Comptx
asked on
ASA 5505 blocking OWA
Hello, ive had this issue for a while now, and cannot find the answer anywhere..
After moving my mail server behind the ASA 5505, i can no longer access owa from my windows mobile phone. worked before the asa was there, so it must be something with the ASA 5505 thats causing it.
here is the asa config..
thanks for any help....
: Saved
:
ASA Version 7.2(3)
!
hostname comptx
domain-name comptx.com
enable password NuLKvvWGg.x9HEKO encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.200.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 99.188.*.* 255.255.255.248
!
interface Vlan3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
dns server-group DefaultDNS
domain-name comptx.com
access-list outside_1_cryptomap extended permit ip host 99.188.*.* host 75.144.*.*
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 host 75.144.*.*
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list rdp-capture extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any host 99.188.*.* eq https
access-list outside_access_in extended permit tcp any host 99.188.*.* eq smtp
access-list outside_access_in extended permit tcp any host 99.188.*.* eq smtp
access-list outside_access_in extended permit tcp any host 99.188.*.* eq pptp
access-list outside_access_in extended permit udp any host 99.188.*.* eq isakmp
access-list outside_access_in extended permit udp any host 99.188.*.* eq 4500
access-list outside_access_in extended permit tcp any host 99.188.*.* eq www
access-list inside_nat0_outbound extended permit ip host 99.188.*.* host 75.144.*.*
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 host 75.144.*.*
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list 100 extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
pager lines 24
logging enable
logging monitor debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 99.188.*.*-99.188.*.*
global (outside) 1 99.188.*.*
global (outside) 1 99.188.*.*
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp 99.188.*.* https 10.200.1.44 https netmask 255.255.255.255
static (inside,outside) tcp 99.188.*.* smtp 10.200.1.44 smtp netmask 255.255.255.255
static (inside,outside) tcp 99.188.*.*www 10.200.1.44 www netmask 255.255.255.255
static (inside,outside) 99.188.*.* 10.200.1.5 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 99.188.*.* 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.200.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 75.144.*.*
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect pptp
!
service-policy global_policy global
tunnel-group 75.144.*.* type ipsec-l2l
tunnel-group 75.144.*.* ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:79f51a1f4f4 45040fbaee a0ac165497 5
: end
asdm image disk0:/asdm-523.bin
no asdm history enable
After moving my mail server behind the ASA 5505, i can no longer access owa from my windows mobile phone. worked before the asa was there, so it must be something with the ASA 5505 thats causing it.
here is the asa config..
thanks for any help....
: Saved
:
ASA Version 7.2(3)
!
hostname comptx
domain-name comptx.com
enable password NuLKvvWGg.x9HEKO encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.200.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 99.188.*.* 255.255.255.248
!
interface Vlan3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
dns server-group DefaultDNS
domain-name comptx.com
access-list outside_1_cryptomap extended permit ip host 99.188.*.* host 75.144.*.*
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 host 75.144.*.*
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list rdp-capture extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any host 99.188.*.* eq https
access-list outside_access_in extended permit tcp any host 99.188.*.* eq smtp
access-list outside_access_in extended permit tcp any host 99.188.*.* eq smtp
access-list outside_access_in extended permit tcp any host 99.188.*.* eq pptp
access-list outside_access_in extended permit udp any host 99.188.*.* eq isakmp
access-list outside_access_in extended permit udp any host 99.188.*.* eq 4500
access-list outside_access_in extended permit tcp any host 99.188.*.* eq www
access-list inside_nat0_outbound extended permit ip host 99.188.*.* host 75.144.*.*
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 host 75.144.*.*
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list 100 extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
pager lines 24
logging enable
logging monitor debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 99.188.*.*-99.188.*.*
global (outside) 1 99.188.*.*
global (outside) 1 99.188.*.*
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp 99.188.*.* https 10.200.1.44 https netmask 255.255.255.255
static (inside,outside) tcp 99.188.*.* smtp 10.200.1.44 smtp netmask 255.255.255.255
static (inside,outside) tcp 99.188.*.*www 10.200.1.44 www netmask 255.255.255.255
static (inside,outside) 99.188.*.* 10.200.1.5 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 99.188.*.* 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.200.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 75.144.*.*
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect pptp
!
service-policy global_policy global
tunnel-group 75.144.*.* type ipsec-l2l
tunnel-group 75.144.*.* ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:79f51a1f4f4
: end
asdm image disk0:/asdm-523.bin
no asdm history enable
ASKER
yes, .44 is the mail server. OWA works if you access it from any computer, but not from the phone like it used to.
ill try your command.
ill try your command.
ASKER
STS, if i use that command i can no longer access OWA from any computer, and still didnt work on mobile phone.
