You are on page 1of 55

Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.

SEC-340 3143_05_2001_c1_X.scr
2 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Troubleshooting Firewalls
Session SEC-3020
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
333 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
444 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
555 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
How the PIX Processes a Packet
Public Private
Entering PIX
Leaving PIX
Packet Processed
Against ASA
Adaptive
Security
Algorithm
Randomize Sequence Numbers
Xlate & Connection Objects
Stateful Inspection
Security Levels
Other rules
666 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Security = 40
Security = 0
Corp Security = 30
Security = 100
Security Levels
Security Levels Specify the Trust between interfaces
Access from a higher security level (100) to a lower (40)
security requires a nat/global or static translation
Access from a lower security level (0) to a higher security
level (30) requires a static and an access-list/conduit
Traffic between same security levels (DMZ = 30) and
(DMZ1 = 30)
Security = 30 Eng
Outside
Inside
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
777 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
888 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
999 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Is Syslog?
Message sent by the PIX to report activity to and thru the PIX
Appear on your console, buffer and syslog server
Private Public
%PIX-6-308001: PIX console enable password incorrect for numtries (from IP_addr)
Explanation: This is a PIX Firewall management message. This message is logged
after the numnumber of times a user incorrectly types the password
to enter privileged mode. The maximum is three attempts.
Action: The privileged mode password is not necessarily the same as the password
for Telnet access to the PIX Firewall. Verify the password and try again.
Example of Syslog Message
10 10 10 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Configuring and Using Syslog
pixfirewall (config) # Logging trap 7
pixfirewall (config) # Logging host inside 171.68.9.137
pixfirewall (config) # Logging console 7
pixfirewall (config) # Logging buffered 7
pixfirewall (config) # Logging on
Log level for
messages to
Syslog server
Host = IP address
of Syslog server
Log level for serial
console port
Log level for
internal buffer
Turn Logging on
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
11 11 11 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Reading a Syslog Message
Message ID: See PIX Syslog documentation
for specific explanations
Severity Level: Range 1-7, the lower the
number, the more severe the condition.
%PIX-6-308001: PIX console enable password incorrect for 3
tries (from 171.68.89.147)
This message was generated by a
12 12 12 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Reading a Syslog Message
Source IP
Address
Destination IP
Address
Type/Code of
Message
Access
Control List
Message
ID
Protocol
%PIX-4-106023: Deny icmp src outside:171.68.88.1
dst inside:171.68.89.147(type 3, code 1) by access-group
"outside_access_in"
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
13 13 13 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Are Modifiable Syslog Levels
Modifiable Syslog Levels
Allows one to move any syslog message to any
syslog level.
Example:
You want to see what web sites users are going to
by logging message PIX-5-304001, which by default
is at level 5 (Notification)
%PIX-5-304001: userxyz@192.168.2.2 Accessed
URL 198.133.219.25:/tac
However, you really dont want to see all the other
syslog messages at level 5 or level 4. Instead, you
want to log level 3 and below, along with the
Accessed URL message.
[no] logging message <syslog_id> level <level>
Levels
0 emergency
1 alert
2 critical
3 errors
4 warnings
5 notifications
6 informational
7 - debugging
14 14 14 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
How to Create Modifiable Syslog Levels
[no] logging message <syslog_id> level <level>
Solution:
Lower syslog message 304001 to level 3 (Error)
PIX(config)# logging message 304001 level 3
- or -
PIX(config)# logging message 304001 level error
Now our syslog looks as follows:
%PIX-3-304001: userxyz@192.168.2.2 Accessed URL
198.133.219.25:/tac
To restore the default syslog level:
PIX(config)# no logging message 304001 level
error
- or
PIX(config)# logging message 304001 level 5
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
15 15 15 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Clear Modifiable Syslog Levels
To restore all of the currently changed syslogs back to their
default levels:
PIX(config)# clear logging level
To view all messages with modified levels:
PIX# show logging level
syslog 304001: default-level notification, current-level error
(enabled)
To view all disabled messages:
PIX# show logging disabled
no logging message 106023
clear logging level
show logging [{message [<syslog_id>|all]} | level | disabled]
Question: If a user only wants to display a couple syslogs, what is
the easiest way to accomplish this?
16 16 16 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
View Modifiable Syslog Levels
To view a particular message:
PIX# show logging message 304001
syslog 304001: default-level notifications, current-
level errors (enabled)
To view all messages with modified levels, and all
disabled messages:
PIX# show logging message
syslog 302010: default-level informational (disabled)
syslog 304001: default-level notifications, current-
level errors (enabled)
To view all syslog messages and their current and
default level, and their status:
PIX# show logging message all
show logging [{message [<syslog_id>|all]} | level | disabled]
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
17 17 17 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Verify Syslog
PIX515c# show logging
Syslog logging: enabled
Timestamp logging: disabled
Standby logging: disabled
Console logging: level debugging, 404 messages logged
Monitor logging: disabled
Buffer logging: level debugging, 5 messages logged
Trap logging: level debugging, facility 20, 404 messages logged
Logging to inside 171.68.9.137
History logging: disabled
302002: Teardown TCP connection 1 faddr 172.16.171.235/23 gaddr
172.16.171.234/1025 laddr 172.16.171.3/22548 duration 0:00:23 bytes
274 (TCP FINs)
Logging Turned
On
Different Output
Locations
Example of a
syslog message
18 18 18 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Syslog Levels in PIX
9 (265) Debugging 7
87 (256) Informational 6
19 (169) Notifications 5
38 (140) Warnings 4
49 (102) Errors 3
18 (53 possible) Critical 2
35 Alerts 1
0 Emergencies 0
# of Messages Description Log Level
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
19 19 19 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Show Commands
Tracebacks (6.3)
ACL Logging (6.3)
Output Interpreter
PDM (3.0)
20 20 20 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
An Introduction to Debug
Detail level analysis
to help troubleshoot
protocols operating
with and through the
PIX Firewall.
