Hi Folks,
I'm trying to migrate a really simple setup from a PIX 501 (that I keep having to put back into service 'cause I can't get the ASA 5505 to behave the way the PIX does).
The issue is this: on the PIX, I've got common ACL entries that allow access to some basic things like email and web servers. These work fine on the ASA: my web server's visible and email works. But, I also have some less run-of-the-mill things like database query ports or other services on particular boxes. The corresponding ACL entries on the ASA are not adequate to make these work.
As a for instance, the ACL for the PIX includes an entry that exposes TCP/port 2000 to some outside hosts (my business partners use this to get into the box remotely via HTTPS to run an application on the server via a browser). I created the same kind of ACL entry on the ASA, and even though other services work, when I try to connect to this particular service, the web browser just sits there "loading" when trying to do the HTTPS connection. It's clearly something that's different with the ASA vs. the PIX, because I can literally unplug the Internet and inside switch cables from the ASA and connect them to the PIX and everything works again; no changes to any of the servers or the client.
What's odd is that if I sniff the packets on the client machine that's trying to connect through the ASA, it does appear to have done the 3-way handshake--or sometimes 5 of the 6 packet exchanges to complete the handshake; but it doesn't actually connect to the point that the browser puts up the login dialog. I do not get anything shown on the ASA's log indicating there were denied packets.
So, where else do I look? Could this be related to the Filtering function (which the PIX does not have, right)? I'm stuck because I don't know what aspect of the PIX setup needs to be replicated on the ASA--or what aspect of the ASA setup needs attention because it has features that have no counterpart in the PIX's feature set.
This is clearly a subtle problem because we have some other services that require HTTPS that work via the ASA too. And, there are other services that do not work that use high-level TCP protocols other than HTTPS (such as database query protocols). So, the port 2000 HTTPS service that does not work is not unique, it's just one of several that do not flow through the ASA properly, despite looking like they should.
Suggestions gratefully accepted.
I'm trying to migrate a really simple setup from a PIX 501 (that I keep having to put back into service 'cause I can't get the ASA 5505 to behave the way the PIX does).
The issue is this: on the PIX, I've got common ACL entries that allow access to some basic things like email and web servers. These work fine on the ASA: my web server's visible and email works. But, I also have some less run-of-the-mill things like database query ports or other services on particular boxes. The corresponding ACL entries on the ASA are not adequate to make these work.
As a for instance, the ACL for the PIX includes an entry that exposes TCP/port 2000 to some outside hosts (my business partners use this to get into the box remotely via HTTPS to run an application on the server via a browser). I created the same kind of ACL entry on the ASA, and even though other services work, when I try to connect to this particular service, the web browser just sits there "loading" when trying to do the HTTPS connection. It's clearly something that's different with the ASA vs. the PIX, because I can literally unplug the Internet and inside switch cables from the ASA and connect them to the PIX and everything works again; no changes to any of the servers or the client.
What's odd is that if I sniff the packets on the client machine that's trying to connect through the ASA, it does appear to have done the 3-way handshake--or sometimes 5 of the 6 packet exchanges to complete the handshake; but it doesn't actually connect to the point that the browser puts up the login dialog. I do not get anything shown on the ASA's log indicating there were denied packets.
So, where else do I look? Could this be related to the Filtering function (which the PIX does not have, right)? I'm stuck because I don't know what aspect of the PIX setup needs to be replicated on the ASA--or what aspect of the ASA setup needs attention because it has features that have no counterpart in the PIX's feature set.
This is clearly a subtle problem because we have some other services that require HTTPS that work via the ASA too. And, there are other services that do not work that use high-level TCP protocols other than HTTPS (such as database query protocols). So, the port 2000 HTTPS service that does not work is not unique, it's just one of several that do not flow through the ASA properly, despite looking like they should.
Suggestions gratefully accepted.