Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Allowing access to a Private IP Range on the ISA External Network

Posted on 2008-10-13
6
Medium Priority
?
1,649 Views
Last Modified: 2013-11-16
We currently have a Cisco Device which is terminating some site-to-site VPNs. We basically are trying to setup an ISA 2006 Enterprise Edition firewall using the Edge Firewall Template with 2 Network Cards (1x External and 1x Internal). The ISA Firewall is placed between the Cisco Device Internal interface and internal network.


| internet
Cisco Device
| internal interface
| ISA external interface
ISA Server
| internal network

The internal Users Gateway IP Address is the ISA Server internal IP Address. We need to allow/give access to the Site-To-Site VPNs terminated on the Cisco Device. So basically we need to give access from the 192.168.1.x network (internal local network) to the site-to-site VPN 10.0.0.x network (data will pass from the ISA internal interface to the ISA external interface and then to the cisco device).

At the moment we have everything set to 'route' on the ISA server (NAT to the internet is being done on the cisco device).

The ISA Enterprise seems to be blocking access to the 10.0.0.x network, although there is an specific Access Rule to allow 'All Outbound' from the 192.168.1.x/10.0.0.x to 10.0.0.x/192.168.1.x. The ISA server seems to be detecting that the 10.0.0.x network is a 'private' IP address and it doesn't route/allow it to pass through the ISA external interface.

From the monitor log I can see: 'Denied - FWX_E_Network_Rules_Denied'.

Is there some kind of 'protection' in ISA Server which will not allow in anyway accessing a private ip range through the ISA External interface?

Your help will be really appreciated!

Thanks!
0
Comment
Question by:TylerDu
6 Comments
 
LVL 4

Expert Comment

by:nasirsh
ID: 22701363
The ISA server seems to be detecting that the 10.0.0.x network is a 'private' IP address and it doesn't route/allow it to pass through the ISA external interface.

From this it seems that you are using 255.0.0.0 as subnet. If so then try changing it to 255.255.255.0. Hope this works
0
 

Author Comment

by:TylerDu
ID: 22701392
Hi nasirsh,

All networks are configured with as /24 subnet 255.255.255.0

Internal: 192.168.1.0/24 (specified in the network card tcp/ip properties and in the 'internal' ISA network)
Need access to: 10.0.0.0/24 network (through the ISA external interface)
0
 
LVL 1

Accepted Solution

by:
smshah78 earned 1500 total points
ID: 22701407
This is due to IP Spoofing feature which is by default enabled on MS ISA firewalls. Try disabling this feature to see if it works for a starter.

As per my past experience, try including 10.x.x.x as internal network definition of ISA.
0
The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

 

Author Comment

by:TylerDu
ID: 22701554
I have just tried disabling the IP Spoofing as how this site explains http://support.microsoft.com/kb/838114 and also added the 10.0.0.0/24 network to the ISA 'Internal' network address range.

From the monitoring it still giving out: 'Denied - FWX_E_Network_Rules_Denied'
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22704238
I'll keep out of this question - pointless going in two different directions.

Keith
0
 
LVL 1

Expert Comment

by:smshah78
ID: 22708697
Dear TylerDu,

I did some more research on this and it seems that you have created access rule but network rule is not created.
Please refer to following instructions from Microsoft site if it helps in your case:
http://technet.microsoft.com/en-us/library/bb794765.aspx

You should be in Troubleshooting VPN over IPSec section and go to common issues section and it has details on the problem you are facing and how to go about creating a network rule manually.

Hope this helps.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In Africa (and potentially where you live…), reliability of ISPs is questionable.  With the increased reliance on e-mail as one of the primary forms of communication, the costs to business are significant based on interuption of ISP Connectivity.  T…
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses
Course of the Month10 days, 22 hours left to enroll

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question