Viewed while using
a console or telnet
session to the PIX
Excellent tool to
test basic IP
connectivity and
complex issues
Debug are CPU intensive
What are they ?
Where can I view them ?
Why use them?
Any Issues to Consider ?
Debug Packet
<option>
Debug ICMP
Trace
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
21 21 21 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Debug ICMP Trace
Private
Network
Internet
http://www.xyz.com
1 1 User able to access Internet? No
2 2
Can access private network? Yes
3 3 Any Syslog messages? No
4 4 Test IP connectivity at this time
12: Outbound ICMP echo request (len 32 id 2 seq 33538) 10.10.10. 1 > 63.1.1.5 > 200.1.1.1
13: Inbound ICMP echo reply (len 32 id 2 seq 33538) 200.1.1.1 > 63.1.1.5 > 10.10.10.1
Example of Debug ICMP Trace to test successful ip connectivity
5 5 pixfirewall (config) # debug icmp trace
22 22 22 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Notes on Debugging ICMP Trace
Bob
Inside
DMZ
Outside
Internet
1 1
User can only ping interface directly connected to it 1 1
2 2
ICMP has to be explicitly permitted thru the PIX Firewall to test IP
connectivity
2 2
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
23 23 23 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Is user able to access private network ? Yes
1 1 User able to access Internet ? No
2 2
3 3 Anything showing up on Syslog ? No
Debug Packet <option>
http://www.xyz.com
Private
Network
Internet
4 4 pixfirewall (config) # debug packet <option>
This Debug will tell the user if the packet is received on the PIX interface
Give the user detailed session info, for eg IP address, ports and flags
Should control the display of this debug by limiting it to IP address and ports
Can be effectively used in conjunction with Syslog to troubleshoot complex issues
24 24 24 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Example of Debug Packet <option>
- - - - - - - - - PACKET - - - - - - - - -
- - I P - -
10. 10. 10. 1 ==> 200. 1. 1. 1.
ver = 0x4 hl en = 0x5 t os = 0xc0 t l en = 0x2c
i d = 0x0 f l ags = 0x0 f r ag of f =0x0
t t l = 0xf f proto=0x6 chksum= 0x4c4c
- - TCP - -
sour ce por t = 0x2af 9 dest por t = 0x50ack
seq = 0x471c8bbb
ack = 0x0
hl en = 0x6 wi ndow = 0x1020
checksum= 0x1ef 9 ur g = 0x0
t cp opt i ons: 0x2 0x4 0x2 0x18
- - DATA - -
0000002c: 00 00 cc
| . . .
- - - - - - - - - END OF PACKET - - - - - - - - -
TCP
Web traffic on port 80
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
25 25 25 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Disabling Debug Commands
In 6.3 you can now turn off all debugs globally by
issuing "no debug all" and "undebug all or un all for
short.
PIX(config)# show debug
debug icmp trace
debug sip
PIX(config)# un all
PIX(config)# show debug
PIX(config)#
undebug all undebug all
26 26 26 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
27 27 27 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Is Packet Capture
The primary goal of this feature is to produce a standalone tool on the PIX
that captures packets and is useful for network fault isolation.
[ethernet-type <type>] to capture Layer 2 packets such as Arpand PPPoE
packets
Output can be either to Console, tftp file, browser screen using SSL and
save it to pcap file using:
copy capture:<capture-name> tftp://<location>/<pathname> [pcap]
https://<PIXs ip address>/capture/<capture-name>[/pcap]
Pcap or decoded ASCII format is supported
Outside
Network
Inside
Network
Tftp server
28 28 28 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Example of a Capture Command
access-list 100 permit tcp host 200.10.10.10 host 195.1.1.1 eq 80
access-list 100 permit tcp host 195.1.1.1 eq 80 host 200.10.10.10
capture outside1 access-list 100 interface outside
Capturing Traffic on Outside Interface
Viewing Captured Traffic
copy capture:outside1 tftp://10/1/1/10 pcap
OR
https://<PIX_IP>/capture/outside1/pcap
No. Time Source Destination Protocol Info
15 148.701751 10.1.1.1 192.168.1.1 TCP 4511>http[SYN] Seq=27007623614 Ack=0
16 148.704086 192.168.1.1 10.1.1.1 TCP http>4511[SYN,ACK] Seq=979356760..
17 148.705398 10.1.1.1 192.168.1.1 TCP 4511>http[ACK] Seq=2707623615
18 148.701751 10.1.1.1 192.168.1.1 HTTP GET /HTTP/1.1
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
29 29 29 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Packet Capture Output Format
ICMP packet:
<HH:MM:SS.ms> [ether-hdr] <ip-source> > <ip-destination>:
icmp: <icmp-type> <icmp-code> [checksum-failure]
UDP packet:
<HH:MM:SS.ms> [ether-hdr] <src-addr>.<src-port> <dest-addr>.<dst-port>:
[checksum-info] udp <payload-len>
TCP packet:
<HH:MM:SS.ms> [ether-hdr] <src-addr>.<src-port> <dest-addr>.<dst-port>:
<tcp-flags> [header-check] [checksum-info] <sequence-number> <ack-number>
<tcp-window> <urgent-info> <tcp-options>
Other IP packets:
<HH:MM:SS.ms> [ether-hdr] <src-addr> <dest-addr>: <ip-protocol> <ip-
length>
ARP packets: <HH:MM:SS.ms> [ether-hdr] <arp-type> <arp-info>
802.1Q: <HH:MM:SS.ms> [ether-hdr] <VLAN-info> <encap-ether-packet>
Other packets: <HH:MM:SS.ms> [ether-hdr] <hex-dump>
30 30 30 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Capture Command FAQs
30 30 30
SEC-320
5203_05_2002_c1 30
You can have one capture running per interface. This
allows you to capture packets as they enter one
interface, and again as they go out another interface
Currently, the default capture buffer is a 512kb and
once the buffer is full, the PIX stops capturing
packets
The buffer is saved in RAM so before you create the
buffer make sure you have enough RAM available.