Can you post the config again but include the real last octet of the public IP addresses.
ASKER
here you go, JF.
: Saved
:
ASA Version 7.2(3)
!
hostname *
domain-name *
enable password u1N2uiTOMgtVzzpC encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.200.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 99.*.*.43 255.255.255.248
!
interface Vlan3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd u1N2uiTOMgtVzzpC encrypted
ftp mode passive
dns server-group DefaultDNS
domain-name *
access-list outside_1_cryptomap extended permit ip host 99.*.*.43 host 75.*.*.225
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 host 75.*.*.225
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list rdp-capture extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq https
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq smtp
access-list outside_access_in extended permit tcp any host 99.*.*.45 eq smtp
access-list outside_access_in extended permit tcp any host 99.*.*.45 eq pptp
access-list outside_access_in extended permit udp any host 99.*.*.45 eq isakmp
access-list outside_access_in extended permit udp any host 99.*.*.45 eq 4500
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq www
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 2776
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 1719
access-list outside_access_in extended permit tcp any host 10.200.1.191 range 3230 3243
access-list outside_access_in extended permit udp any host 10.200.1.191 range 3230 3285
access-list outside_access_in extended permit udp any host 10.200.1.191 eq 1719
access-list outside_access_in extended permit tcp any host 10.200.1.191 range 3230 3285
access-list outside_access_in extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any eq 3389 interface outside eq 3389
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 3389
access-list outside_access_in extended permit tcp any host 99.*.*.41 eq 3389
access-list inside_nat0_outbound extended permit ip host 99.*.*.43 host 75.*.*.225
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 host 75.*.*.225
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list 100 extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list outside_in extended permit tcp any host 99.*.*.41 eq 3389
pager lines 24
logging enable
logging monitor debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 99.*.*.41 netmask 255.255.255.255
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp 99.*.*.44 smtp 10.200.1.44 smtp netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.44 www 10.200.1.44 www netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.44 https 10.200.1.44 https netmask 255.255.255.255
static (inside,outside) tcp interface 2776 10.200.1.191 2776 netmask 255.255.255.255
static (inside,outside) tcp interface 1719 10.200.1.191 1719 netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.41 3389 10.200.1.191 3389 netmask 255.255.255.255
static (inside,outside) 99.*.*.45 10.200.1.5 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 99.*.*.46 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.200.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 75.*.*.225
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet 10.200.1.5 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
console timeout 0
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect pptp
!
service-policy global_policy global
username admin password 3ETJzDL4hW/jJ62O encrypted
tunnel-group 75.*.*.225 type ipsec-l2l
tunnel-group 75.*.*.225 ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:e241c9425e9 981f6bdeb6 88d46c9040 4
: end
asdm image disk0:/asdm-523.bin
no asdm history enable
: Saved
:
ASA Version 7.2(3)
!
hostname *
domain-name *
enable password u1N2uiTOMgtVzzpC encrypted
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.200.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 99.*.*.43 255.255.255.248
!
interface Vlan3
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd u1N2uiTOMgtVzzpC encrypted
ftp mode passive
dns server-group DefaultDNS
domain-name *
access-list outside_1_cryptomap extended permit ip host 99.*.*.43 host 75.*.*.225
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 host 75.*.*.225
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list rdp-capture extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq https
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq smtp
access-list outside_access_in extended permit tcp any host 99.*.*.45 eq smtp
access-list outside_access_in extended permit tcp any host 99.*.*.45 eq pptp
access-list outside_access_in extended permit udp any host 99.*.*.45 eq isakmp
access-list outside_access_in extended permit udp any host 99.*.*.45 eq 4500
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq www
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 2776
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 1719
access-list outside_access_in extended permit tcp any host 10.200.1.191 range 3230 3243
access-list outside_access_in extended permit udp any host 10.200.1.191 range 3230 3285
access-list outside_access_in extended permit udp any host 10.200.1.191 eq 1719
access-list outside_access_in extended permit tcp any host 10.200.1.191 range 3230 3285
access-list outside_access_in extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any eq 3389 interface outside eq 3389
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 3389
access-list outside_access_in extended permit tcp any host 99.*.*.41 eq 3389
access-list inside_nat0_outbound extended permit ip host 99.*.*.43 host 75.*.*.225
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 host 75.*.*.225
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list 100 extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list outside_in extended permit tcp any host 99.*.*.41 eq 3389
pager lines 24
logging enable
logging monitor debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 99.*.*.41 netmask 255.255.255.255
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp 99.*.*.44 smtp 10.200.1.44 smtp netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.44 www 10.200.1.44 www netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.44 https 10.200.1.44 https netmask 255.255.255.255
static (inside,outside) tcp interface 2776 10.200.1.191 2776 netmask 255.255.255.255
static (inside,outside) tcp interface 1719 10.200.1.191 1719 netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.41 3389 10.200.1.191 3389 netmask 255.255.255.255
static (inside,outside) 99.*.*.45 10.200.1.5 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 99.*.*.46 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.200.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 75.*.*.225
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet 10.200.1.5 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
console timeout 0
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect pptp
!
