Web-Proxy(cut-through) without ACS on 55xx
Is it possible? All I have read about it requires an external server.
I think that is a limitation of IOS Auth-Proxy and not ASA/PIX Cut-Through.
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/ftrafwl/scfauthp.htm#wp1001164
However AFAIK you can only authenticate using local password database and not authorize using it (for CUT-THRUOGH). Have a look at this table:
http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/aaa.html#wp1069492
Please rate if helpful.
Regards
Farrukh
Similar Messages
-
Send web proxy messages through another MTA
Hello,
We have an iMS5.2 platform consisting in one message store, two MTA's (relays), one LDAP and two frontends (MMP imap, pop and http proxy).
External users access the frontends, that are balanced by an Alteon switch. When I send a message using webmail (through frontends), the message is delivered to mshttpd daemon on the store server, who then sends it back to the MTA's (using service.http.smtphost configuration).
Is, by any change, possible to send the message directly from the frontends to the MTA's?
I've activated the "service.http.smtphost" configuration on the Frontends, but the message is still deliverd to the mshttpd on the store server.
Any ideas?
Regards,
Sergio SousaHello,
We have an iMS5.2 platform consisting in one message store, two MTA's (relays), one LDAP and two frontends (MMP imap, pop and http proxy).
External users access the frontends, that are balanced by an Alteon switch. When I send a message using webmail (through frontends), the message is delivered to mshttpd daemon on the store server, who then sends it back to the MTA's (using service.http.smtphost configuration).
Is, by any change, possible to send the message directly from the frontends to the MTA's?
I've activated the "service.http.smtphost" configuration on the Frontends, but the message is still deliverd to the mshttpd on the store server.
Any ideas?
Regards,
Sergio Sousa -
How to use sequence in client web proxy.
Hi,
I have created a sequence in database.
And I am using that in EntityImpl as:
SequenceImpl sequence=new SequenceImpl("Sequence_name",getDBTransaction);
setAttribute(sequence.getSequenceNumber)
I will automatically set the attribute with the sequence val.
But I want to get the sequence value in client web proxy generated through WSDL.
There I write the same code and imported the files.
But it is giving me error that:
java.lang.nullPointException.
How to access the sequence in client web proxy generated through WSDL.Hi,
expose a method on the ViewObject and make it available to the service interface. In Web Services it does not make sense to create dependencies between a client and the implementation detail of the service.
Frank -
Strange problem with cut-through proxy
hi
i have configured cut- through proxy on the router with acs.i am facing a strange problem .
my routers's ethernet 3/0 interface ip add is 10.1.1.1/24 and the acs server is 10.1.1.2/24 and the host ip is 10.1.1.3/24
my routers' e2/0 interface is connected a server running a website .
int e2/0
no shutdown
ip add 20.1.1.1/24
exit
the webserver is running on 20.1.1.2
my router's config
aaa new-model
aaa authentication login default group tacacs+
aaa authorization auth-proxy default group tacacs+
aaa authorization exec default group tacacs+
tacacs-server host 10.1.1.2
tacacs-server key cisco
ip http server
ip http authentication aaa
ip access-list 101 permit tcp host 10.1.1.2 eq tacacs host 10.1.1.1
ip auth-proxy name auth http
int e3/0
no shutdown
ip add 10.1.1.1/24
ip access-group 101 in
ip auth-proxy auth
exit
on the acs server in the tacacs+ ios
i have selected auth-proxy in the services for users and groups
i have created a user john with privilege level 15
have selected auth-proxy and custom attributes
proxyacl#1=permit tcp any any priv-lvl=15
i get the auth-proxy login page when the host on 10.1.1.3 is trying to access 20.1.1.2 web site .
after putting the login credentials i get authentication failed
i tried the debug. i see the router is sending the authentication login and password and getting the status from the acs as pass. i also see the auth-proxy triggered. in there i see
AUTH-PROXY PROTOCOL NOT CONFIGURED.
could someone pls help me what could be the problem. i am have tried many times to get this work. but not fortunate enough.
am i missing on any commands on the router or on the acs. i tried doing as the example mentioned in the student guide but still failed. pls help. waiting for some reply.
sebastanCheck out the following link...
http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080450b5e.html -
Hi,
We are trying to setup ASA to do cut-through authentication proxy, and use ISE as RADIUS. We can successfully authenticate the user from Radius on the ASA, while he opens a web-page, but then it displays the error: authorization denied.
