Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

Firewall on 1921 K9 blocking UDP traffic it should be allowing

I have a 1921 K9 with a 4 port 10/100/1000 EHWIC switch.

Interface 0/1 = 192.168.1.0

EHWIC = 192.168.5.0

I have Active Directory setup on the 192.168.1.0 network. When I attempt to join the domain from 192.168.5.0 it joins but I get errors. After some troubleshooting using portqry I have found that the services related to class map DomainTrafficUDP are being reported by portqry as being filtered regardless of policy map settings (currently set to allow) I hope someone can shed some light on this.

Building configuration...

Current configuration : 18833 bytes

!

! Last configuration change at 11:20:25 NewYork Thu Apr 19 2012 by dave

! NVRAM config last updated at 13:56:45 NewYork Wed Apr 18 2012 by dave

!

version 15.1

service timestamps debug datetime msec

service timestamps log datetime msec

service password-encryption

!

hostname Bulldog

!

boot-start-marker

boot system usbflash0:c1900-universalk9-mz.SPA.151-3.T.bin

boot-end-marker

!

!

!

no aaa new-model

!

clock timezone NewYork -5 0

clock summer-time NewYork date Apr 6 2003 2:00 Oct 26 2003 2:00

!

no ipv6 cef

no ip source-route

ip cef

!

!

!

ip dhcp excluded-address 192.168.5.1 192.168.5.24

ip dhcp excluded-address 192.168.101.1 192.168.101.10

ip dhcp excluded-address 192.168.100.1 192.168.100.2

ip dhcp excluded-address 192.168.25.1 192.168.25.10

ip dhcp excluded-address 192.168.10.1 192.168.10.10

ip dhcp excluded-address 192.168.5.1 192.168.5.10

ip dhcp excluded-address 192.168.1.1 192.168.1.10

ip dhcp excluded-address 192.168.1.10 192.168.1.254

!

ip dhcp pool Noc

   network 192.168.1.0 255.255.255.0

   dns-server 192.168.1.6 192.168.1.3

   default-router 192.168.1.1

!

ip dhcp pool MGMT

   network 192.168.101.0 255.255.255.240

   dns-server 192.168.1.6 192.168.1.3

   default-router 192.168.101.1

!

ip dhcp pool VDI

   network 192.168.100.0 255.255.255.0

   dns-server 192.168.1.6 192.168.1.3

   default-router 192.168.100.1

!

ip dhcp pool App-Servers

   network 192.168.25.0 255.255.255.240

   dns-server 192.168.1.6 192.168.1.3

   default-router 192.168.25.1

!

ip dhcp pool Ext-Servers

   network 192.168.10.0 255.255.255.240

   dns-server 192.168.1.6 192.168.1.3

   default-router 192.168.10.1

!

ip dhcp pool Int-Server

   network 192.168.5.0 255.255.255.240

   dns-server 192.168.1.6 192.168.1.3

   default-router 192.168.5.1

!

!

ip name-server 192.168.1.6

ip name-server 192.168.1.3

ip port-map kerberos port udp 88

ip port-map user-ldap port udp 389

ip port-map user-SOAP port tcp 9389

ip port-map user-DFSR port tcp 5722

ip port-map user-WINS port tcp 42

ip port-map user-GlobalCatalog port tcp from 3268 to 3269

ip port-map user-NetBiosNR port tcp 137 description NetBios Name Resolution

ip port-map user-RemoteDesktop port tcp 3389 description MS RDP

ip port-map user-SMB port tcp 445

ip port-map user-RPC port tcp from 49152 to 65535

!

multilink bundle-name authenticated

!

parameter-map type protocol-info msn-servers

server name messenger.hotmail.com

server name gateway.messenger.hotmail.com

server name webmessenger.msn.com

parameter-map type protocol-info aol-servers

server name login.oscar.aol.com

server name toc.oscar.aol.com

server name oam-d09a.blue.aol.com

parameter-map type protocol-info yahoo-servers

server name scs.msg.yahoo.com

server name scsa.msg.yahoo.com

server name scsb.msg.yahoo.com

server name scsc.msg.yahoo.com

server name scsd.msg.yahoo.com

server name cs16.msg.dcn.yahoo.com

server name cs19.msg.dcn.yahoo.com

server name cs42.msg.dcn.yahoo.com

server name cs53.msg.dcn.yahoo.com

server name cs54.msg.dcn.yahoo.com

server name ads1.vip.scd.yahoo.com

server name radio1.launch.vip.dal.yahoo.com

server name in1.msg.vip.re2.yahoo.com

server name data1.my.vip.sc5.yahoo.com

server name address1.pim.vip.mud.yahoo.com

server name edit.messenger.yahoo.com

server name messenger.yahoo.com

server name http.pager.yahoo.com

server name privacy.yahoo.com

server name csa.yahoo.com

server name csb.yahoo.com

server name csc.yahoo.com

crypto pki token default removal timeout 0

!

