Link to home
Start Free TrialLog in
Avatar of tariqmansoor
tariqmansoor

asked on

Issue ".Exe" in URL through PIX Firewall

Hi Team,
Does PIX perform any higher layer packet inspectio nby default to block *.exe" in URLs. I have a web site http://jr.chemwatch.net/chemgold3/ that include some executables in its code. You can also check by going into view-> source.
I have allowed my server full access to internet through PIX and it can go to any site on internet, except the site above. Checking the debugs indicate the Packet reset is from Inside, and i suspect that it could be due to PIX blockes ".exe" in URLs.
Can any one pl assist how do we anable this in PIX. it is some where in Traffic Class Inspection  perhaps but how to enable it , i wonder if some one can assits
below is the Config from PIX. It is sanitised config, may not show Nat and ACL but. Server has complete access to internet through ACL
--------------------------------------------------------------------
interface Ethernet0
 description Outside Interface
 nameif Outside
 security-level 0
 ip address a.a.a.a 255.255.255.248
!
interface Ethernet1
 speed 100
 duplex full
 nameif inside
 security-level 100
 ip address b.b.b.253 255.255.255.0
!

no ftp mode passive
clock timezone EST 10
clock summer-time EDT recurring last Sun Oct 2:00 last Sun Mar 3:00
dns retries 2
dns timeout 2
dns domain-lookup inside
dns name-server FS
dns name-server MA
same-security-traffic permit intra-interface
object-group service FTP tcp
 port-object eq ftp-data
 port-object eq ftp
object-group network Name_Servers
 network-object FS 255.255.255.255
 network-object MA 255.255.255.255
no pager
logging enable
logging console critical
logging buffered critical
logging trap warnings
logging asdm critical
logging mail notifications
logging flash-bufferwrap
mtu Outside 1500
mtu inside 1500
ip verify reverse-path interface Outside
monitor-interface Outside
monitor-interface inside
icmp permit any Outside
icmp permit any inside
asdm image flash:/asdm
no asdm history enable
arp timeout 14400
rip inside passive version 2
rip inside default version 2
route Outside 0.0.0.0 0.0.0.0 a.a.a.57 1
route inside 10.10.10.0 255.255.255.0 b.b.b.254 1
route inside 10.102.101.0 255.255.255.0 b.b.b.254 1
route inside 10.201.1.0 255.255.255.0 b.b.b.254 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server Radius protocol radius
aaa-server Radius host FS
 key secretkey
group-policy DfltGrpPolicy attributes
 banner none
 wins-server none
 dns-server none
 dhcp-network-scope none
 vpn-access-hours none
 vpn-simultaneous-logins 3
 vpn-idle-timeout 30
 vpn-session-timeout none
 vpn-filter none
 vpn-tunnel-protocol IPSec
 password-storage disable
 ip-comp enable
 re-xauth enable
 group-lock value DefaultRAGroup
 pfs disable
 ipsec-udp disable
 ipsec-udp-port 10000
 split-tunnel-policy tunnelall
 split-tunnel-network-list none
 default-domain none
 split-dns none
 secure-unit-authentication disable
 user-authentication disable
 user-authentication-idle-timeout 30
 ip-phone-bypass disable
 leap-bypass disable
 nem disable
 backup-servers keep-client-config
 client-firewall none
 client-access-rule none
http 0.0.0.0 0.0.0.0 inside
snmp-server enable traps snmp

telnet ABCD_Net 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 Outside
ssh ABCD_Net 255.255.255.0 inside
ssh timeout 5
console timeout 0
no tunnel-group-map enable ike-id
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map global_policy
 class inspection_default
  inspect dns maximum-length 512
  inspect ftp
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect esmtp
  inspect sqlnet
  inspect skinny
  inspect sunrpc
  inspect xdmcp
  inspect sip
  inspect netbios
  inspect tftp
!
service-policy global_policy global
ntp server c.c.c.c source Outside prefer
ssl encryption des-sha1 rc4-md5
smtp-server b.b.b.21
management-access inside
--------------------------------------

Thanks Team,
ASKER CERTIFIED SOLUTION
Avatar of debuggerau
debuggerau
Flag of Australia image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
oops,
BTW, I have a similar config and the page loads for me, obviously I can't login though..
Avatar of tariqmansoor
tariqmansoor

ASKER

The reason we are focusing on PIX is that Entire inside network ( LAN) is unable to load this page.
and some workstations , if directly go to internet, can load the webpage. But can not load if go through PIX.
Hi, I also checked the doco you suggested http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080940e04.shtml 
This shows how to include URLs for blocking in PIX / ASA.
In my case URL DOES get loaded, It just doen not load completely and does not provide login box. and that is due to Execuatable in the website code.
Question is whether PIX checks for any Executable in Http Packets? If Yes is there any way to allow that.

Thanks,
tariq are you using ISA on ur lan as a proxy or firewall?.. if its operating as a proxy (1 interface) then you might want to nat your ip directly on ur nat device ... the router my guess..

and see how it goes

-simo

We were using ISA as proxy, but for Testing have BYPASSED ISA completelly.

 i have bypassed ISA and now Server we are trying can Directly go to Internet through PIX firewall.

NAT and ACL work correctly and Server Can go to whole Internet except that website containing ".exe" in the java script of the code.

