[Webinar] Streamline your web hosting managementRegister Today

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 2679
  • Last Modified:

how to open a port 389 on cisco asa 5520 firewall for an email encryption server

I have a email encryption server that sits on a DMZ and i need to open a ldap port (389) on my ASA 5520. There is a NAT rule made (static 192.168.X.X = outside 209.149.X.X) I'm just not sure how to open this port up. Thanks

Dave
0
davecordova7
Asked:
davecordova7
  • 5
  • 3
  • 2
  • +2
1 Solution
 
ZupremeCommented:
access-list ACLNAME extended permit tcp SOURCE_ADDR eq 389 host 192.168.x.x eq 389
0
 
jlanderson1Commented:
access-list ACLNAME permit ip HOST LDAP host 192.168.x.x eq LDAP
0
 
Jimmy Larsson, CISSP, CEHNetwork and Security consultantCommented:
Zupreme: i doubt that ldap uses port 389 as source port as well as destination port. Davecordova7: go with the command that janderson1 recommends.

/Kvistofta
0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 
davecordova7Author Commented:
forgive me, i'm new to ASDM. So do I need to go to ACL Manager and add an ACL?
ex.
source=LDAP server
Desination = 192.168.XX
service = ip
action= permit

thanks
dave
0
 
Jimmy Larsson, CISSP, CEHNetwork and Security consultantCommented:
service = tcp/389

/Kvistofta
0
 
gavvingCommented:
In ASDM to edit an ACL:
- Go into Configuration
- click on Firewall button on the left hand side
- Select Access Rules

You'll see listed the ACL's in use.  Look for the rules listed under the 'outside' interface
click on "+Add"

Interface: outside
Action: Permit
Source: Any
Destination: 209.149.x.x
Service: tcp/ldap

This allows full internet access into your server on LDAP port.  Assuming you have a NAT rule configured as you indicated.  
0
 
davecordova7Author Commented:
Right now I have an access rule...
outside
source= any
Destination 209.149.X.X
service= tcp/https (to allow external users to access the Email encryption server which is on a DMZ)

I tried adding additional service like tcp/https, tcp/ldap. It was unsuccessful.

there is no ldap on the DMZ, so i'm wondering what rule is need to reach the LDAP server without a having a hole for hackers?

thanks.
dave

0
 
gavvingCommented:
What exactly is it that you're trying to do?  You have an Email encryption server in the DMZ. Did you want to allow LDAP queries from the Internet to that server?  That's what your question seemed to be asking.  

I assume you want it to make LDAP queries to an internal server that is not on the DMZ but is on the Inside network?  Can you provide a copy of the config so that we can be precise in what changes are needed?

0
 
davecordova7Author Commented:
correct.
how do i get the config for you to see.
Thanks.
0
 
davecordova7Author Commented:
on the ASA monitoring, i'm getting this
2      Sep 01 2010      13:12:46      106001      192.168.X.X      10.111.X.X       Inbound TCP connection denied from 192.168.X.X/53358 to 10.111.X.X/389 flags SYN  on interface dmz
0
 
gavvingCommented:
Add an Access rule under the 'dmz' Interface in the firewall tab.
interface: dmz
action: permit
source: 192.168.x.x
destination: 10.111.x.x
port: tcp/ldap

Try it and see if it works.  If not then you'll also need a NAT rule that allows access from the dmz network to the inside network.  Under acl manager look for a ACL that says something about "nat0".  Add a rule to that:
action: permit
protocol: IP
source: 192.168.x.x
destination: 10.111.x.x

If you're still having problems get a copy of the config by:
Click on Tools pull down menu
Choose Command Line Interface
type "show run" as the command and click on "send"
Copy and paste the output.
0
 
davecordova7Author Commented:
thanks gavving, will give it a shot.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 5
  • 3
  • 2
  • +2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now