PIX Version 6.3 expands the capture to allow a
circular buffer
Once you have captured the packets needed, copy
them off via TFTP or HTTPS
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
31 31 31 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
32 32 32 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Introduction to Traceback
What is a Traceback
In case of any unusual packet that PIX cant process. PIX will
sometimes dumps the memory contents to the console and
reboots.
What causes a Traceback
In case of any unusual packet that PIX cant process; PIX will
sometimes dumps the memory contents to the console and
reboots.
How does one capture it
Beginning with 6.3 crash information can be saved to the
flash and can be retrieved.
How do I analyze it
You dont. Forward it to TAC and we will analyze it for you J
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
33 33 33 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Some Important Traceback Commands
[show|clear] crashinfo :
Displays and clears crash info from flash
crashinfo save [enable|disable] :
Enable or disable of saving of crash into the flash.
(default behavior of the PIX)
show crashinfo save :
Shows whether crash info saving is enable or disabled.
no crashinfo save disable :
Disables automatic saving of crash into flash
34 34 34 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Does a Traceback Look Like
Thread Name: pptp_mgmt (Old pc 0x8024d489 ebp 0x83f2d8c4)
Traceback:
0: 8024da32
1: 8024c7b4
2: 8024d45e
3: 80003029
4: 00000000
vector 0x0000000e (page fault)
edi 0x840ea7a0
esi 0xffffffff
ebp 0x83f2d844
esp 0x83f2d80c
ebx 0x840e9cb8
edx 0x00000009
ecx 0x00000024
eax 0x94b5d1dc
error code 0x00000000
eip 0x8024c88f
.... more of stack dump ....
Cisco PIX Firewall Version 6.2(2)114
Cisco PIX Device Manager Version 2.0(2)
Snip of Traceback
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
35 35 35 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
36 36 36 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
ACL Logging
In PIX 6.2 and below, customers could issue a show
access-list to see the hit count against an ACL line.
Syslogs messages would record every packet that
was denied, and each connection that was created,
but it was very difficult to correlate or aggregate this
information. Also, the deny logs could be
overwhelming.
access-list outside-acl permit ip host 1.1.1.1 any
(hitcnt=10) access-list outside-acl deny ip host 2.2.2.2
any (hitcnt=3)
106023: Deny icmp src outside:2.2.2.2 dst inside:7.0.0.2
(type 0, code 0) by access-group "outside-acl"
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
37 37 37 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Syslogs by ACL in 6.3
Add a log option to the end of an ACE. Also provide
a mechanism to rate-limit the syslogs generated from
the log option.
The logging is only applicable to ACLs that are
configured by the 'access-group' command. As such,
only 'through-traffic' is subject to logging.
access-list <acl_id> permit|deny ...
[log [disable|default] | [<level>] [interval <secs>]]
access-list <acl_id> permit|deny ...
[log [disable|default] | [<level>] [interval <secs>]]
42 42 42 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
43 43 43 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
An Introduction to Show Commands
Show cpu usage
Show xlate <detail>
Show conn <detail>
Show Interface
Show traffic
CLI tool used to
extract
information
from the PIX for
information
or troubleshooting
Used to monitor the
health
of the PIX
and draw a baseline
for your network
Displays current and
past info related to the
PIX Show Perfmon
Show Blocks
Show Memory
Show
processes
44 44 44 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Conn and Show Conn <detail>
pixfirewall (config) # show connection
2 in use, 2 most used
TCP out 192.150.49.10:23 in 10.1.1.15:1026 idle 0:00:22
Bytes 1774 flags UIO
UDP out 192.150.49.10:31649 in 10.1.1.15:1028 idle 0:00:14
Flags D-
pixfirewall (config) # show connection detail
2 in use, 2 most used
Flags: A awaiting inside ACK to SYN, a awaiting outside ACK to SYN,
B initial SYN from outside, D DNS, d dump,
E outside back conection, F outside FIN, f inside FIN,
G group, H H.323, I inbound data, M SMTP data,
m SIP media, O- outbound data, P inside back connection,
q SQL*Net data, R outside acknowledged FIN,
R UDP RPC, r inside acknowledged FIN, S awaiting inside SYN,
s awaiting outside SYN, T SIP, t SIP transient, U up
TCP outside: 192.150.49.10/23 inside:10.1.1.15/1026 flags UIO
UDP outside: 192.150.49.10/31649 inside:10.1.1.15/1028 flags dD
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
45 45 45 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Connection Flags
Reset-I Reset was from inside
Reset-O Reset was from Outside
TCP FINs Normal close down sequence
FIN Timeout Force termination after 15 seconds
SYN Timeout Force termination after 2 min
Xlate Clear Command line removal
Deny Terminate by appln inspection
SYN Control Back Channel Initiation frm wrong side
Uauth Deny Deny by URL Filter
Unknown Catch all error
Connection Termination Reasons
U UP
f Inside FIN
F Outside FIN
r Inside ACK FIN
R Outside ACK FIN
s Awaiting Outside SYN
S Awaiting Inside SYN
M SMTP Data
I Inbound Data
O Outbound Data
Snip of Connection flags and its interpretation
46 46 46 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Xlate and Show Xlate <detail>
