Disable port rewriting/randomization for a TCP and UDP port on a Cisco ASA 5510 firewall.

I have a Cisco ASA 5510 firewall that I need to disable port rewriting/randomization for TCP 8008 and UDP 8008 across all my VLAN's and subnets. How Do I do this on the Cisco ASA 5510 firewall?
LVL 2
OAC TechnologyProfessional NerdsAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

btanExec ConsultantCommented:
It looks like a Dynamic PAT/NAT havign wide range but can we venture instead into Static state instead as in the ref where the mapped port can be specified for specific targeted IP src and dest
http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/asdm64/configuration_guide/asdm_64_config/nat_objects.html#wp1106703
0
Pete LongTechnical ConsultantCommented:
Depends on your OS? before 8.3 you simply put norandomseq on the end of the nat statement like this;

static (inside,outside) tcp interface 8008 192.168.1.1 8008 netmask 255.255.255.255  norandomseq

After 8.3 you need to use MPF (modular policy framework)

access-list TCP-STATE-BYPASS permit tcp any any eq 8008
access-list TCP-STATE-BYPASS permit udp any any eq 8008
!
class-map TCP-STATE-BYPASS
  match access-list TCP-STATE-BYPASS
!
policy-map inside_policy
 class TCP-STATE-BYPASS
 set connection advanced-options  tcp-state-bypass
!
service-policy inside_policy interface inside


Pete
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
btanExec ConsultantCommented:
For 8.2 - can catch "policy NAT and regular NAT"
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_static.html#wp1081445
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_dynamic.html#wp1081841

The other earlier link is the UI version to enforce the specific port for the network object .
0
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

OAC TechnologyProfessional NerdsAuthor Commented:
Hi,

Thanks for the suggestions. Pete, I've implemented what you have there, but I'm still seeing the TCP and UDP ports being randomized. I do see in the logs now that it says "Built TCP state-bypass connection from OUTSIDE:x.x.x.x/58239 to INSIDE:y.y.y.y/8008"

Any ideas?
0
OAC TechnologyProfessional NerdsAuthor Commented:
Also, I am on ASA version 9.1(5)
0
OAC TechnologyProfessional NerdsAuthor Commented:
Anything else I should try?
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.