Disable port rewriting/randomization for a TCP and UDP port on a Cisco ASA 5510 firewall.

I have a Cisco ASA 5510 firewall that I need to disable port rewriting/randomization for TCP 8008 and UDP 8008 across all my VLAN's and subnets. How Do I do this on the Cisco ASA 5510 firewall?
LVL 3
OAC TechnologyProfessional NerdsAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

btanExec ConsultantCommented:
It looks like a Dynamic PAT/NAT havign wide range but can we venture instead into Static state instead as in the ref where the mapped port can be specified for specific targeted IP src and dest
http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/asdm64/configuration_guide/asdm_64_config/nat_objects.html#wp1106703
Pete LongTechnical ConsultantCommented:
Depends on your OS? before 8.3 you simply put norandomseq on the end of the nat statement like this;

static (inside,outside) tcp interface 8008 192.168.1.1 8008 netmask 255.255.255.255  norandomseq

After 8.3 you need to use MPF (modular policy framework)

access-list TCP-STATE-BYPASS permit tcp any any eq 8008
access-list TCP-STATE-BYPASS permit udp any any eq 8008
!
class-map TCP-STATE-BYPASS
  match access-list TCP-STATE-BYPASS
!
policy-map inside_policy
 class TCP-STATE-BYPASS
 set connection advanced-options  tcp-state-bypass
!
service-policy inside_policy interface inside


Pete

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
btanExec ConsultantCommented:
For 8.2 - can catch "policy NAT and regular NAT"
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_static.html#wp1081445
http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_dynamic.html#wp1081841

The other earlier link is the UI version to enforce the specific port for the network object .
SD-WAN: Making It Work for You

As bandwidth requirements and Internet costs grow, businesses naturally want to manage budgets by reducing reliance on their most expensive connection types. Learn more about how to make SD-WAN work for your business in our on-demand webinar!

OAC TechnologyProfessional NerdsAuthor Commented:
Hi,

Thanks for the suggestions. Pete, I've implemented what you have there, but I'm still seeing the TCP and UDP ports being randomized. I do see in the logs now that it says "Built TCP state-bypass connection from OUTSIDE:x.x.x.x/58239 to INSIDE:y.y.y.y/8008"

Any ideas?
OAC TechnologyProfessional NerdsAuthor Commented:
Also, I am on ASA version 9.1(5)
OAC TechnologyProfessional NerdsAuthor Commented:
Anything else I should try?
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.