crypto pki trustpoint TP-self-signed-4227729276

enrollment selfsigned

subject-name cn=IOS-Self-Signed-Certificate-4227729276

revocation-check none

!

!

crypto pki certificate chain TP-self-signed-4227729276

certificate self-signed 01

  3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 04050030

  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274

  69666963 6174652D 34323237 37323932 3736301E 170D3132 30343137 31373035

  32395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649

  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 32323737

  32393237 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281

  8100BD97 9407A326 2B2C5E3E 1BEE848C 9DBA6E5E 359E481A 125294BA 19CCF853

  7CEE2B90 58275061 CAD3EEB6 F89CB220 15343AE9 B1BAF818 C94D3036 568EF9F8

  4280497F D1C3579F B8D2AB67 F523FE6A E651DC48 C60E85FC 5361997C 77ACF34A

  F344A000 5E8CDBC9 AB557E60 FC456A08 35B252AC C4CAD14C 181EB7AC AE75CA50

  7A9D0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603

  551D2304 18301680 1483B6F0 CE5D321D CBA30EF9 A22617C3 04676E73 4C301D06

  03551D0E 04160414 83B6F0CE 5D321DCB A30EF9A2 2617C304 676E734C 300D0609

  2A864886 F70D0101 04050003 81810070 B2068055 2153AFFA 3CE445DF B622BCB1

  326AF711 82FC2497 F835F1DA 3F5D367D 99D6342B 4AC087FA 7621945E 9CCBCD90

  994A9B7E 8C8F618B 10E78F0B 8EAAC97F 2C093E65 1B8BC3EB F88C0BB2 D4A4BF7F

  D9C98500 EB16A386 ED160B52 469A3AE4 575FFD45 511CAE55 45AC5D97 2D07F8FD

  6BCE51AC 8150977E 2BC9D8A5 BF3C80

            quit

license udi pid CISCO1921/K9 sn FTX1448Y05L

!

!

!

redundancy

!

!

!

!

no ip ftp passive

!

