Troubleshooting the Firewall Services Module



Similar documents
Troubleshooting the Firewall Services Module

Securing Networks with PIX and ASA

FWSM introduction Intro 5/1

Connecting to the Firewall Services Module and Managing the Configuration

Configuring Role-Based Access Control

Enabling Remote Access to the ACE

Firewall Stateful Inspection of ICMP

Lab Exercise Configure the PIX Firewall and a Cisco Router

Configuring the Firewall Management Interface

Configuring NetFlow Secure Event Logging (NSEL)

Sample Configuration Using the ip nat outside source static

Configuring Network Address Translation

Configuring the Cisco Secure PIX Firewall with a Single Intern

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

A Model Design of Network Security for Private and Public Data Transmission

Lab Configure Cisco IOS Firewall CBAC

Lab Configure a PIX Firewall VPN

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Cisco ASA, PIX, and FWSM Firewall Handbook

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

F-SECURE MESSAGING SECURITY GATEWAY

Administering the Network Analysis Module. Cisco IOS Software. Logging In to the NAM with Cisco IOS Software CHAPTER

IOS Zone Based Firewall Step-by-Step Basic Configuration

Configuring the Switch for the Firewall Services Module

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Configuring the Transparent or Routed Firewall

Sample Configuration Using the ip nat outside source list C

Configuring Denial of Service Protection

Configuring NetFlow Secure Event Logging (NSEL)

- The PIX OS Command-Line Interface -

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Configuring the PIX Firewall with PDM

CCT vs. CCENT Skill Set Comparison

Monitoring the Firewall Services Module

Firewall Stateful Inspection of ICMP

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

PIX/ASA 7.x with Syslog Configuration Example

How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net

Lab Developing ACLs to Implement Firewall Rule Sets

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Firewalls. Chapter 3

Configuring Static and Dynamic NAT Simultaneously

Configuring Logging. Information About Logging CHAPTER

Configuring Class Maps and Policy Maps

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

Configuring the ASA IPS Module

CCNA Access List Sim

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Configuring Basic Settings

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

Configuring Server Load Balancing

INTRODUCTION TO FIREWALL SECURITY

Skills Assessment Student Training Exam

Chapter 11 Network Address Translation

Cisco Configuring Commonly Used IP ACLs

Table of Contents. Configuring IP Access Lists

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide

Using Debug Commands

Lab Configure Basic AP Security through IOS CLI

same-security-traffic through show asdm sessions Commands

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

BONUS TUTORIAL CISCO ASA 5505 CONFIGURATION WRITTEN BY: HARRIS ANDREA ALL YOU NEED TO KNOW TO CONFIGURE AND IMPLEMENT THE BEST FIREWALL IN THE MARKET

IPv6 Diagnostic and Troubleshooting

Configuring Basic Settings

Configuring Basic Settings

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

NEFSIS DEDICATED SERVER

Adding an Extended Access List

Chapter 3 Using Access Control Lists (ACLs)

TROUBLESHOOTING FIREWALLS

Cisco Local Director Abstract. Stephen Gill Revision: 1.0, 04/18/2001

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console

Firewall Authentication Proxy for FTP and Telnet Sessions

Configuring WCCP v2 with Websense Content Gateway the Web proxy for Web Security Gateway

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Topic 7 DHCP and NAT. Networking BAsics.

Configuring System Message Logging

Cisco ASA. Administrators

Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall

Using Debug Commands

The information in this document is based on these software and hardware versions:

ASA 8.X: Routing SSL VPN Traffic through Tunneled Default Gateway Configuration Example

Lab Configuring Access Policies and DMZ Settings

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Per-Packet Load Balancing

Controlling Access Through the Firewall

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

Barracuda Link Balancer Administrator s Guide

Cisco Certified Security Professional (CCSP)

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

Network Simulator Lab Study Plan

PRACTICE WAY TO TEACHING OF NETWORK SECURITY ONE YEAR AFTER. Used devices and their topology. JAROSLAV DOČKAL, PhD 1