What we want:
ISE to allocate a security group tag to the user session when he logs in, that tag would carried within out cisco network infrastrucutre to define the access
policy for that user.
Can someone please help me with a sort of step by step thing for ISE configuration to allocate SGTs/SGACL for the user session after authentication is completed.
Thanks
LovleenPlease refer to below step by step config guide for security group access policies
http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_user_guide/ise_sga_pol.html -
ASA - Cut-through proxy probleme
I have to configure my ASA 7.2.2 for cut-through proxy but when the users use authentication prompt ,
but only , for (http://1.1.0.2/netaccess/connstatus.html) the ASA send the following message:
User Authentication
User Authentication is not required.
help me
it is ok when one uses cut-through-proxy by ACL :
access-list ACL_INT extended permit tcp object-group PC-UAUTH_DYN host MVINCT19 eq www
access-list ACL_AUTH line 1 extended permit tcp host poste_auvinet host MVINCT19 eq www
aaa-server auth_inside protocol radius
aaa-server auth_inside host SVR-ACS-IN
key xxx
username admin password xxx privilege 15
aaa authentication match ACL_AUTH inside auth_inside
aaa authentication listener http inside port www
on a pix 525 is OKHi,
The config looks good. Please remember that successful authentication is cached (show uauth) and till it expires user will not need to authenticate again.
Please clear uauth and see if it helps.
Regards,
Vivek -
Hasn't anyone out here worked with cut-through proxy
hasn't enyone out here worked with cut-through proxy with acs. is there no one out here to help me out with cut-through proxy.
sebastanHi Sebastan,
For your case, what's the scenario looks like?
Rgds,
AK -
ASA cut through proxy with RADIUS challenge response?
Have this working for IPSEC VPN on same box (tested on 8.2.1 and 8.2.3)
Want to do cut through proxy with challenge response - same ASA and same RADUIS server but using aaa authentication match command and this is what happens...
It looks like the ASA sends a completely different radius authentication request than with VPN authentication request. Is there any way to specify what request is sent?
What the RADIUS Server sees with ASA VPN auth - THIS WORKS OK (included for comparison)
Date: 15/11/2010
Time: 3:53:57 PM
Type: Information
Source: Server
Category: RADIUS
Code: I-006001
Description: A RADIUS Access-Request has been received.
AMID: 0xC8500B80B3D8F49C6CB37E5D32DA6682
Details:
Source Location : 10.xx.21.24
Client Location : 10.xx.21.230:1025
Request ID : 31
Password Protocol : PAP
Input Details : RADIUS Code:1, RADIUS Id:31, , User-Name:xxxx, User-Password:******, NAS-IP-Address:10.xx.21.230, NAS-Port:31, NAS-Port-Type:Virtual, vendor(9):attrib(1):0x1A2000000009011A69703A736F757263652D69703D31302E32312E352E313137, Calling-Station-Id:ip:source-ip=10.21.5.117
Action : Process
What the RADIUS Server sees with ASA cut thru - THIS FAILS (any help V welcome)
Date: 17/11/2010
Time: 2:29:31 PM
Type: Warning
Source: Server
Category: RADIUS
Code: W-006001
Description: An invalid RADIUS packet has been received.
AMID: 0xC19D988F83365F20151C3F6339DEC74B
Details:
Source Location : 10.xx.21.24:1812 (Authentication)
Client Location : 10.xx.21.230:1025
Reason : The sub-protocol of the received RADIUS packet cannot be determined
Request ID : 33
Input Details : 0x01210066055A8B6881266714BDB20380B9FE5FAC01066962333504060AC815E60506000000203D06000000051A2000000009011A69703A736F757263652D69703D31302E34302E352E3131311F1A69703A736F757263652D69703D31302E34302E352E313131
Request Type : Access-Request
Thanks in advance
IBHi Ian,
sorry for the late reaction - do you still need help with this?