DOES Pix checks for any ".exe" kind of things in http packets ? if yes how do we configure to ignore such INSPECTION ?

Thanks in advance.
Other issues can cause the pages not to load, MTU size mismatch on the PIX, router, or workstations are an examples..
Did you try bypassing the pix to test?

And while your config doesn't describe any such matches, unless they are excluded in your dump, it shouldn't be filtering exe's..

And while the page does have a reference to an exe, it is a server side request and not run locally..
i completely agree with debuggerau, try bypassing the pix, nat your server on the router through a separate physical connection if you can.

have you tried opening the link form another server/workstation?

-simo
HI Guys,
Sorry for delay, but tomorrow i am going to test the server with a direct internet connection. Was bit of struggle to get a separate internet link for testing.
But in the mean time i was just wondering if it could be related to MTU size at all ? i.e. MTU Size at PIX stopping the Website to load. Is there any way to set the adjustabel MTU size on PIX with out breaking any thing.
Thanks,
Hi debuggerau and Simo471,
I have tried bypassing PIX with the same Server and was able to load the page with logon prompt.

Tried with PIX and could not load the page with logon prompt ?

ANy thoughts on MTU ? or any other thoughts...
ok, check the router MTU settings and ensure it is matched on the PIX.

The MTU setting change will reset that interface, only briefly, but so you might not want to do this in production time..

I usually only change the outside interface, allowing the PIX to repackage the frames for the clients, which I leave as standard..
Say, for instance, you have a ADSL PPPOA connection, you might want to have something like this:
mtu outside 1400
mtu inside 1500

It is an Internet through Ethernet Service, and MTU is already set as
mtu Outside 1500
mtu inside 1500

I also checked in another ASA with same MTU size and was able to load the web site. I have run out of ideas and only thinking that Upgrading the IOS woud fix this ? currently it is running 7.(02).
i can further send you the current running config and debug messages that i get with this web site and those debug message suggest that packet is getting rest from Inside INterface.
Debug message was :
302014: Teardown TCP connection xxxxxx for outside 129.1.2.226/80 to inside FS/xxxx duration 0:00:26 bytes 5883 TCP Reset-I

SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thanks, i will send you more debugs but can you please tell me how to disable IDS function in PIX and how to check if it is enabled already ?

Also is this command, as you suggested, can safely be applied to PIX and it wont disrupt its operation ?
" ip verify reverse-path interface Outside" Thanks fo ryour help so far!!
That should be in your service-policy:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008085283d.shtml

And while it did not disrupt my system, I always recommend that it may..
Hi Debuggerau,

sorry but i did not have any luck so far. :(
i did add the traffic inspection policy, which is fixup protocol http in PIX and that did not solve the problem.
I am looking at fixing this issue with out haveing to upgrade the IOS and swaping PIX with another one.

i also checked the mtus size of the website by -f and 0l switch and mtu size behavious was exactly like other websites when compared.
I get the below debugs, may that can can help you indetify the issue. 98.129.12.226 is the IP address of the culprit website http://jr.chemwatch.net/chemgold3/
and FS1 is the inside server that has access to every thing on the planet butthis web site.

6|Dec 14 2009 10:38:01|302014: Teardown TCP connection 252298 for Outside:98.129.12.226/80 to inside:FS1/38849 duration 0:01:15 bytes 37140 TCP Reset-I
6|Dec 14 2009 10:37:45|302013: Built outbound TCP connection 252629 for Outside:98.129.12.226/80 (98.129.12.226/80) to inside:FS1/38905 (EXT_IA/1033)

Cna you please help fixing this in the light of above.
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Hi debuggerau,
i have tried caputuring stats using smsniff and i am attaching the file with results of smsniff,
The reason it is not the Client Issue is that, i had tested the same Server wih Direct Internet connection and it was able to load the web page Fine.
and only happend when server goes through PIX.
i also tried capturing the debugs, but only get the above entries in the debugs that i already sent you.
-------------------------------------------------
HTTP/1.1 200 OK
Content-Length: 1670
Content-Type: text/html
Content-Location: http://jr.chemwatch.net/chemgold3/Default.htm
Last-Modified: Wed, 17 Dec 2008 08:35:42 GMT
Accept-Ranges: bytes
ETag: "08353722260c91:11965"
Server: Microsoft-IIS/6.0
From: JR
X-Powered-By: ASP.NET
Date: Mon, 14 Dec 2009 01:30:14 GMT

rest is in the attacehd file
------------------------------------------------------------------


Server-smsniff-results.txt
Hi Debuggerau,

I had installed Wireshark too on the server and attached is the screen shot of Capture that might help you to determmine what is causing the issue. It shows that Checksum in IP header is not correct.
But please do note that same server could go to the this website Ok by passing pix. and it only has problem with pix. I think with this Capture screen shot we should be v close to teh cause and resolution if the issue.
In previous update form me ,  i have also provided stats from smsniff.
Looking forward to update from you.

Regards,
FSCapture.JPG
Thanks for your help through out!!! but it was one of those wiered ones..
New PIX with latest IOS also had the same issue. and It turned out that, the particualr IP ( of the Service Provider) we were using at PIX outside interface was cause of the problem.
We plugged our lap top directly into the Internet port and could browse inet but not that web site.
either the public IP or the switch port of Service provide being the casue of the issue.
Have escaletd it with the service provider..

Thanks ,