ICND IOS CLI Study Guide (CCENT)

Cisco Firewall Technology

Transcription:

25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page 25-6 Other Troubleshooting Tools, page 25-8 Common Problems, page 25-9 Testing Your Configuration This section describes how to test connectivity for the single mode FWSM or for each security context. The following steps describe how to ping the FWSM interfaces, and how to allow hosts on one interface to ping through to hosts on another interface. We recommend that you only enable pinging and debug messages during troubleshooting. When you are done testing the FWSM, follow the steps in the Disabling the Test Configuration section on page 25-5. This section includes: Enabling ICMP Debug Messages and System Messages, page 25-1 Pinging FWSM Interfaces, page 25-2 Pinging Through the FWSM, page 25-4 Disabling the Test Configuration, page 25-5 Enabling ICMP Debug Messages and System Messages Debug messages and system messages can help you troubleshoot why your pings are not successful. The FWSM only shows ICMP debug messages for pings to the FWSM interfaces, and not for pings through the FWSM to other hosts. To enable debugging and system messages, perform the following steps: Step 1 Step 2 To show ICMP packet information for pings to the FWSM interfaces, enter the following command: hostname(config)# debug icmp trace To set system messages to be sent to Telnet or SSH sessions, enter the following command: hostname(config)# logging monitor debug 25-1

Testing Your Configuration Chapter 25 Step 3 Step 4 You can alternately use logging buffer debug to send messages to a buffer, and then view them later using the show logging command. To send the system messages to your Telnet or SSH session, enter the following command: hostname(config)# terminal monitor To enable system messages, enter the following command: hostname(config)# logging enable The following example shows a successful ping from an external host (209.165.201.2) to the FWSM outside interface (209.165.201.1): hostname(config)# debug icmp trace Inbound ICMP echo reply (len 32 id 1 seq 256) 209.165.201.1 > 209.165.201.2 Outbound ICMP echo request (len 32 id 1 seq 512) 209.165.201.2 > 209.165.201.1 Inbound ICMP echo reply (len 32 id 1 seq 512) 209.165.201.1 > 209.165.201.2 Outbound ICMP echo request (len 32 id 1 seq 768) 209.165.201.2 > 209.165.201.1 Inbound ICMP echo reply (len 32 id 1 seq 768) 209.165.201.1 > 209.165.201.2 Outbound ICMP echo request (len 32 id 1 seq 1024) 209.165.201.2 > 209.165.201.1 Inbound ICMP echo reply (len 32 id 1 seq 1024) 209.165.201.1 > 209.165.201.2 The preceding example shows the ICMP packet length (32 bytes), the ICMP packet identifier (1), and the ICMP sequence number (the ICMP sequence number starts at 0 and is incremented each time a request is sent). Pinging FWSM Interfaces To test that the FWSM interfaces are up and running and that the FWSM and connected routers are routing correctly, you can ping the FWSM interfaces. Note You can ping only the closest interface. Pinging the far interface is not supported. To ping the FWSM interfaces, perform the following steps: Step 1 Create a sketch of your single mode FWSM or security context showing the interface names, security levels, and IP addresses. The sketch should also include any directly connected routers, and a host on the other side of the router from which you will ping the FWSM. You will use this information for this procedure as well as the procedure in the Pinging Through the FWSM section on page 25-4. For example: 25-2