pixfirewall (config) # show xlate
3 in use, 3 most used
PAT Global 192.150.49.1(0) Local 10.1.1.15 ICMP id 340
PAT Global 192.150.49.1 (1024) Local 10.1.1.15(1028)
PAT Global 192.150.49.1 (1024) Local 10.1.1.15(516)
pixfirewall (config) # show xlate detail
3 in use, 3 most used
Flags: D DNS, d dump, I identity, I inside, n no random,
o outside, r portmap, s static
TCP PAT from inside:10.1.1.15/1026 to outside:192.150.49.1/1024 flags ri
UDP PAT from inside:10.1.1.15/1028 to outside:192.150.49.1/1024 flags ri
ICMP PAT from inside:10.1.1.15/21505 to outside:192.150.49.1/0 flags ri
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
47 47 47 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Xlate Flags
s Static translation slot
d Dump translation slot on next clearing cycle
r Port map translation
n No randomization of TCP sequence number
o Outside address translation
i Inside address translation
D DNS A RR rewrite
I Identity translation from NAT 0
FLAG DESCRIPTION
48 48 48 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show CPU Usage
First introduced in PIX OS version 6.0(1)
Under normal conditions the PIX CPU should stay below 30% (baseline as per
Network and Pix Model). If the CPU reaches 100% the PIX will start dropping
packets
The show cpu usage command displays the CPU over time as a running
average.
A Note
An Example
pixfirewall# show cpu usage
CPU utilization for 5 seconds = 1%; 1 minute: 2%; 5 minutes: 1%
The percentage usage prints as NA (not applicable) if the usage is unavailable for the
specified time interval. This can happen if the user asks for CPU usage before the 5-
second, 1-minute, or 5-minutes
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
49 49 49 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Traffic
The show traffic command displays the traffic, in packets and in bytes,
out each interface of the PIX.
An Example
pixfirewall# show traffic
outside:
received (in 124.650 secs):
295468 packets 167218253 bytes
2370 pkts/sec 1341502 bytes/sec
transmitted (in 124.650 secs):
260901 packets 120467981 bytes
2093 pkts/sec 966449 bytes/sec
inside:
received (in 124.650 secs):
261478 packets 120145678 bytes
2097 pkts/sec 963864 bytes/sec
transmitted (in 124.650 secs):
294649 packets 167380042 bytes
2363 pkts/sec 1342800 bytes/sec
50 50 50 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Blocks
The show blocks command, along with the show cpu usage
command, are useful in determining whether the PIX is being overloaded.
The blocks are internal storage locations, similar to queues on a router.
A packet is stored in a block until the PIX can process it and place it on the
outbound interface xmit queue.
pixfirewall# show blocks
SIZE MAX LOW CNT
4 1600 1597 1600
80 400 399 400
256 500 495 499
1550 1444 1170 1188
16384 2048 1532 1538
An Example
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
51 51 51 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Local-Host
The show local-host command displays the translation and connection
slots for all local hosts.
The clear local-host command stops traffic on all local hosts.
The clear local-host <ip_address>command stops traffic on the local
host specified by its IP address
show local-host 10.1.1.15
local host: <10.1.1.15>, conn(s)/limit = 2/0, embryonic(s)/limit = 0/0
Xlate(s):
PAT Global 172.16.3.200(1024) Local 10.1.1.15(55812)
PAT Global 172.16.3.200(1025) Local 10.1.1.15(56836)
PAT Global 172.16.3.200(1026) Local 10.1.1.15(57092)
PAT Global 172.16.3.200(1027) Local 10.1.1.15(56324)
PAT Global 172.16.3.200(1028) Local 10.1.1.15(7104)
Conn(s):
TCP out 192.150.49.10:23 in 10.1.1.15:1246 idle 0:00:20 Bytes 449 flags UIO
TCP out 192.150.49.10:21 in 10.1.1.15:1247 idle 0:00:10 Bytes 359 flags UIO
An Example
52 52 52 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Tech-Support Enhancements (6.3)
The show tech output was
enhanced to include some
additional show commands
that can be used to
troubleshoot memory and
performance issues.
On the right are the commands
included in the show tech
output. Note: They are in
order. (New commands are in
red)
show version
show clock
show memory
show conn count
show xlate count
show blocks
show interface
show cpu usage
show process
show failover
show traffic
show perfmon
show running-config
show version
show clock
show memory
show conn count
show xlate count
show blocks
show interface
show cpu usage
show process
show failover
show traffic
show perfmon
show running-config
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
53 53 53 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Output Filters
Output filters have been added to PIX 6.3, similar to the ones in
IOS. To use them, at the end of show <command>, use the pipe
character '|' followed by:
begin|include|exclude|grep [-v] <regular_exp>
to filter the show output.
Begin - start displaying the output beginning at the
first match of the RegEx, and continue to display
the remaining output.
include Display any line that matches the RegEx
exclude Display any line that does not match the RegEx
grep same as include
grep v same as exclude
show <cmd> | begin|include|exclude|grep [-v] <regular_exp> show <cmd> | begin|include|exclude|grep [-v] <regular_exp>
54 54 54 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Output Filters
Note: You must include a space on either side of the pipe for the
command to be accepted. Also, trailing spaces are counted.
