Link to home
Start Free TrialLog in
Avatar of Comptx
Comptx

asked on

ASA 5505 blocking OWA

Hello, ive had this issue for a while now, and cannot find the answer anywhere..

After moving my mail server behind the ASA 5505, i can no longer access owa from my windows mobile phone. worked before the asa was there, so it must be something with the ASA 5505 thats causing it.

here is the asa config..

thanks for any help....

: Saved
:
ASA Version 7.2(3)
!
hostname comptx
domain-name comptx.com
enable password NuLKvvWGg.x9HEKO encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.200.1.1 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 99.188.*.* 255.255.255.248
!
interface Vlan3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name comptx.com
access-list outside_1_cryptomap extended permit ip host 99.188.*.* host 75.144.*.*
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 host 75.144.*.*
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list rdp-capture extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any host 99.188.*.* eq https
access-list outside_access_in extended permit tcp any host 99.188.*.* eq smtp
access-list outside_access_in extended permit tcp any host 99.188.*.* eq smtp
access-list outside_access_in extended permit tcp any host 99.188.*.* eq pptp
access-list outside_access_in extended permit udp any host 99.188.*.* eq isakmp
access-list outside_access_in extended permit udp any host 99.188.*.* eq 4500
access-list outside_access_in extended permit tcp any host 99.188.*.* eq www
access-list inside_nat0_outbound extended permit ip host 99.188.*.* host 75.144.*.*
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 host 75.144.*.*
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list 100 extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
pager lines 24
logging enable
logging monitor debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 99.188.*.*-99.188.*.*
global (outside) 1 99.188.*.*
global (outside) 1 99.188.*.*
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp 99.188.*.* https 10.200.1.44 https netmask 255.255.255.255
static (inside,outside) tcp 99.188.*.* smtp 10.200.1.44 smtp netmask 255.255.255.255
static (inside,outside) tcp 99.188.*.*www 10.200.1.44 www netmask 255.255.255.255
static (inside,outside) 99.188.*.* 10.200.1.5 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 99.188.*.* 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.200.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 75.144.*.*
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0

!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip
  inspect xdmcp
  inspect pptp
!
service-policy global_policy global
tunnel-group 75.144.*.* type ipsec-l2l
tunnel-group 75.144.*.* ipsec-attributes
 pre-shared-key *
prompt hostname context
Cryptochecksum:79f51a1f4f445040fbaeea0ac1654975
: end
asdm image disk0:/asdm-523.bin
no asdm history enable
Avatar of stsonline
stsonline
Flag of United States of America image

Does OWA work for users not accessing it via mobile phone? Is 10.200.1.44 your Exchange or OWA server?

If I read your sanitized config correctly, this should be the PAT statement for your OWA service:
static (inside,outside) tcp 99.188.*.* https 10.200.1.44 https netmask 255.255.255.255

If so, you should change it to:
static (inside,outside) tcp interface https 10.200.1.44 https netmask 255.255.255.255

as ASA version 7+ has changed it's PAT format to reflect 'interface' rather than the firewall's outside IP. This may be what is causing the problem, especially if other users are also experiencing the same issue. Check the corresponding ACL entry and make sure it is correct.

If 10.200.1.44 is NOT your OWA server then there is the problem - you'd need to port-forward a different outside port to 443 on your OWA/Exchange server.
Avatar of Comptx
Comptx

ASKER

yes, .44 is the mail server.   OWA works if you access it from any computer, but not from the phone like it used to.

ill try your command.
Avatar of Comptx

ASKER

STS, if i use that command i can no longer access OWA from any computer, and still didnt work on mobile phone.
Can you post the config again but include the real last octet of the public IP addresses.
Avatar of Comptx

ASKER

here you go, JF.