class-map type inspect match-any SDM_BOOTPC

match access-group name SDM_BOOTPC

class-map type inspect match-any LANMan

description LAN Management

match protocol https

match protocol icmp

match protocol ssh

class-map type inspect imap match-any ccp-app-imap

match  invalid-command

class-map type inspect match-any ccp-cls-protocol-p2p

match protocol edonkey signature

match protocol gnutella signature

match protocol kazaa2 signature

match protocol fasttrack signature

match protocol bittorrent signature

class-map type inspect match-any SDM_DHCP_CLIENT_PT

match class-map SDM_BOOTPC

class-map type inspect match-any ccp-skinny-inspect

match protocol skinny

class-map type inspect match-any sdm-cls-bootps

match protocol bootps

class-map type inspect match-any ccp-cls-insp-traffic

match protocol dns

match protocol ftp

match protocol https

match protocol icmp

match protocol imap

match protocol pop3

match protocol netshow

match protocol shell

match protocol realmedia

match protocol rtsp

match protocol smtp

match protocol sql-net

match protocol streamworks

match protocol tftp

match protocol vdolive

match protocol tcp

match protocol udp

class-map type inspect match-all ccp-insp-traffic

match class-map ccp-cls-insp-traffic

class-map type inspect gnutella match-any ccp-app-gnutella

match  file-transfer

class-map type inspect match-any DesktopAdmin

description Desktop Administrator Services

match protocol http

match protocol https

match protocol icmp

match protocol snmp

match protocol ssh

match protocol user-RemoteDesktop

class-map type inspect match-any user-ldap

match protocol user-ldap

class-map type inspect ymsgr match-any ccp-app-yahoo-otherservices

match  service any

class-map type inspect msnmsgr match-any ccp-app-msn-otherservices

match  service any

class-map type inspect match-any DomainTrafficUDP

description UDP Traffic

match protocol user-ldap

match protocol netbios-ns

match protocol kerberos

class-map type inspect match-any ccp-h323nxg-inspect

match protocol h323-nxg

class-map type inspect match-any ccp-cls-icmp-access

match protocol icmp

match protocol tcp

match protocol udp

class-map type inspect match-any ccp-cls-protocol-im

match protocol ymsgr yahoo-servers

match protocol msnmsgr msn-servers

match protocol aol aol-servers

class-map type inspect aol match-any ccp-app-aol-otherservices

match  service any

class-map type inspect match-all ccp-protocol-pop3

match protocol pop3

class-map type inspect match-any ccp-h225ras-inspect

match protocol h225ras

class-map type inspect match-any ccp-h323annexe-inspect

match protocol h323-annexe

class-map type inspect match-any DomainServerTraffic

description Server Ports

match protocol dns

match protocol ntp

match protocol msrpc

match protocol netbios-dgm

match protocol user-RPC

match protocol user-GlobalCatalog

match protocol user-SMB

match protocol user-DFSR

match protocol ldap

match protocol ldaps

match protocol smtp

match protocol user-WINS

match protocol user-NetBiosNR

match protocol user-SOAP

match protocol netbios-ssn

match protocol microsoft-ds

class-map type inspect pop3 match-any ccp-app-pop3

match  invalid-command

class-map type inspect kazaa2 match-any ccp-app-kazaa2

match  file-transfer

class-map type inspect match-all ccp-protocol-p2p

match class-map ccp-cls-protocol-p2p

class-map type inspect match-any ccp-h323-inspect

match protocol h323

class-map type inspect msnmsgr match-any ccp-app-msn

match  service text-chat

class-map type inspect ymsgr match-any ccp-app-yahoo

match  service text-chat

class-map type inspect match-all ccp-protocol-im

match class-map ccp-cls-protocol-im

class-map type inspect match-all ccp-invalid-src

match access-group 103

class-map type inspect match-all ccp-icmp-access

match class-map ccp-cls-icmp-access

class-map type inspect edonkey match-any ccp-app-edonkey

match  file-transfer

match  text-chat

match  search-file-name

class-map type inspect match-any ccp-dmz-protocols

match protocol dns

class-map type inspect match-any ccp-sip-inspect

match protocol sip

class-map type inspect match-all ccp-dmz-traffic

match access-group name dmz-traffic

match class-map ccp-dmz-protocols

class-map type inspect edonkey match-any ccp-app-edonkeydownload

match  file-transfer

class-map type inspect aol match-any ccp-app-aol

match  service text-chat

class-map type inspect match-all ccp-protocol-imap

match protocol imap

class-map type inspect edonkey match-any ccp-app-edonkeychat

match  search-file-name

match  text-chat

class-map type inspect fasttrack match-any ccp-app-fasttrack

match  file-transfer

class-map type inspect match-all ccp-protocol-http

match protocol http

!

!