EX:
Display the interface stats starting with E2
show interface | begin ethernet2
Display only the route statements
show run | include route
Display the config, except for the access-lists
show run | exclude access-list
Display the access-list entries that contain address 10.1.1.5
show access-list | grep 10.1.1.5
Display only access-list entries that have hitcounts
show access-list | grep v hitcnt=0
show <cmd> | begin|include|exclude|grep [-v] <regular_exp> show <cmd> | begin|include|exclude|grep [-v] <regular_exp>
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
55 55 55 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
56 56 56 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Output Interpreter
Great tool to catch common configuration errors.
Select the output
In question
Paste the output
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
57 57 57 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Output Example
Snip of Output
https://www.cisco.com/cgi-bin/Support/OutputInterpreter/home.pl
Example
Of Messages
58 58 58 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX and FWSM Troubleshooting Tools
Syslog
Debug
Packet Capture (used only on appliance)
Tracebacks (6.3)
ACL Logging (6.3)
Show Commands
Output Interpreter
PDM (3.0)
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
59 59 59 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Is PDM ?
GUI interface to the PIX, designed to manage,
monitor and troubleshoot the PIX
First available with PIX Version
6.0
The PDM image is loaded independently
from the PIX OS image
Excellent tool for secure remote
device management of the PIX
60 60 60 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PDM FAQs
PDM offers a CLI option within the GUI
Can I access the CLI thru PDM?
Displays Syslog within the GUI, and Show comands via the CLI option
Can I view Syslogs and Show commands ?
Will let you view information in a graphical form, thus letting you build a
baseline for activity to and thru the PIX .
How is it different from CLI as far as troubleshooting is concerned
Graphs can be book marked with your settings or exported for further
analysis
Can I save this graphs or export them?
User will have SSL access to the PIX
Is it secure?
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
61 61 61 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Xlate as it Would Appear Graphically
62 62 62 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PDM as a Monitoring Tool
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
63 63 63 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
64 64 64 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
FWSM Common Issues
Configuration Issues
Passing Traffic Outbound
Understanding Failover
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
65 65 65 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Accessing the Internet
Internet
BOB
Web Server
INSIDE
OUTSIDE
10.10.10.x
http://www.xyz.com
Problem:
Accessing The Internet
Troubleshooting:
Translation
Routing
Access-list applied incorrectly
66 66 66 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX needs to be told a translation method to
pass outbound traffic
PIX needs to be told a translation method to
pass outbound traffic
global (outside) 1 interface
nat (inside) 1 10.10.10.0 255.255.255.0
global (outside) 1 192.168.1.1 192.168.1.253
nat (inside) 1 10.10.10.0 255.255.255.0
Verify Translation Commands
static (inside,outside) 192.168.1.254 10.10.10.1 netmask 255.255.255.255
http://www.xyz.com
Internet
Web Server
INSIDE
OUTSIDE 10.10.10.x
.1
.2
.3
Translation
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
67 67 67 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
A Note on Translation
NAT 0 and Access-Lists
Static translations
take precedence
over a NAT/global
translation
Perform a clear xlate if
Changes have been made
to global pools or
static statements
Do not overlap IP
addresses between
statics and
global pools
68 68 68 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Verified Translation 1 1
Verify Route Commands on the PIX
Check to make sure the PIX has the correct default gateway
pixfirewall(config)# route outside 0.0.0.0 0.0.0.0 63.1.1.2
If trying to access the internet from behind a layer 3 device, verify the
PIX has a route to that network
pixfirewall (config)# route inside 172.16.171.0 255.255.255.0 10.10.10.2
172.16.171.x
.2
10.10.10.x
Internet
Web Server
INSIDE
OUTSIDE
.1
63.1.1.x
.1 .2
http://www.xyz.com
.3
Routing
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
69 69 69 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
1 1 Verified Translation
2 2 Verified Routing Information
.2
10.10.10.x
Internet
Web Server
INSIDE
OUTSIDE
.1
63.1.1.x
.1 .2
http://www.xyz.com
.3
Access-Lists
Verify if any access-lists are applied
pixfirewall (config) # access-list acl permit tcp host 10.10.10.3 any eq telnet
pixfirewall (config) # access-group acl in interface inside
If you have an access-list applied on the inside interface, check to make sure
traffic is permitted outbound. Remember, there is an implicit deny at the end
of an access-list
Note
70 70 70 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
FWSM Common Issues
Configuration Issues
Passing Traffic Outbound
Understanding Failover
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
71 71 71 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Accessing Internal Network From Internet
Troubleshooting:
Translation
Routing
Access-list applied incorrectly
Web Server
10.10.10.x
Internet
INSIDE
OUTSIDE
.1
63.1.1.x
.1 .2
.1
http://www.xyz.com
Problem:
Internal Web Server Not Accessible to Users on the Internet
72 72 72 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
http://www.cisco.com
.2
10.10.10.x
Internet
INSIDE
OUTSIDE
.1
63.1.1.x
.1 .2
.1
A Static Translation is required to pass inbound traffic A Static Translation is required to pass inbound traffic
pixfirewall(config) #static(inside,outside) 63.1.1.3 10.10.10.1 netmask 255.255.255.255
Verify Translation Commands
Example of a Syslog Message With No Static Defined
305005: No translation group found for tcp src outside:200.1.1.1/35550 dst inside:63.1.1.3/80
Translation
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
73 73 73 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Check to make sure the PIX has the correct default gateway
pixfirewall(config)# route outside 0.0.0.0 0.0.0.0 63.1.1.2
Verify the PIX has a route to the internal network
pixfirewall(config)# route inside 172.16.171.0 255.255.255 10.10.10.2
Other Issues to Consider
Confirm default gateway on your Web Server
Verify your layer 3 device is routing correctly
http://www.xyz.com
172.16.171.x
.2
10.10.10.x
Internet
Web Server
.1
63.1.1.x
.1 .2
.2
.1
INSIDE OUTSIDE
Routing Issues
74 74 74 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Traffic has to be explicitly allowed into the PIX from a
lower security to a higher security
Traffic has to be explicitly allowed into the PIX from a
lower security to a higher security
Check to make sure you have permitted interesting traffic explicitly
pixfirewall (config) # access-list acl permit tcp any host 63.1.1.5 eq http
pixfirewall (config) # access-group acl in interface outside
If you have an access-list applied, check to make sure traffic is permitted inbound.
