Hello All,
I'm completely stumped by a problem I'm having with an "edge" connection between us ourselves and a customer and wonder if anyone can see why.
Here's the gist:
We have a Pix 506e at the edge of our network, plugged virtually back-to-back with our customers firewall.
Our Firewall Outside Int = 192.168.27.1
Cust Firewall Outside Int = 192.168.27.2
They have an AS400 inside their WAN that connects to an IPDS print server inside ours.
AS400 appears to us as translated address 192.168.27.22
They connect to translated address 192.168.28.22
A week ago, printing stopped working. Both parties claim not to have changed config on their respective firewalls.
I've done some packet capture and it looks like the AS400 and the print server start, but never finish their TCP/IP negotiation. It looks like this:
1. The AS400 sends a TCP SYN to 192.168.28.22
2. Firewall translates correctly and I see the packet traverse our WAN
3. The print controller sees the TCP SYN and generates a SYN ACK for 192.168.27.22
4. I can see this packet reach the inside interface of our Pix506e
5. It doesn't seem to traverse the firewall. Our customer swears blind he's not seeing the returning traffic and eventually both sides give up and issue TCP RST. But only AFTER I see the SYN ACK hit the inside interface of our firewall.
Here's the config:
FWXXXXXXXXXX(config)# sh conf
: Saved
: Written by enable_15 at 15:39:59.989 UTC Wed Sep 21 2005
PIX Version 6.3(3)
interface ethernet0 10full
interface ethernet1 100basetx
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password aOZCVVhxvp5Yy4dG encrypted
passwd aOZCVVhxvp5Yy4dG encrypted
hostname FWXXXXXXXXXX
domain-name XXXXXXXXXXX
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit icmp any any
access-list acl_out permit ip host 192.168.29.1 host 192.168.28.22
access-list acl_out permit ip host 192.168.27.2 host 192.168.28.22
access-list acl_out permit ip host 192.168.27.22 host 192.168.28.22
access-list acl_out permit tcp host 192.168.27.22 host 192.168.28.22
pager lines 24
logging on
logging trap debugging
logging host inside 10.10.1.31
logging host inside 10.10.3.123
logging host inside 10.10.1.90
mtu outside 1500
mtu inside 1500
ip address outside 192.168.27.1 255.255.255.0
ip address inside 10.10.10.18 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 192.168.28.1-192.168.28.200
nat (inside) 1 10.10.39.20 255.255.255.255 0 0
nat (inside) 1 10.10.1.0 255.255.255.0 0 0
nat (inside) 1 10.10.3.0 255.255.255.0 0 0
nat (inside) 1 10.10.7.0 255.255.255.0 0 0
nat (inside) 1 10.10.10.0 255.255.255.0 0 0
nat (inside) 1 10.10.22.0 255.255.255.0 0 0
nat (inside) 1 10.10.39.0 255.255.255.0 0 0
nat (inside) 1 10.10.0.0 255.255.0.0 0 0
static (inside,outside) 192.168.28.10 10.10.10.19 netmask 255.255.255.255 0 0
static (inside,outside) 192.168.28.22 10.10.39.20 netmask 255.255.255.255 0 0
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.27.2 1
route inside 10.10.0.0 255.255.0.0 10.10.10.19 1
route outside 192.168.0.0 255.255.0.0 192.168.27.2 1
route outside 192.168.29.0 255.255.255.0 192.168.27.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 10.10.0.0 255.255.0.0 inside
telnet timeout 20
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:471d9b655ccc19adc65d099cb7c23622
FWXXXXXXXXXX(config)#
I know there are some overlapping rules, very lazy I know, but I've reached the end of my knowledge here and have been trying anything and everything to get it working.
Any help very much appreciated.
Thanks.
I'm completely stumped by a problem I'm having with an "edge" connection between us ourselves and a customer and wonder if anyone can see why.
Here's the gist:
We have a Pix 506e at the edge of our network, plugged virtually back-to-back with our customers firewall.
Our Firewall Outside Int = 192.168.27.1
Cust Firewall Outside Int = 192.168.27.2
They have an AS400 inside their WAN that connects to an IPDS print server inside ours.
AS400 appears to us as translated address 192.168.27.22
They connect to translated address 192.168.28.22
A week ago, printing stopped working. Both parties claim not to have changed config on their respective firewalls.
I've done some packet capture and it looks like the AS400 and the print server start, but never finish their TCP/IP negotiation. It looks like this:
1. The AS400 sends a TCP SYN to 192.168.28.22
2. Firewall translates correctly and I see the packet traverse our WAN
3. The print controller sees the TCP SYN and generates a SYN ACK for 192.168.27.22
4. I can see this packet reach the inside interface of our Pix506e
5. It doesn't seem to traverse the firewall. Our customer swears blind he's not seeing the returning traffic and eventually both sides give up and issue TCP RST. But only AFTER I see the SYN ACK hit the inside interface of our firewall.
Here's the config:
FWXXXXXXXXXX(config)# sh conf
: Saved
: Written by enable_15 at 15:39:59.989 UTC Wed Sep 21 2005
PIX Version 6.3(3)
interface ethernet0 10full
interface ethernet1 100basetx
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password aOZCVVhxvp5Yy4dG encrypted
passwd aOZCVVhxvp5Yy4dG encrypted
hostname FWXXXXXXXXXX
domain-name XXXXXXXXXXX
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names
access-list acl_out permit icmp any any
access-list acl_out permit ip host 192.168.29.1 host 192.168.28.22
access-list acl_out permit ip host 192.168.27.2 host 192.168.28.22
access-list acl_out permit ip host 192.168.27.22 host 192.168.28.22
access-list acl_out permit tcp host 192.168.27.22 host 192.168.28.22
pager lines 24
logging on
logging trap debugging
logging host inside 10.10.1.31
logging host inside 10.10.3.123
logging host inside 10.10.1.90
mtu outside 1500
mtu inside 1500
ip address outside 192.168.27.1 255.255.255.0
ip address inside 10.10.10.18 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1 192.168.28.1-192.168.28.200
nat (inside) 1 10.10.39.20 255.255.255.255 0 0
nat (inside) 1 10.10.1.0 255.255.255.0 0 0
nat (inside) 1 10.10.3.0 255.255.255.0 0 0
nat (inside) 1 10.10.7.0 255.255.255.0 0 0
nat (inside) 1 10.10.10.0 255.255.255.0 0 0
nat (inside) 1 10.10.22.0 255.255.255.0 0 0
nat (inside) 1 10.10.39.0 255.255.255.0 0 0
nat (inside) 1 10.10.0.0 255.255.0.0 0 0
static (inside,outside) 192.168.28.10 10.10.10.19 netmask 255.255.255.255 0 0
static (inside,outside) 192.168.28.22 10.10.39.20 netmask 255.255.255.255 0 0
access-group acl_out in interface outside
route outside 0.0.0.0 0.0.0.0 192.168.27.2 1
route inside 10.10.0.0 255.255.0.0 10.10.10.19 1
route outside 192.168.0.0 255.255.0.0 192.168.27.2 1
route outside 192.168.29.0 255.255.255.0 192.168.27.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
telnet 10.10.0.0 255.255.0.0 inside
telnet timeout 20
ssh timeout 5
console timeout 0
terminal width 80
Cryptochecksum:471d9b655ccc19adc65d099cb7c23622
FWXXXXXXXXXX(config)#
I know there are some overlapping rules, very lazy I know, but I've reached the end of my knowledge here and have been trying anything and everything to get it working.
Any help very much appreciated.
Thanks.