The difference between the working (VPN) auth and the failing (CTP) auth seems to be that VPN is using PAP (so no challenge-response!) while the CTP is using MS-Chapv2
So my guess is that your Radius server does not support MS-Chapv2. If that is the case then you may want to try this:
aaa-server () host
no mschapv2-capable
Although this command is not really meant to be used in this scenario, so I'm not sure if it will work but I'm hoping it will make the ASA revert to PAP for all auth requests to this host.
Note that you won't be doing challenge/response, so your passwords will be transmitted over the wire (encrypted).
hth
Herbert -
ASA - cut through proxy authentication for RDP?
I know how to set this up on a router (dynamic access-list - lock and key)... But, I'm having trouble understanding how to setup OUTSIDE to INSIDE cut through proxy authentication for RDP.
OUTSIDE to INSIDE RDP is currently working.
I have 2 servers I want RDP open for..
[*]OUTSIDE 1.1.1.1 to INSIDE 10.10.70.100
[*]OUTSIDE 1.1.1.2 to INSIDE 10.10.50.200
What's required for OUTSIDE users to authenticate on the ASA before allowing port 3389 opens? I was hoping for is a way to SSH into this ASA, login with a special user, then have the ASA add a dynamic ACE on the OUTSISE interface to open 3389 for a designated time limit. Is this possible?
Here is my current config.
[code]
ASA Version 8.2(5)
hostname ASA5505
names
name 10.10.0.0 LANTraffic
name 10.10.30.0 SALES
name 10.10.40.0 FoodServices
name 10.10.99.0 Management
name 10.10.20.0 Office
name 10.10.80.0 Printshop
name 10.10.60.0 Regional
name 10.10.70.0 Servers
name 10.10.50.0 ShoreTel
name 10.10.100.0 Surveillance
name 10.10.90.0 Wireless
interface Ethernet0/0
description TO INTERNET
switchport access vlan 11
interface Ethernet0/1
description TO INSIDE 3560X
switchport access vlan 10
interface Ethernet0/2
shutdown
interface Ethernet0/3
shutdown
interface Ethernet0/4
shutdown
interface Ethernet0/5
shutdown
interface Ethernet0/6
shutdown
interface Ethernet0/7
shutdown
interface Vlan1
no nameif
security-level 50
no ip address
interface Vlan10
description Cisco 3560x
nameif INSIDE
security-level 100
ip address 10.10.1.1 255.255.255.252
interface Vlan11
description Internet Interface
nameif OUTSIDE
security-level 0
ip address 1.1.1.1 255.255.255.224
ftp mode passive
clock timezone PST -8
clock summer-time PDT recurring
dns domain-lookup OUTSIDE
dns server-group DefaultDNS
name-server 8.8.8.8
name-server 4.2.2.2
domain-name test.local
access-list RDP-INBOUND extended permit tcp any host 1.1.1.1 eq 3389
access-list RDP-INBOUND extended permit tcp any host 1.1.1.2 eq 3389
pager lines 24
logging enable
logging timestamp
logging trap warnings
logging device-id hostname
logging host INSIDE 10.10.70.100
mtu INSIDE 1500
mtu OUTSIDE 1500
ip verify reverse-path interface OUTSIDE
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-645.bin
no asdm history enable
arp timeout 14400
global (OUTSIDE) 1 interface
nat (INSIDE) 1 LANTraffic 255.255.0.0
static (INSIDE,OUTSIDE) tcp interface 3389 10.10.70.100 3389 netmask 255.255.255.255
static (INSIDE,OUTSIDE) tcp 1.1.1.2 3389 10.10.50.200 3389 netmask 255.255.255.255
access-group RDP-INBOUND in interface OUTSIDE
route OUTSIDE 0.0.0.0 0.0.0.0 1.1.1.1 1
route INSIDE LANTraffic 255.255.0.0 10.10.1.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
http server enable
http Management 255.255.255.0 INSIDE
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh 10.10.70.100 255.255.255.255 INSIDE
ssh Management 255.255.255.0 INSIDE
ssh 0.0.0.0 0.0.0.0 OUTSIDE
ssh timeout 5
ssh version 2
console timeout 0
threat-detection basic-threat
threat-detection scanning-threat shun
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
webvpn
username scott password CNjeKgq88PLZXETE encrypted privilege 15
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email [email protected]
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:1e9d278ce656f22829809f4c46b04a07
: end
[/code]You're running ASA 8.2(5). In 8.4(2) Cisco added support for what they call Identity Firewall rules. That is, you can make access-lists entries specific to users (or object groups containing users).
