Solved

Cisco ASA Clientless Web VPN

Posted on 2014-03-12
2
526 Views
Last Modified: 2014-03-23
I have the below scenario...
I have a Cisco ASA firewall connected to Internet via public IP.
I have a URL published in the internet pointing to hte public IP
ex abc.test.com -> 1.1.1.1

In the ASA i have configured SSL VPN to send the request to my web server.
The ASA is configured to send the request to Web Server on port 5555
10.10.10.10:5555


So whenever user browse the URL it hits the ASA & ASA sends the request to the Web server

The web server intern connects to the App Server . The communication between App & Web Server occurs on many ports.
When the Web server talks back to the Firewall what port should the Web server should use. Does it uses the port 5555 or any other port which is used between the Web & App server.
0
Comment
Question by:SrikantRajeev
2 Comments
 
LVL 12

Accepted Solution

by:
Henk van Achterberg earned 500 total points
ID: 39936128
When the ASA is connecting to the webserver it uses a random source port between 1025 and 65535. The destination port is 5555. When the server talks back to the ASA the destination port is the random port which was chosen by the ASA. The source port is 5555.
0
 
LVL 1

Author Closing Comment

by:SrikantRajeev
ID: 39949618
Thanks
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question