Chapter 25 Testing Your Configuration Figure 25-1 Network Sketch with Interfaces, Routers, and s 209.265.200.230 10.1.1.56 10.1.3.6 209.165.201.24 10.1.1.2 192.168.1.2 192.168.2.2 10.1.2.2 dmz1 192.1 68.1. dmz2 192.168.2.1 security40 209.265.200.226 209.165.201.2 outside 209.165.201.1 security0 inside 192.168.0.1 security100 192.168.0.2 10.1.0.2 Routed FWSM dmz3 192.1 68.3. 10.1.3.2 192.168.3.2 dmz4 192.168.4.1 security80 192.168.4.2 10.1.4.2 10.1.2.90 10.1.4.67 10.1.0.34 209.165.201.1 10.1.0.1 outside security0 inside security100 10.1.0.2 10.1.1.1 Transp. FWSM 10.1.0.3 10.1.1.5 132877 Step 2 Step 3 To enable ICMP to the FWSM, enter the following command: hostname/contexta(config)# icmp permit any interface_name Enter this command for each interface you want to test. Ping each FWSM interface from the directly connected routers. For transparent mode, ping the management IP address. This test ensures that the FWSM interfaces are active and that the interface configuration is correct. A ping might fail if the FWSM interface is not active, the interface configuration is incorrect, or if a switch between the FWSM and router is down (see Figure 25-2). In this case, no debug messages or system messages appear on the FWSM, because the packet never reaches it. Figure 25-2 Ping Failure at FWSM Interface Ping? FWSM 132878 If the ping reaches the FWSM, and the FWSM responds, you see debug messages like the following: ICMP echo reply (len 32 id 1 seq 256) 209.165.201.1 > 209.165.201.2 ICMP echo request (len 32 id 1 seq 512) 209.165.201.2 > 209.165.201.1 25-3

Testing Your Configuration Chapter 25 If the ping reply does not return to the router, then you might have a switch loop or redundant IP addresses (see Figure 25-3). Figure 25-3 Ping Failure Because of IP Addressing Problems Ping FWSM 132879 Step 4 Ping each FWSM interface from a remote host. For transparent mode, ping the management IP address. This test checks that the directly connected router can route the packet between the host and the FWSM, and that the FWSM can correctly route the packet back to the host. A ping might fail if the FWSM does not have a route back to the host through the intermediate router (see Figure 25-4). In this case, the debug messages show that the ping was successful, but you see system message 110001 indicating a routing failure. Figure 25-4 Ping Failure Because the FWSM has no Route Ping FWSM 132880 Pinging Through the FWSM After you successfully ping the FWSM interfaces, you should make sure traffic can pass successfully through the FWSM. For routed mode, this test shows that NAT is working correctly, if configured. For transparent mode, which does not use NAT, this test confirms that the FWSM is operating correctly; if the ping fails in transparent mode, contact Cisco TAC. To ping between hosts on different interfaces, perform the following steps: Step 1 Step 2 Step 3 To add an access list allowing ICMP from any source host, enter the following command: hostname(config)# access-list ICMPACL extended permit icmp any any By default, when hosts access a lower security interface, all traffic is allowed through. However, to access a higher security interface, you need the preceding access list. To assign the access list to each source interface, enter the following command: hostname(config)# access-group ICMPACL in interface interface_name Repeat this command for each source interface. To enable the ICMP inspection engine, so ICMP responses are allowed back to the source host, enter the following commands: hostname(config)# class-map ICMP-CLASS hostname(config-cmap)# match access-list ICMPACL hostname(config-cmap)# policy-map ICMP-POLICY hostname(config-pmap)# class ICMP-CLASS 25-4

Chapter 25 Testing Your Configuration hostname(config-pmap-c)# inspect icmp hostname(config-pmap-c)# service-policy ICMP-POLICY global Step 4 Alternatively, you can also apply the ICMPACL access list to the destination interface to allow ICMP traffic back through the FWSM. Ping from the host or router through the source interface to another host or router on another interface. Repeat this step for as many interface pairs as you want to check. If the ping succeeds, you see a system message confirming the address translation for routed mode (305009 or 305011) and that an ICMP connection was established (302020). You can also enter the show xlate and show conns commands to view this information. If the ping fails for transparent mode, contact Cisco TAC. For routed mode, the ping might fail because NAT is not configured correctly (see Figure 25-5). This is more likely if you enable NAT control. In this case, you see a system message showing that the NAT translation failed (305005 or 305006). If the ping is from an outside host to an inside host, and you do not have a static translation (which is required with NAT control), you see message 106010: deny inbound icmp. Note The FWSM only shows ICMP debug messages for pings to the FWSM interfaces, and not for pings through the FWSM to other hosts. Figure 25-5 Ping Failure Because the FWSM is not Translating Addresses Ping 192.168.1.2 192.168.1.2 192.168.1.1 FWSM 132881 Disabling the Test Configuration After you complete your testing, disable the test configuration that allows ICMP to and through the FWSM and that prints debug messages. If you leave this configuration in place, it can pose a serious security risk. Debug messages also slow the FWSM performance. To disable the test configuration, perform the following steps: Step 1 Step 2 Step 3 To disable ICMP debug messages, enter the following command: hostname(config)# no debug icmp trace To disable logging, if desired, enter the following command: hostname(config)# no logging on To disable ICMP to the FWSM for all interfaces, enter the following command: hostname/contexta(config)# clear icmp 25-5