Remember, there is an implicit deny at the end of an access-list
Access-Lists
172.16.171.x
.2
10.10.10.x
Internet
Web Server
.1
63.1.1.x
.1 .2
.2
.1
INSIDE OUTSIDE
http://www.xyz.com
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
75 75 75 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
FWSM Common Issues
Configuration Issues
Passing Traffic Outbound
Understanding Failover
76 76 76 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Issues with Traffic Between Interfaces
1 1
1 1 Static and Access-list/conduit
DMZ 1 (40)
INSIDE (100)
DMZ (30)
OUTSIDE (0)
Static and Access-list/conduit
2 2
2 2
Static or a NAT/Global Statement
3 3
3 3
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
77 77 77 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
FWSM Common Issues
Configuration Issues
Passing Traffic Outbound
Understanding Failover
78 78 78 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX Is NOT Redirecting
172.16.171.x
.2
10.10.10.x
Internet
INSIDE
OUTSIDE
.1
63.1.1.x
.1 .2
http://www.xyz.com
.1
1 1 PIX will not handle redirects
2 2
Change users default gateway to be the layer 3 device
3 3 Modify the layer 3 devices default gateway to be the
PIX
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
79 79 79 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
FWSM Common Issues
Configuration Issues
Passing Traffic Outbound
Understanding Failover
80 80 80 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
PIX Failover
PIX
Failover
Cable
Active Unit Standby Unit
If the primary PIX fails, the secondary will take over the duties of the
primary to perform its functionality
Identical hardware and software is required for failover
A mechanism to provide high availability in your network
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
81 81 81 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Failover On
Cable status: Normal
Reconnect timeout 0:00:00
This host: Primary - Standby (Failed)
Active time: 7140 (sec)
Interface 0 (192.168.1.1): Normal (Waiting)
Interface 1 (172.16.171.54): Failed (Waiting)
Other host: Secondary - Active
Active time: 30 (sec)
Interface 0 (192.168.1.3): Normal (Waiting)
Interface 1 (172.16.171.55): Normal (Waiting)
pixfirewall (config)# show failover
Commands to Verify Failover Is Active
82 82 82 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Network Interf
Status Test
Network Activity
Test
ARP Test
Ping Test
Power Failure
Failover
Cable Failure
Why Will Failover Happen?
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
83 83 83 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
How to Verify Why it Failed Over
No proper ACK for 15+ seconds after a command has been sent on
the serial cable.
3
An interface did not pass one of the 4 failover tests. 2
No Failover hello seen on Serial cable for 30 + seconds. This
ensures that Failover is running properly on the other PIX.
1
If you see the following syslogmessage after a failover:
%PIX-1-103001: (Secondary) No response from other firewall
(reason code = code).
and you want to know what the reason code is, look at the table below.
86 86 86 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Best Practices for Failover
Hardcode transmission speed and duplex settings
on PIX and switch ports
PIX:
interface ethernet0 100full
Cat6K:
set port speed 3/25 100
set port duplex 3/25 full
Enable Port Fast
Turn off Trunking and Channeling
Licensing Issues
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
87 87 87 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
Password Recovery
FWSM Common Issues
Configuration Issues
Passing Traffic Outbound
Understanding Failover
88 88 88 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Password Recovery
For Password Recovery you need the PIX
Password Lockout Utility
e.g. np63.bin for PIX 6.3 release
Each IOS release has its own password recovery file.
You also need a TFTP server.
You need to bring down the PIX into ROM
Monitor mode.
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
89 89 89 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Password Recovery
Issue the following commands:
monitor> interface 0
monitor> address 10.21.1.99
monitor> server 172.18.125.3
monitor> file np63.bin
monitor> gateway 10.21.1.1
monitor> tftp
Do you wish to erase the passwords? [yn] y
Passwords have been erased.
Rebooting....
http://www.cisco.com/warp/public/110/34.shtml
Online Resource
90 90 90 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
Password Recovery
FWSM Common Issues
Configuration Issues
Connectivity Issues
Understanding Failover
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
91 91 91 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Understanding the Configuration
FWSM
inside
Vlan 60
10.60.1.0/24
Vlan 30
10.30.1.0/24
10.30.1.1
10.60.1.1
outside
CatOS 7.5(1)
6K> (enable) set vlan 30 8/1,60 8/2
6K> (enable) set vlan 30,60 firewall
5
vlans 30,60 declared secure for
firewall module 5
-----------------
6K> (enable) session 5
FWSM#conf t
nameif 30 outside 0
nameif 60 inside 100
ip address outside 10.30.1.2/0
ip address inside 10.60.1.1/24
Native IOS - 12.1(13)E
Router#config t
!
vlan 30,60
firewall vlan-group 1 30,60
firewall module 5 vlan-group 1
!
int fa8/1
switchport access vlan 30
Int fa8/2
switchport access vlan 60
-----------------
FWSM#conf t
nameif 30 outside 0
nameif 60 inside 100
ip address outside 10.30.1.1/0
ip address inside 10.60.1.1/24
Slot 5
Fa8/1
Fa8/2
92 92 92 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Vlan 30
Vlan 40 Vlan 50
Vlan 60
FWSM
Firewall vlan-group 1 30,40,50,60
Firewall module 5 vlan-group 1
!
