Solved

Outlook RPC over HTTP causes ASA5510 to shun connection

Posted on 2011-03-10
5
1,001 Views
Last Modified: 2012-05-11
We are experincing a peculiar issue with our ASA5510. It acts like it is shunning a remote connection when attampting to make an RPC via HTTP request from an Outlook client. If VPN is connected and we access Outlook Anywhere via LAN address we have no issues.

What leads us to believe we are being shunned is the inability to connect to VPN while outlook is open and attempting its remote connection. If outlook is closed then we can immedietly we can make a VPN connection.

We have disabled threat detection on our ASA in an attempt to pin point this issue. But even when it is enabled the shun does not appear when querying the ASA for shunned hosts.
0
Comment
Question by:hbrumfield
  • 3
  • 2
5 Comments
 
LVL 26

Expert Comment

by:e_aravind
ID: 35108890
Note sure if there is anything called IRULE on this device...

Related links:
========
http://devcentral.f5.com/Community/GroupDetails/tabid/1082223/asg/52/afv/topic/aft/60622/aff/31/showtab/groupforums/Default.aspx

SOL7869: The BIG-IP ASM does not support connections using Remote Procedure Call over HTTP
https://support.f5.com/kb/en-us/solutions/public/7000/800/sol7869.html 
0
 
LVL 1

Author Comment

by:hbrumfield
ID: 35111730
This links appear to be specific to f5 gear, are you asking if the cisco asa has an irule policy?
0
 
LVL 26

Expert Comment

by:e_aravind
ID: 35131282
Yes
the main picture is to create\configure the sticky session on the cisco device.
0
 
LVL 1

Accepted Solution

by:
hbrumfield earned 0 total points
ID: 36241404
We determined this to be an issue with our Barracuda web filter sitting in path to the firewall. A firmware update from Barracuda resolved.
0
 
LVL 1

Author Closing Comment

by:hbrumfield
ID: 36268210
Discovered solution by removing web filter from in path and testing.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
This video discusses moving either the default database or any database to a new volume.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now