How do I permit passthru on a Cisco ASA 5505

Hi, I have a ciscoe asa 5505 firewall.  I have it all configured so that everyone works great, except I can have a server communicate with itself using any outside IP.  I am curious to know how I can do this.  Any option that will work is excellent.  The server is nothing that needs to be secured or firewalled really, the basics of any protection it would need can be handled via software firewall, if an issues arrises.  Also I have more than one external ip, in fact I have one for machine on the inside, so giving that particular machine an static assigned external ip is not an issue.  I basically just need to be able to set the external ip with a listening port so that people from outside can access it, but at the same time I need for that machine itself to be able to verify that the service is readable.  So it needs to be able to communicate with itself on the outside IP address.  Screwy program I know.  Any help is greatly appreciated.
danvilleadminAsked:
Who is Participating?
 
Jimmy Larsson, CISSP, CEHConnect With a Mentor Network and Security consultantCommented:
One of the basic rules/limitations of ASA is: An inside host cannot communicate with another inside host by calling an outside ip. It simply doesnt work that way. Your question applies to this, the fact that the inside host is the same as the called host doesnt change anything.

What you can (or cant, depending on your application) is to fool the host with DNS. Either an internal DNS that resovles a domain name to an internal ip or an external DNS-server and doa dns-doctoring in the static-command.

If the application really requires to do this I would recommend putting the server behind an asa in transparent mode. By doing that you can still protect it but you can give the server an public ip so that it can "call" its own public IP. By doing this you dont do any address translation in your transparent firewall.

Anyhow, you need to do a workaround in some way or other, because exactly what you requests cannot be done in ASA. Sorry.

/Kvistofta
0
 
rfc1180Commented:
With DNS rewrite or NAT hairpinning

Are you connecting to public IP by DNS hostname?  If so, is the name resolved externally or via internal DNS servers?  If external, you can use DNS doctoring to rewrite the DNS response to the internal IP address.  This is a better option if possible versus hairpinning as the client to server traffic stays on the LAN and the ASA never sees it.

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml

Billy
0
 
danvilleadminAuthor Commented:
Kvisofta, the idea of putting the server bhind an asa in transparent mode is perfectly fine with me.  Can you by any chance give any input on how this can be done, sorry, my experience with Cisco has never been with an asa until now.

rfc1180, no its by ip not by dns.
0
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

 
rfc1180Commented:
>rfc1180, no its by ip not by dns.

Alternative Solution: Hairpinning
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml#solution2

Billy
0
 
Jimmy Larsson, CISSP, CEHNetwork and Security consultantCommented:
Have a look at this documentation for explaining ASA in transparent mode:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008089f467.shtml

Basically, you put it "invisible" with 2 interfaces on the same network segment and do port-filtering in the firewall for all traffic passing the "stealth mode" firewall.

/Kvistofta
0
 
danvilleadminAuthor Commented:
Ok I'm reading thru the page on ASA in Transparent mode...it appears this is only going to apply to the whole ASA and not just the one server is that correct???  I really need to have the majority of the network behind the ASA as is now, but the one server on the outside.
0
 
Jimmy Larsson, CISSP, CEHNetwork and Security consultantCommented:
Yes, that is correct.

/Kvistofta
0
 
danvilleadminAuthor Commented:
Any suggestion that would allow me to only affect one pc
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.