: Saved
:
ASA Version 7.2(3)
!
hostname *
domain-name *
enable password u1N2uiTOMgtVzzpC encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.200.1.1 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 99.*.*.43 255.255.255.248
!
interface Vlan3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passwd u1N2uiTOMgtVzzpC encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name *
access-list outside_1_cryptomap extended permit ip host 99.*.*.43 host 75.*.*.225
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 host 75.*.*.225
access-list outside_1_cryptomap extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list rdp-capture extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq https
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq smtp
access-list outside_access_in extended permit tcp any host 99.*.*.45 eq smtp
access-list outside_access_in extended permit tcp any host 99.*.*.45 eq pptp
access-list outside_access_in extended permit udp any host 99.*.*.45 eq isakmp
access-list outside_access_in extended permit udp any host 99.*.*.45 eq 4500
access-list outside_access_in extended permit tcp any host 99.*.*.44 eq www
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 2776
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 1719
access-list outside_access_in extended permit tcp any host 10.200.1.191 range 3230 3243
access-list outside_access_in extended permit udp any host 10.200.1.191 range 3230 3285
access-list outside_access_in extended permit udp any host 10.200.1.191 eq 1719
access-list outside_access_in extended permit tcp any host 10.200.1.191 range 3230 3285
access-list outside_access_in extended permit tcp any interface outside eq 3389
access-list outside_access_in extended permit tcp any eq 3389 interface outside eq 3389
access-list outside_access_in extended permit tcp any host 10.200.1.191 eq 3389
access-list outside_access_in extended permit tcp any host 99.*.*.41 eq 3389
access-list inside_nat0_outbound extended permit ip host 99.*.*.43 host 75.*.*.225
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 host 75.*.*.225
access-list inside_nat0_outbound extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list 100 extended permit ip 10.200.1.0 255.255.255.0 10.200.2.0 255.255.255.0
access-list outside_in extended permit tcp any host 99.*.*.41 eq 3389
pager lines 24
logging enable
logging monitor debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
no failover
monitor-interface inside
monitor-interface outside
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-523.bin
no asdm history enable
arp timeout 14400
global (outside) 1 99.*.*.41 netmask 255.255.255.255
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp 99.*.*.44 smtp 10.200.1.44 smtp netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.44 www 10.200.1.44 www netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.44 https 10.200.1.44 https netmask 255.255.255.255
static (inside,outside) tcp interface 2776 10.200.1.191 2776 netmask 255.255.255.255
static (inside,outside) tcp interface 1719 10.200.1.191 1719 netmask 255.255.255.255
static (inside,outside) tcp 99.*.*.41 3389 10.200.1.191 3389 netmask 255.255.255.255
static (inside,outside) 99.*.*.45 10.200.1.5 netmask 255.255.255.255
access-group outside_access_in in interface outside
route outside 0.0.0.0 0.0.0.0 99.*.*.46 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
http server enable
http 10.200.1.5 255.255.255.255 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs
crypto map outside_map 1 set peer 75.*.*.225
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet 10.200.1.5 255.255.255.255 inside
telnet timeout 5
ssh timeout 5
console timeout 0

!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect netbios
  inspect rsh
  inspect rtsp
  inspect skinny
  inspect esmtp
  inspect sqlnet
  inspect sunrpc
  inspect tftp
  inspect sip
  inspect xdmcp
  inspect pptp
!
service-policy global_policy global
username admin password 3ETJzDL4hW/jJ62O encrypted
tunnel-group 75.*.*.225 type ipsec-l2l
tunnel-group 75.*.*.225 ipsec-attributes
 pre-shared-key *
prompt hostname context
Cryptochecksum:e241c9425e9981f6bdeb688d46c90404
: end
asdm image disk0:/asdm-523.bin
no asdm history enable

Well, if OWA works from the outside using a PC but not from the mobile device the ASA config is working.  However you can enable logging on the ASA and attempt a connection to see if it sheds any light...

conf t
logging buffer debug

Attempt a connection from the mobile device and keep using the following command on the ASA until you see log entries:

show log | i x.x.x.x

Where x.x.x.x is the IP of the mobile device.
Avatar of Comptx

ASKER

i get

Result of the command: "logging buffer debug"

ERROR: % Ambiguous command:  "logging buffer debug"

when i try command
Sorry:

conf t
logging buffered debug
Avatar of Comptx

ASKER

the ip of the device is 208.54.14.51 according to  whatsmyip site.
Do you see any log entries matching that IP when attempting to connect?

show log | i 208.54.14.51
Avatar of Comptx

ASKER

i do not see it
Avatar of Comptx

ASKER

actually, im getting these 3 entries whenever i press send/receive on the phone

6      Apr 01 2009      14:00:23      302013      208.54.14.115      10.200.1.44       Built inbound TCP connection 2167 for outside:208.54.14.115/55999 (208.54.14.115/55999) to inside:10.200.1.44/80 (99.*.*.44/80)

6      Apr 01 2009      14:00:25      302014      208.54.14.115      10.200.1.44       Teardown TCP connection 2167 for outside:208.54.14.115/55999 to inside:10.200.1.44/80 duration 0:00:01 bytes 2370 TCP FINs

2      Apr 01 2009      14:00:26      106001      203.187.176.172      99.188.67.41       Inbound TCP connection denied from 203.187.176.172/25 to 99.*.*.41/1577 flags PSH ACK  on interface outside
I really don't think the problem is with the ASA.  The ASA isn't denying the connection.  It would be nice if you could put the OWA server right on the Internet with the 99.*.*.44 address temporarily and test the OWA connection from the mobile device again to make sure it really is the ASA.
Is this Exchange 2003 SP2?  Also are you connecting over Port 443 SSL? Because you have to enable that on the phone if you are.  Just a few things to try, I have this exact same setup on my network and we are using windows mobile, it works like a champ, same ASA device as well, we did not have to configure anything special on the ASA to get OWA to work with the mobile devices
Avatar of Comptx

ASKER

JF,  well, i hooked the server up straight to the modem and gave it its ip. worked from everywhere, exept phone..  So if its not the ASA, why did it stop working after we moved the server behind it??  Thats why ive always tought it was the ASA causing it.

Must be something on exchange manager then.................
ASKER CERTIFIED SOLUTION
Avatar of JFrederick29
JFrederick29
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Comptx

ASKER

Thanks for the help.
No prob.  You might want to close out this question and open a new one specific to OWA since we've ruled out the ASA/Network.