There's an overview document on this posted here. It's a bit dated but I believe the only change is that Cisco is now preferring use of the more current Context Directory Agent (CDA) - a free VM they provide - vs. the deprecated AD agent (software service that runs on your DC). -
a quick question since I do not have access to a pix I can not confirm it
say, I want to do pix cut-through proxy and authenticate access via tacacs on per user basis.
I want the user to access smtp user inside the pix will go through tacacs authentication.
my question is "do I need a statement for http on the access-list ?"
thank you.
here is the config
PIX-525# wr t
PIX Version 6.3(1)
access-list 100 permit tcp any host 155.1.1.4 eq http
access-list 100 permit tcp any host 155.1.1.4 eq smtp
access-list 150 permit tcp any host 155.1.1.4 eq http
access-list 150 permit tcp any host 155.1.1.4 eq smtp
access-group 100 in interface outside
static (inside,outside) 155.1.1.4 192.168.1.4 netmask 255.255.255.255 0 0
aaa-server AUTHEN protocol tacacs
aaa authentication match 150 outside AUTHENCut-through proxy is a feature unique to PIX Firewall that allows user-based authentication of inbound or outbound connections. A proxy server analyzes every packet at layer seven of the OSI model, which is a time- and processing-intensive function. By contrast, the PIX Firewall uses cut-through proxy to authenticate a connection and then allow traffic to flow quickly and directly.
http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172790.html -
ASA Cut Through (Authentication) Proxy for a Single ACL
I have a customer that wants to authenticate users at the ASA before being allowed access from the outside into a payroll server on the DMZ. I am aware of the cut through proxy feature, but doesn't that affect all traffic entering the DMZ? Is there a way to only authenticate users accessing one server?
Hi,
Seems to me the easiest way to do this is you are connecting to the destination server with either Browser or CLI based connection.
For example if its a browser based connection then you could configure
username password privilege
access-list PROXY-AUTH extended permit tcp any host eq http
access-list PROXY-AUTH extended permit tcp any host eq https
access-list PROXY-AUTH extended deny ip any any
aaa authentication match PROXY-AUTH LAN LOCAL
I don't think you even need the "deny" statement since there is an implicit deny at the end of each ACL
Where "LAN" is my interface "nameif" connect to my LAN network.
To my understanding if you are using some application for this connection that doesnt apply in this situation then you would have to configure this in another way and the user would have to first connect manually to the ASA for authentication and would then be allowed to connect to the resource.
Have a look at this document for some help
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba6110.shtml
Hope this helps
- Jouni -
ASA Cut through proxy configuration
Hi guys,
I would like to configure limited internet access to olnly a select group of Windows AD users.
I beleive cut-through proxy will allow me to do this, just not sure how to configure it on a Cisco ASA-5510
thanksThe link given will definitely work however you would not be able to select access based on the AD group, if that is what you need to achieve and you have ASA version 8.0 you can work Cut-Through-Proxy together with DAP.
Using Cut-Trough-Proxy with a standard authentication server will only allow or reject depending on the authentication result, but any user within your AD schema will be able to get internet access. If you need to restrict this based o Windows Groups as well your best shot is Cut-Through-Proxy with DAP and LDAP:
http://www.cisco.com/en/US/products/ps6120/products_white_paper09186a00809fcf38.shtml -
Any way to configure web proxy through .mobileconfig file on an iPhone?
My organisation has recently acquired a large amount of iPhones and iPod Touches. As network administrator I am looking at how to ready the devices for our existing wireless network. I've looked into using the iPhone Configuration Utility which works very well, of which I can get each user to update the settings on the device through a .mobileconfig file.
I haven't although found any method of configuring our web proxy server's details.