Reloading the FWSM Chapter 25 Step 4 Step 5 If you want to disable ICMP for a certain interface, use the no icmp permit command. To remove the ICMPACL access list, and also delete the related access-group commands, enter the following command: hostname(config)# no access-list ICMPACL (Optional) To disable the ICMP inspection engine, enter the following command: hostname(config)# no service-policy ICMP-POLICY Reloading the FWSM In multiple mode, you can only reload from the system execution space. To reload the FWSM, enter the following command: hostname# reload Performing Password Recovery If you forget passwords, or you create a lockout situation because of AAA settings, the following sections describe how to recover: Clearing the Application Partition Passwords and AAA Settings, page 25-6 Resetting the Maintenance Partition Passwords, page 25-7 Clearing the Application Partition Passwords and AAA Settings The FWSM maintenance partition software has a bug (CSCsl87478) that causes password recovery to fail if the FWSM is configured in multicontext mode, because AAA settings cannot be removed from the admin context. If your FWSM is affected by this bug, you can choose one of the following options to correct the problem: You can copy a new software image to the CF:4 application partition from the maintenance partition. This action erases the flash on the CF:4 application partition, which results in the loss of the activation key and any configurations that were on that partition. You can use the maintenance partition to copy an image to the second application partition on CF:5. You can boot into the CF:5 application partition and update the maintenance partition software to Version 2.1.4. Then you can run regular password recovery from the maintenance partition and clear the AAA configuration on the CF:4 application partition. This method enables you to preserve the configuration and activation key on the CF:4 application partition. You must have maintenance partition software Version 2.1.4 or later installed to prevent password recovery failure. 25-6

Chapter 25 Performing Password Recovery If you forget the login and enable passwords, or you create a lockout situation because of AAA settings, you can reset the passwords and portions of AAA configuration to the default values. You must log into the maintenance partition to perform this procedure. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Check the current application boot partition by entering the following command at the switch prompt: Router# show boot device [mod_num] The output shows the boot partition for the module as cf:4 or cf:5. Later in this procedure, you specify the boot partition for which you want to clear passwords. To boot the FWSM into the maintenance partition, enter the following command: Router# hw-module module mod_num reset cf:1 To session into the FWSM, enter the following command: Router# session slot mod_num processor 1 To log into the maintenance partition as root, enter the following command: Login: root Enter the password at the prompt: Password: password By default, the password is cisco. To clear the login and enable passwords, as well as the aaa authentication console and aaa authorization command commands, enter the following command: root@localhost# clear passwd cf:{4 5} Specify the boot partition for which you want to clear passwords. By default, the FWSM boots from cf:4. See Step 1 for more information about viewing the boot partition. Follow the screen prompts, as follows: Do you wish to erase the passwords? [yn] y The following lines will be removed from the configuration: enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted Do you want to remove the commands listed above from the configuration? [yn] y Passwords and aaa commands have been erased. Resetting the Maintenance Partition Passwords If you forget the passwords for the maintenance partition, you can reset them to the default values. You must be logged into the application partition. In multiple mode, you can only reset the passwords from the system execution space. To reset the maintenance passwords, enter the following command: hostname# clear mp-passwd 25-7

