IF YOU ARE NOT AUTHORISED TO ACCESS THIS SYSTEM EXIT IMMEDIATELY
banner motd Unauthorised users are subject to criminal and civil penalties
banner motd as well as company initiated disciplinary proceedings.
banner motd By entry into this system you acknowledge that you are
banner motd authorised to access it and have the level of privilege at which
banner motd you subsequently operate on this system. You consent by entry
banner motd into this system to the monitoring of your activities.
banner motd ******************************************************************
ftp mode passive
clock timezone GMT/BST 0
clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00
dns server-group DefaultDNS
domain-name XXX
access-list OUTSIDE_ACL extended permit tcp host x.x.x.x host x.x.x.x eq 3389 inactive
access-list inside_access_in extended permit tcp 192.168.1.0 255.255.255.0 eq eq www
access-list inside_access_in extended permit tcp 192.168.1.0 255.255.255.0 eq https any eq https
access-list inside_access_in extended permit tcp host 192.168.1.230 any
pager lines 24
mtu outside 1500
mtu inside 1500
no failover
monitor-interface outside
monitor-interface inside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-522.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
global (inside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
access-group inside_access_in in interface inside
access-group OUTSIDE_ACL in interface outside
route outside 0.0.0.0 0.0.0.0 XXX 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
username XXX password akJlbe8uQBYwbSIm encrypted privilege 15
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
no service password-recovery
telnet timeout 5
ssh timeout 5
console timeout 10
!
!
prompt hostname context
Cryptochecksum:d085abd75dd08dc67f416307026907d6
: end
asdm image disk0:/asdm-522.bin
no asdm history enable
 
Change these

access-list inside_access_in extended permit tcp 192.168.1.0 255.255.255.0 eq eq www
access-list inside_access_in extended permit tcp 192.168.1.0 255.255.255.0 eq https any eq https


to

access-list inside_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq www
access-list inside_access_in extended permit tcp 192.168.1.0 255.255.255.0 any eq https


Brent
Systems Engineer / Consultant
CCNP, CCSP
 
Ah! because the ports in to the internal interface are not always going to be on port 80!

Thanks very much
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top