Interface VLAN 30
ip address 10.30.1.1/24
!
Interface VLAN 70
ip address 10.70.1.1/24
!
session slot 5 processor 1
nameif 30 outside 0
nameif 40 dmz1 40
nameif 50 dmz2 50
nameif 60 inside 100
ip address outside 10.30.1.2/0
route outside 0/0 10.30.1.1
ip address inside 10.60.1.1/24
jp address dmz1 10.40.1.1/24
ip address dmz2 10.50.1.1/24
outside
Vlan 70
dmz1 dmz2
inside
10.70.1.0/24
10.30.1.0/24
10.40.1.0/24 10.50.1.0/24
10.60.1.0/24
Catalyst
6500
FWSM and the MSFC
MSFC
.1
.2
Internet
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
93 93 93 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
FWSM Key Configuration Issues
Restrictions
A VLAN can belong to only one firewall group
A max of 100 VLANS supported per FWSM
Hidden VLANs or default VLAN cannot be configured as a firewall
VLAN
One SVI Rule
Guidelines
Restrict Trunks to carry Firewall VLAN
Do not map the same Firewall group to two different blades (unless
it is a redundant setup)
VTP should be in transparent mode
94 94 94 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
Password Recovery
FWSM Common Issues
Configuration Issues
Connectivity Issue
Understanding Failover
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
95 95 95 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
FWSM Did We Not Cover This?
95 95 95
SEC-320
5203_05_2002_c1 95
Resolution
nameif vlan208 outside security0
nameif vlan336 inside security100
access-list letmein permit ip any any
ip address outside 10.66.79.140 255.255.255.224
ip address inside 10.1.1.1 255.255.255.0
global (outside) 1 interface
nat (inside) 1 10.1.1.0 255.255.255.0 0 0
access-group letmein in interface inside
route outside 0.0.0.0 0.0.0.0 10.66.79.129 1
Problem:
Cannot Pass Traffic Outbound
96 96 96 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Issues
PIX Common Issues
Accessing the Internet
Accessing Internal Network from the Internet
Issues with traffic between interfaces
PIX Not Redirecting
Failover
Password Recovery
FWSM Common Issues
Configuration Issues
Connectivity Issue
Understanding Failover
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
97 97 97 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Failover (Intra and Inter Chassis)
A dedicated logical interface (VLAN interface) is created for failover
communications uses failover protocol to detect a failure
Cat6K
FWSM FWSM
Cat6K Cat6K
FWSM
FWSM
98 98 98 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
FWSM Failover: Things to Note
Configuration is performed on the primary unit
The primary unit is designated using the failover lan unit
primary command
Assign the same IP address to that interface as the one
you assigned to the primary unit
Using the failover ip address command, assign the same
address you used on the primary unit
Unit will only fail over if over 50 % interfaces have failed
(CSCea87456)
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
99 99 99 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
100 100 100 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
IOS Firewall Platform Compatibility
IOS Firewall was introduced in 12.0(5)T
Flash and RAM requirements vary depending on
the router platform
Router platforms include:
Small Office: 800* and uBR900 series
Branch Offices: 1600, 2500, 2600, and 3600 series
WAN and high throughput: 7100, 7200, 7500, and RSM
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
101 101 101 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Are the Features of IOS Firewall?
Policy based
multi-interface
support
Java blocking
Per-user
authentication
and
authorization
Basic and
advanced traffic
filtering
Dynamic port
mapping
Intrusion
detection
Real time alerts
and audit trail
DoS detection
and prevention
Stateful packet
inspection
102 102 102 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
CBAC Packet Flow
I PSec
Pkt ?
No St at e I DS
I nput I nt
Aut h
Proxy
I nbound ACL
I nput I nt
Decrypt
Packet
Save addr
and port
i f NAT cfg
St at el ess
I DS - I nput
I nbound
I nput ACL
NAT Bef ore
Rout i ng
Rout i ng NAT Af t er
Rout i ng
No St at e I DS
Out put I nt
Fragment
I nspecti on
Pkt
NATed?
Fi nd
Pregen?
Out bound ACL
Out put I nt
Creat e
Output ACL
CBAC and
State based
I DS
I PSec
Pkt ?
Encrypt
Packet
Y
N
Y Y
N
N
Y
N
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
103 103 103 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
104 104 104 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Best Tool Is to Understand How CBAC Works
Why Access-Lists What Do I Inspect? and
or
Are these dynamic holes
ACLs safe?