policy-map type inspect ccp-permit-icmpreply

class type inspect sdm-cls-bootps

  pass

class type inspect ccp-icmp-access

  inspect

class class-default

  pass

policy-map type inspect p2p ccp-action-app-p2p

class type inspect edonkey ccp-app-edonkeychat

  log

  allow

class type inspect edonkey ccp-app-edonkeydownload

  log

  allow

class type inspect fasttrack ccp-app-fasttrack

  log

  allow

class type inspect gnutella ccp-app-gnutella

  log

  allow

class type inspect kazaa2 ccp-app-kazaa2

  log

  allow

policy-map type inspect im ccp-action-app-im

class type inspect aol ccp-app-aol

  log

  allow

class type inspect msnmsgr ccp-app-msn

  log

  allow

class type inspect ymsgr ccp-app-yahoo

  log

  allow

class type inspect aol ccp-app-aol-otherservices

  log

  reset

class type inspect msnmsgr ccp-app-msn-otherservices

  log

  reset

class type inspect ymsgr ccp-app-yahoo-otherservices

  log

  reset

policy-map type inspect imap ccp-action-imap

class type inspect imap ccp-app-imap

  log

policy-map type inspect pop3 ccp-action-pop3

class type inspect pop3 ccp-app-pop3

  log

policy-map type inspect ccp-inspect

class type inspect ccp-invalid-src

  drop log

class type inspect ccp-protocol-http

  inspect

class type inspect ccp-protocol-imap

  inspect

  service-policy imap ccp-action-imap

class type inspect ccp-protocol-pop3

  inspect

  service-policy pop3 ccp-action-pop3

class type inspect ccp-protocol-p2p

  inspect

  service-policy p2p ccp-action-app-p2p

class type inspect ccp-protocol-im

  inspect

  service-policy im ccp-action-app-im

class type inspect ccp-insp-traffic

  inspect

class type inspect ccp-sip-inspect

  inspect

class type inspect ccp-h323-inspect

  inspect

class type inspect ccp-h323annexe-inspect

  inspect

class type inspect ccp-h225ras-inspect

  inspect

class type inspect ccp-h323nxg-inspect

  inspect

class type inspect ccp-skinny-inspect

  inspect

class class-default

  drop

policy-map type inspect ccp-permit

class type inspect SDM_DHCP_CLIENT_PT

  pass

class class-default

  drop

policy-map type inspect ccp-permit-dmzservice

class type inspect ccp-dmz-traffic

  inspect

class class-default

  drop log

policy-map type inspect LANMgmt

class type inspect LANMan

  inspect

class class-default

  drop log

policy-map type inspect DomainServices-Inspect

class type inspect DomainTrafficUDP

  pass log

class type inspect DomainServerTraffic

  inspect

class class-default

  drop log

policy-map type inspect DesktopServices

description Remote Access and Desktop diag

class type inspect DesktopAdmin

  inspect

class class-default

  drop log

!

zone security dmz-zone

zone security in-zone

zone security out-zone

zone security LAN

zone security INT-Servers

zone security App-Servers

zone-pair security ccp-zp-out-dmz source out-zone destination dmz-zone

service-policy type inspect ccp-permit-dmzservice

zone-pair security ccp-zp-out-self source out-zone destination self

service-policy type inspect ccp-permit

zone-pair security ccp-zp-in-out source in-zone destination out-zone

service-policy type inspect ccp-inspect

zone-pair security ccp-zp-in-dmz source in-zone destination dmz-zone

service-policy type inspect ccp-permit-dmzservice

zone-pair security ccp-zp-self-out source self destination out-zone

service-policy type inspect ccp-permit-icmpreply

zone-pair security In-LAN source in-zone destination LAN

service-policy type inspect LANMgmt

zone-pair security INTServers-Out source INT-Servers destination out-zone

service-policy type inspect ccp-inspect

zone-pair security INZone-zp-INT-Servers source in-zone destination INT-Servers

service-policy type inspect DesktopServices

zone-pair security INTServers-zp-InZone source INT-Servers destination in-zone

service-policy type inspect DomainServices-Inspect

!

!

!

!

!

!

!

interface Loopback0

ip address 192.168.2.1 255.255.255.255

!

interface GigabitEthernet0/0

description $ETH-WAN$$FW_OUTSIDE$

ip address dhcp client-id GigabitEthernet0/0

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat outside

ip virtual-reassembly in

zone-member security out-zone

duplex auto

speed auto

no mop enabled

!

interface GigabitEthernet0/1

description NOC Link$ETH-LAN$$FW_INSIDE$

ip address 192.168.1.1 255.255.255.0

ip access-group 100 in

no ip redirects

no ip unreachables

no ip proxy-arp

ip flow ingress

ip flow egress

ip nat inside

ip virtual-reassembly in

zone-member security in-zone

duplex auto

speed auto

no mop enabled

!

interface GigabitEthernet0/0/0

switchport mode trunk

!

interface GigabitEthernet0/0/1

switchport mode trunk

!

interface GigabitEthernet0/0/2

switchport mode trunk

!

interface GigabitEthernet0/0/3

switchport mode trunk

!

interface Vlan1

description $MGMT$

ip address 192.168.101.1 255.255.255.240

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat inside

ip virtual-reassembly in

zone-member security LAN

!

interface Vlan5

description $Int-Servers$

ip address 192.168.5.1 255.255.255.240

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat inside

ip virtual-reassembly in

zone-member security INT-Servers

!

interface Vlan10

description $Ext-Servers$$FW_DMZ$

ip address 192.168.10.1 255.255.255.240

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat inside

ip virtual-reassembly in

zone-member security dmz-zone

!

interface Vlan25

description $App-Servers$

ip address 192.168.25.1 255.255.255.240

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat inside

ip virtual-reassembly in

zone-member security App-Servers

!