Other Troubleshooting Tools Chapter 25 Other Troubleshooting Tools The FWSM provides other troubleshooting tools to be used in conjunction with Cisco TAC: Viewing Debug Messages, page 25-8 Capturing Packets, page 25-8 Viewing the Crash Dump, page 25-8 Viewing Debug Messages Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco TAC. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use. To enable debug messages, see the debug commands in the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference. Capturing Packets Capturing packets is sometimes useful when troubleshooting connectivity problems or monitoring suspicious activity. The FWSM can track packet information for all traffic that passes through the FWSM, including traffic that passes through the network processors and the general-purpose processor. We recommend contacting technical support if you want to use the packet capture feature. See the capture command in the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference. Note The packet capture feature should not be used for any kind of TCP packet reordering or other similar performance troubleshooting. Because of the FWSM architecture, the order of packets matching the capture ACL may not be preserved in transit. In addition, the network processor completion unit cannot preserve the order of the transit traffic that is being captured. As a result, enabling capture itself may cause performance issues with the matching transit traffic. Viewing the Crash Dump If the FWSM crashes, you can view the crash dump information. We recommend contacting Cisco TAC if you want to interpret the crash dump. See the show crashdump command in the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference. 25-8

Chapter 25 Common Problems Common Problems This section describes common problems with the FWSM, and how you might resolve them. When you reset the FWSM from the switch CLI, the system always boots into the maintenance partition. The default boot partition is set to cf:1. Recommended Action Change the default boot partition according to the Setting the Default Boot Partition section on page 2-13. You are unable to log into the maintenance partition with the same password as the application partition. databases. The application partition and the maintenance partition have different password Recommended Action Use the password appropriate for your partition. See the Changing the Passwords section on page 7-1 for more information. Traffic does not pass through the FWSM. The VLANs are not configured on the switch or are not assigned to the FWSM. Recommended Action Configure the VLANs and assign them to the FWSM according to the Assigning VLANs to the Firewall Services Module section on page 2-2. You cannot configure a VLAN interface within a context. You did not assign that VLAN to the context. Recommended Action Assign VLANs to contexts according to the Configuring a Security Context section on page 4-18. You cannot add more than one switched virtual interface (SVI) to the. You did not enable multiple SVIs. Recommended Action Enable multiple SVIs according to the Adding Switched Virtual Interfaces to the section on page 2-5. You cannot make a Telnet connection or SSH to the FWSM interface. You did not enable Telnet or SSH to the FWSM. Recommended Action Enable Telnet or SSH to the FWSM according to the Allowing Telnet Access section on page 21-1 or the Allowing SSH Access section on page 21-2. 25-9

Common Problems Chapter 25 You cannot ping the FWSM interface. You did not enable ICMP to the FWSM. Recommended Action Enable ICMP to the FWSM according to the Allowing ICMP to and from the FWSM section on page 21-10. You cannot ping through the FWSM, even though the access list allows it. You did not enable the ICMP inspection engine or apply access lists on both the source and destination interfaces. Recommended Action Because ICMP is a connectionless protocol, the FWSM does not automatically allow returning traffic through. In addition to an access list on the source interface, you either need to apply an access list to destination interface to allow replying traffic, or enable the ICMP inspection engine, which treats ICMP connections as stateful connections. Traffic does not go through the FWSM from a higher security interface to a lower security interface. You did not apply an access list to the higher security interface to allow traffic through. Unlike the PIX firewall, the FWSM does not automatically allow traffic to pass between interfaces. Recommended Action Apply an access list to the source interface to allow traffic through. See the Adding an Extended Access List section on page 10-6. Traffic does not pass between two interfaces on the same security level. You did not enable the feature that allows traffic to pass between interfaces on the same security level. Recommended Action Enable this feature according to the Allowing Communication Between Interfaces on the Same Security Level section on page 6-5. When the FWSM fails over, the secondary unit does not pass traffic. You did not assign the same VLANs for both units. Recommended Action Make sure to assign the same VLANs to both units in the switch configuration. 25-10