Why do I Inspect? and
Internal Network External Network
e0
e1
Can this crash my router
Do I inspect all interfaces
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
105 105 105 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
What Is CBAC
Allow Return Traffic
Deny Traffic Initiating from Outside
Inside Outside
access- l i st 101 deny i p any any
i nterf ace ethernet1
i p access- group 101 i n
i p i nspect name f oo tcp
i nterf ace ethernet0
i p i nspect f oo i n
SYN
SYN + ACK
ACK
access- l i st 101 permi t t cp host B eq b host A eq a
access- l i st 101 deny i p any any
i nterf ace ethernet1
i p access- group 101 i n
access- l i st 101 permi t t cp host B eq b host A eq a
access- l i st 101 deny i p any any
i nterf ace ethernet1
i p access- group 101 i n
A:a
A:a
A:a
B:b
B:b
B:b
106 106 106 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Access-List Guidelines
Configure access lists including entries that permit
certain ICMP traffic from unprotected networks;
routers will need to see certain ICMP traffic from
these networks
Access lists must explicitly permit ICMP messages
from the outside to the inside as CBAC will not
currently inspect ICMP traffic for return packets
Anti-spoofing protection with an access list denying
network traffic from a source address that matches
an address on the protected network
Add an entry to block broadcasts
Things to know:
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
109 109 109 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Show Commands
show ip access-list
show ip inspect name inspection-name
show ip inspect config
show ip inspect config
show ip inspect interfaces
show ip inspect session [detail]
show ip inspect all
show ip inspect stat
http://www.cisco.com/univercd/cc/td/doc/product/software/
ios120/120newft/120t/120t5/iosfw2/iosfw2_2.htm#12583
110 110 110 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Debugging CBAC
Generic Debug
debug ip inspect object-creation
debug ip inspect object-deletion
debug ip inspect events
debug ip inspect timers
debug ip inspect detail
Audit Trails
ip inspect audit-trail
Transport Level Debugs
debug ip inspect tcp
debug ip inspect udp
Application Protocol Debugs
debug ip inspect protocol
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
113 113 113 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Common Debugging Techniques
Study the logic of your list or try defining an additional broader list:
access-list # permit tcp any any
access-list # permit udp any any
access-list # permit icmp any any int <interface>
ip access-group # in|out
Use an extended access-list with a log option at the end:
access-list 101 deny ip host 171.68.118.100 host 10.31.1.161 log
access-list 101 permit ip any any
Mar 1 04:44:19.446: %SEC-6-IPACCESSLOGDP: list 111 permitted icmp 171.68.118.100
-> 10.31.1.161 (0/0), 15 packets
*Mar 1 03:27:13.295: %SEC-6-IPACCESSLOGP: list 118 denied tcp 171.68.118.100(0)
-> 10.31.1.161(0), 1 packet
If access-list may be a suspect:
If the ip inspect list is suspect, try debug ip inspect <type_of_traffic> :
Feb 14 12:41:17 10.31.1.52 56: 3d05h: CBAC* sis 258488 pak 16D0DC TCP P ack
3195751223 seq3659219376(2) (10.31.1.5:11109) => (12.34.56.79:23)
114 114 114 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Agenda
Understanding the Concepts
PIX and FWSM Troubleshooting Tools
PIX and FWSM Common Issues
IOS Firewall Concepts
IOS Firewall Troubleshooting Tools
IOS Firewall Common Issues
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
115 115 115 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Configuration Issues
The Most Common Configuration Error Is the
Direction of Inspection
The Most Common Configuration Error Is the
Direction of Inspection
Access List Inbound on e1 Inspect Inbound on e0 and
or
Access List Inbound on e1 Inspect Outbound on e1 and
Protected Network Unprotected Network
e0
e1
117 117 117 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
IOS FW Dropping Packets
Base Line Your Network
Adjust Your Threshold Values As Needed
Check Your Access-Lists
Verify Your Inspect Statements
Check for Asymmetrical Routing
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
118 118 118 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Tips for Troubleshooting CBAC
If traffic is being denied:
See if an access-list is not denying traffic. Remove the access-group
and see if traffic in question is permitted. If possible apply extended
access-lists.
Debugs on the Router:
Log your deny statements temporarily
Router(config)#ip access-list extended IOSFW
Router(config-ext-nacl)#deny ip any any log
CBAC related debugs will give a lot of information if CBAC is
working the way it is supposed to be and return traffic is permitted
Debug IP Packet Detail:
Router(config) # access-list 101 tcp host 10.1.1.1 host 192.168.1.1
Router # debug ip packet detail 101
119 119 119 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Summary
Understand How PIX Passes Traffic
Security Levels
Troubleshoot With The Right Tools
Difference between the FWSM and PIX
How does CBAC Work
Online Resources
TAC !
Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA.
SEC-340 3143_05_2001_c1_X.scr
120 120 120 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Some Good Links
PIX Firewall
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/PIX/PIX_sw/v_63/index.htmhttp://www.c
isco.com/cgi -bin/tablebuild.pl/PIX
http://www.cisco.com/pcgi -
bin/Support/browse/psp_view.pl?p=Hardware:PIX&s=Software_Configuration
http://www.cisco.com/pcgi -
bin/Support/browse/psp_view.pl?p=Hardware:PIX&s=Troubleshooting#Known_Problems
FWSM
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/cfgnotes/78_14450.htm
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/cfgnotes/fwsm/index.htm
http://www.cisco.com/en/US/products/hw/modules/ps2706/products_qanda_item09186a00800c
4fee.shtml
IOS FW
http://www.cisco.com/pcgi -
bin/Support/browse/psp_view.pl?p=Software:Cisco_IOS_Firewall&s=I mplementation_and_Conf
iguration
http://www.cisco.com/warp/partner/synchronicd/cc/pd/iosw/ioft/iofwft/prodlit/fire_qa.htm
http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/ 120newft/120t/120t5/iosfw2/io
sfw2_2.htm#xtocid135950
121 121 121 2003, Cisco Systems, Inc. All rights reserved.
SEC-3020
8243_06_2003_X2
Please Complete Your
Evaluation Form
Session SEC-3020

You might also like