Having searched online I've only found various responeses dated at least a year ago. Is there any method at all to deploy proxy details to the iPhones/iPod Touches?Hey man I would help with your question. But I also have some Q's. How can I email apple for my concerns? And how can I post my RSS OR in the forum is complicate. As you know for the iPhone apple hasn't changed the way the os looks like it's pretty simple. Last night I was in the T-Mobile store and I saw the new G2 I'm not a android fan just because of their lags. Apperantly the G2 was pretty responsive and I'm sick and tired of apples os for the iPhone its stuck in the past. Apple has to get more creative than android and get it going. Make the iOS 5.0 prettier than androids os. Please
-
Cisco WSA : Is it possible to use web proxy in transparent mode without WCCP router ?
Hello !
I would like to use Cisco WSA as a web proxy in a transparent way (without any configuration in client's web browsers) but i don't have a WCCP router. So, is it possible ?
If yes, how to do this ?
Thank you,
Stephane WalkerHi Stephane
The only alternative to WCCP is PBR (Policy Based Routing). With a simple configuration on the router you can redirect traffic defined as interesting by access list to WSA. On the WSA you need to configure transparent mode (Security Services -> Web Proxy -> Edit Settings -> Proxy Mode: Transparent). You also need to assure that proxy is listening on the port 80 and that HTTPS proxy is enabled (on port 443) if you want to redirect the HTTPS traffic as well.
Sample configuration for Cisco router
access-list 110 permit tcp any any eq www
route-map proxy-redirect permit 10
match ip address 110
set ip next-hop xxx.xxx.xxx.xxx
interface ethernet0/1
ip policy route-map proxy-redirect
xxx.xxx.xxx.xxx is the proxy IP in such case and access-list 110 defines web traffic (HTTP TCP/80) as interesting.
The biggest disadvantage of such solution is lack of failure detection. If the proxy will go down for some reason router will keep redirecting the traffic causing internet access outage.
Routers other than Cisco equipment should also have an option to configure policy based routing.
/Artur
Ps. It's not possible to place the WSA in-line between clients and the internet. -
Win2012R2 VM internet access via WIFI fine but not through a client's Web Proxy Server
Hi
I have a number of VMs running on my win 8.1 laptop. They normally access the internet via the host WIFI in a bridged config. No real issues tho sometimes it takes a reboot to clear out any stale DNS entries.
Now when I go on a client site my internet access on the host laptop is via a web proxy on a LAN connection. If I want this same access running on a standalone "all in" VM , I have a issue since it does not know about the web proxy and it is not
even on the client's LAN . No internet, means no Azure or Office 365.....
So this doesn't make any difference
Is there a way around this .. do I need share a folder/drive or authenticate myself on the Proxy, from the VM.
Anyone had this issue?
Daniel
Freelance consultantHi Daniel,
>>Now when I go on a client site my internet access on the host laptop is via a web proxy on a LAN connection.
"LAN connection" means physical NIC (Realtek PCIe GBE Family Controller) ?
" web proxy " means adding a proxy server IP in IE ?
Bounding the NIC (Realtek PCIe ) to external virtual switch then connect all VMs to that external virtual switch ,still can not access ?
Best Regards
Elton Ji
We
are trying to better understand customer views on social support experience, so your participation in this
interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place.
Maybe you are looking for
-
in automatic payment programme where u can define the ranking order? what is the ranking order ? why should we give the ranking order? plz clarrify this.
-
Identity of the conversion about lunix and tomcat
I lunix mainframe systems to open a certain account privileges cloud In the account to install tomcat 6.0 and the deployment of the WEB project Function mainly through the network tasks can be directly delivered to the mainframe servers, And the resu
-
Windows XP style and JRE 5 update 9,10 and JRE 6.0 problem
Good day. I have an application that is deployed on more than 700 PCs in different countries. Application is being deployed via Java Web Start and is being used by our clients for more than 3 years already. Today we are receiving more and more compla
-
Flash page in EBS 11.5.10.2
Hello, We are shortly going live with R12 and as part of the cutover , we would like to flash some message on the current R11 homepage. Something like -> this is a read only env , please go to url ..... Appreciate if someone can provide inputs i9nto
-
JRockit won't silent uninstall using -mode=silent
i've tried to uninstall JRockit 1.6.0_24-R28 using the -mode=silent in a command window and it keeps prompting me with a window saying "Do you want to uninstall Oracle JRockit JDK R28.1.3 for Java SE 6 with JRMC 4.0.1 installed at D:\Oracle\Java\jroc