service-policy global_policy global
username admin password 3ETJzDL4hW/jJ62O encrypted
tunnel-group 75.*.*.225 type ipsec-l2l
tunnel-group 75.*.*.225 ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:e241c9425e9
: end
asdm image disk0:/asdm-523.bin
no asdm history enable
Well, if OWA works from the outside using a PC but not from the mobile device the ASA config is working. However you can enable logging on the ASA and attempt a connection to see if it sheds any light...
conf t
logging buffer debug
Attempt a connection from the mobile device and keep using the following command on the ASA until you see log entries:
show log | i x.x.x.x
Where x.x.x.x is the IP of the mobile device.
conf t
logging buffer debug
Attempt a connection from the mobile device and keep using the following command on the ASA until you see log entries:
show log | i x.x.x.x
Where x.x.x.x is the IP of the mobile device.
ASKER
i get
Result of the command: "logging buffer debug"
ERROR: % Ambiguous command: "logging buffer debug"
when i try command
Result of the command: "logging buffer debug"
ERROR: % Ambiguous command: "logging buffer debug"
when i try command
Sorry:
conf t
logging buffered debug
conf t
logging buffered debug
ASKER
the ip of the device is 208.54.14.51 according to whatsmyip site.
Do you see any log entries matching that IP when attempting to connect?
show log | i 208.54.14.51
show log | i 208.54.14.51
ASKER
i do not see it
ASKER
actually, im getting these 3 entries whenever i press send/receive on the phone
6 Apr 01 2009 14:00:23 302013 208.54.14.115 10.200.1.44 Built inbound TCP connection 2167 for outside:208.54.14.115/5599 9 (208.54.14.115/55999) to inside:10.200.1.44/80 (99.*.*.44/80)
6 Apr 01 2009 14:00:25 302014 208.54.14.115 10.200.1.44 Teardown TCP connection 2167 for outside:208.54.14.115/5599 9 to inside:10.200.1.44/80 duration 0:00:01 bytes 2370 TCP FINs
2 Apr 01 2009 14:00:26 106001 203.187.176.172 99.188.67.41 Inbound TCP connection denied from 203.187.176.172/25 to 99.*.*.41/1577 flags PSH ACK on interface outside
6 Apr 01 2009 14:00:23 302013 208.54.14.115 10.200.1.44 Built inbound TCP connection 2167 for outside:208.54.14.115/5599
6 Apr 01 2009 14:00:25 302014 208.54.14.115 10.200.1.44 Teardown TCP connection 2167 for outside:208.54.14.115/5599
2 Apr 01 2009 14:00:26 106001 203.187.176.172 99.188.67.41 Inbound TCP connection denied from 203.187.176.172/25 to 99.*.*.41/1577 flags PSH ACK on interface outside
I really don't think the problem is with the ASA. The ASA isn't denying the connection. It would be nice if you could put the OWA server right on the Internet with the 99.*.*.44 address temporarily and test the OWA connection from the mobile device again to make sure it really is the ASA.
Is this Exchange 2003 SP2? Also are you connecting over Port 443 SSL? Because you have to enable that on the phone if you are. Just a few things to try, I have this exact same setup on my network and we are using windows mobile, it works like a champ, same ASA device as well, we did not have to configure anything special on the ASA to get OWA to work with the mobile devices
ASKER
JF, well, i hooked the server up straight to the modem and gave it its ip. worked from everywhere, exept phone.. So if its not the ASA, why did it stop working after we moved the server behind it?? Thats why ive always tought it was the ASA causing it.
Must be something on exchange manager then.................
Must be something on exchange manager then.................
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thanks for the help.
No prob. You might want to close out this question and open a new one specific to OWA since we've ruled out the ASA/Network.
If I read your sanitized config correctly, this should be the PAT statement for your OWA service:
static (inside,outside) tcp 99.188.*.* https 10.200.1.44 https netmask 255.255.255.255
If so, you should change it to:
static (inside,outside) tcp interface https 10.200.1.44 https netmask 255.255.255.255
as ASA version 7+ has changed it's PAT format to reflect 'interface' rather than the firewall's outside IP. This may be what is causing the problem, especially if other users are also experiencing the same issue. Check the corresponding ACL entry and make sure it is correct.
If 10.200.1.44 is NOT your OWA server then there is the problem - you'd need to port-forward a different outside port to 443 on your OWA/Exchange server.