interface Vlan100

description $Usr-Desktops$

ip address 192.168.100.1 255.255.255.0

no ip redirects

no ip unreachables

no ip proxy-arp

ip nat inside

ip virtual-reassembly in

!

ip forward-protocol nd

!

no ip http server

ip http access-class 4

ip http authentication local

ip http secure-server

ip http timeout-policy idle 60 life 86400 requests 10000

!

ip nat inside source list 1 interface GigabitEthernet0/0 overload

ip nat inside source list 3 interface GigabitEthernet0/0 overload

!

ip access-list extended SDM_BOOTPC

remark CCP_ACL Category=0

permit udp any any eq bootpc

ip access-list extended SwitchToDNS

remark CCP_ACL Category=128

permit ip host 192.168.101.2 host 192.168.1.3

permit ip host 192.168.101.2 host 192.168.1.6

ip access-list extended dmz-traffic

remark CCP_ACL Category=1

permit ip any host 192.168.10.2

!

access-list 1 remark CCP_ACL Category=2

access-list 1 permit 192.168.1.0 0.0.0.255

access-list 2 remark HTTP Access-class list

access-list 2 remark CCP_ACL Category=1

access-list 2 permit 192.168.1.0 0.0.0.255

access-list 2 deny   any

access-list 3 remark CCP_ACL Category=2

access-list 3 permit 192.168.100.0 0.0.0.255

access-list 3 permit 192.168.101.0 0.0.0.15

access-list 3 permit 192.168.5.0 0.0.0.15

access-list 3 permit 192.168.10.0 0.0.0.15

access-list 3 permit 192.168.25.0 0.0.0.15

access-list 4 remark Auto generated by SDM Management Access feature

access-list 4 remark CCP_ACL Category=1

access-list 4 permit 192.168.1.0 0.0.0.255

access-list 100 remark Auto generated by SDM Management Access feature

access-list 100 remark CCP_ACL Category=1

access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 22

access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq 443

access-list 100 permit tcp 192.168.1.0 0.0.0.255 host 192.168.1.1 eq cmd

access-list 100 deny   tcp any host 192.168.1.1 eq telnet

access-list 100 deny   tcp any host 192.168.1.1 eq 22

access-list 100 deny   tcp any host 192.168.1.1 eq www

access-list 100 deny   tcp any host 192.168.1.1 eq 443

access-list 100 deny   tcp any host 192.168.1.1 eq cmd

access-list 100 deny   udp any host 192.168.1.1 eq snmp

access-list 100 permit ip any any

access-list 101 remark Auto generated by SDM Management Access feature

access-list 101 remark CCP_ACL Category=1

access-list 101 permit ip 192.168.1.0 0.0.0.255 any

access-list 102 remark Auto generated by SDM Management Access feature

access-list 102 remark CCP_ACL Category=1

access-list 102 permit ip 192.168.1.0 0.0.0.255 any

access-list 103 remark CCP_ACL Category=128

access-list 103 permit ip host 255.255.255.255 any

access-list 103 permit ip 127.0.0.0 0.255.255.255 any

access-list 103 permit ip 192.168.10.0 0.0.0.15 any

!

!

!

!

!

!

control-plane

!

!

!

line con 0

line aux 0

line vty 0 4

access-class 102 in

privilege level 15

password 7 9ASD9RSDEF9SDFT5

login local

transport input ssh

transport output ssh

line vty 5 15

access-class 101 in

privilege level 15

login local

transport input ssh

transport output ssh

!

scheduler allocate 20000 1000

ntp update-calendar

ntp server 208.66.175.36 prefer source GigabitEthernet0/0

ntp server 64.90.182.55 prefer source GigabitEthernet0/0

ntp server 96.47.67.105 prefer source GigabitEthernet0/0

end

Everyone's tags (5)
2 REPLIES
Silver

Firewall on 1921 K9 blocking UDP traffic it should be allowing

add this to your configurations:

access-list 100 permit udp 192.168.5.0 0.255.255.255 192.168.1.0 0.255.255.255

---

Posted by WebUser Neeraj Jagga from Cisco Support Community App

New Member

Re: Firewall on 1921 K9 blocking UDP traffic it should be allowi

Will this allow all UDP communication or only communication on the UDP ports defined in the policy map?

I added this to the running config and tested the ports still return the filtered value. I already opened the ports in the windows firewall so I dont think thats causing the problem.

722
Views
0
Helpful
2
Replies
CreatePlease to create content