I need to implement a transparent firewall between r1 and r2. Ping and bgp session have to be allowed.
1) Cisco Adaptive Security Appliance Software Version 8.3(1)
First I configure min requirements to allow on bgp session between r1 and r2
R1:
R2:
ASA is in ‘transparent mode’:
ASA1:
Now we can check the bgp status:
and confirm the traffic is going through the firewall:
Now I would like to add password to authenticate peers before they set up bgp session:
r1:
r2:
Once I enabled this feature I received error message:
The problem we see above is related to fact that ASA by default changes TCP MD5 option value and TCP sequence number is random (ASA in the middle breaks the session into two session: first between r1 and asa1 and 2nd between asa2 and r2). To allow on TCP MD5 authentication I need to add TCP-MAP:
and then define class-map where I apply the TCP-MAP:
Let’s test it:
Now the MD5 is allowed but ASA changes TCP sequence number. I need to disable it:
Let’s check the routers once again:
As we see everything works fine. Now I will change software on ASA to 8.4 and I check what is required to keep the same functionality
2) Cisco Adaptive Security Appliance Software Version 8.4(4)5
The new version has some requirements for transparent feature. Like on IOS you need to create BVI interface where you add ip address.
This command is no longer support:
and IP for management we can set on new BVI interface:
Both interfaces need to belong to one of the bridge-groups, in my case to '1’:
After reloading I see BGP is still working fine:
10.0.0.1 10.0.0.100 10.0.0.2
/----\ ----- /----\
| R1 |----------| ASA1 |----------| R2 |
\----/ ----- \----/
vlan10 ---->| <---- vlan20
1) Cisco Adaptive Security Appliance Software Version 8.3(1)
First I configure min requirements to allow on bgp session between r1 and r2
R1:
!
interface GigabitEthernet0/0
ip address 10.0.0.1 255.255.255.0
!
router bgp 65001
neighbor 10.0.0.2 remote-as 65001
!
R2:
!
interface GigabitEthernet0/0
ip address 10.0.0.2 255.255.255.0
!
router bgp 65001
neighbor 10.0.0.1 remote-as 65001
!
ASA is in ‘transparent mode’:
ASA1:
!
firewall transparent
hostname asa1
!
!
interface Ethernet0/0.10
vlan 10
nameif outside
security-level 0
!
interface Ethernet0/1.20
vlan 20
nameif inside
security-level 100
!
access-list BGP extended permit tcp any any eq bgp
access-group BGP in interface outside
access-group BGP in interface inside
!
ip address 10.0.0.100 255.255.255.0
Now we can check the bgp status:
r1#show ip bgp summary
BGP router identifier 10.0.0.1, local AS number 65001
BGP table version is 1, main routing table version 1
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.0.0.2 4 65001 38 38 1 0 0 00:31:10 0
r1#
r2#sh ip bgp summary
BGP router identifier 10.0.0.2, local AS number 65001
BGP table version is 1, main routing table version 1
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.0.0.1 4 65001 38 38 1 0 0 00:31:00 0
r2#
and confirm the traffic is going through the firewall:
asa1# sh conn
1 in use, 3 most used
TCP outside 10.0.0.1:179 inside 10.0.0.2:13761, idle 0:00:27, bytes 238, flags UIO
asa1#
asa1(config)# fixup protocol icmp
INFO: converting 'fixup protocol icmp ' to MPF commands
asa1(config)#
Now I would like to add password to authenticate peers before they set up bgp session:
r1:
router bgp 65001
neighbor 10.0.0.2 password cisco
r2:
router bgp 65001
neighbor 10.0.0.1 password cisco
Once I enabled this feature I received error message:
r2#clear bgp * all 65001
r2#
*Oct 22 20:24:32.381: %BGP-5-ADJCHANGE: neighbor 10.0.0.1 Down User reset
*Oct 22 20:24:32.381: %BGP_SESSION-5-ADJCHANGE: neighbor 10.0.0.1 IPv4 Unicast topology base removed from session User reset
*Oct 22 20:24:40.241: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.1(12069) to 10.0.0.2(179)
*Oct 22 20:24:42.237: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.1(12069) to 10.0.0.2(179)
*Oct 22 20:24:54.573: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.1(45215) to 10.0.0.2(179)
*Oct 22 20:24:56.573: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.1(45215) to 10.0.0.2(179)
r1#clear bgp * all 65001
r1#
*Oct 22 21:03:37.809: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.2(12884) to 10.0.0.1(179)
*Oct 22 21:04:03.745: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.2(33490) to 10.0.0.1(179)
*Oct 22 21:04:05.745: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.2(33490) to 10.0.0.1(179)
*Oct 22 21:04:09.745: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.2(33490) to 10.0.0.1(179)
*Oct 22 21:04:17.745: %TCP-6-BADAUTH: No MD5 digest from 10.0.0.2(33490) to 10.0.0.1(179)
The problem we see above is related to fact that ASA by default changes TCP MD5 option value and TCP sequence number is random (ASA in the middle breaks the session into two session: first between r1 and asa1 and 2nd between asa2 and r2). To allow on TCP MD5 authentication I need to add TCP-MAP:
!
tcp-map BGP
tcp-options range 19 19 allow
!
and then define class-map where I apply the TCP-MAP:
class-map BGP-class
match access-list BGP
!
policy-map global_policy
class BGP-class
set connection advanced-options BGP
!
Let’s test it:
r2#
*Oct 22 20:44:06.565: %TCP-6-BADAUTH: Invalid MD5 digest from 10.0.0.1(26643) to 10.0.0.2(179)
*Oct 22 20:44:10.565: %TCP-6-BADAUTH: Invalid MD5 digest from 10.0.0.1(26643) to 10.0.0.2(179)
*Oct 22 20:44:18.565: %TCP-6-BADAUTH: Invalid MD5 digest from 10.0.0.1(26643) to 10.0.0.2(179)
*Oct 22 20:44:40.409: %TCP-6-BADAUTH: Invalid MD5 digest from 10.0.0.1(46945) to 10.0.0.2(179)
Now the MD5 is allowed but ASA changes TCP sequence number. I need to disable it:
policy-map global_policy
class BGP-class
set connection random-sequence-number disable
!
Let’s check the routers once again:
*Oct 22 21:26:06.805: %BGP-5-ADJCHANGE: neighbor 10.0.0.2 Up
r1#
r1#
r1#sh ip bgp summary
BGP router identifier 11.11.11.11, local AS number 65001
BGP table version is 1, main routing table version 1
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.0.0.2 4 65001 4 5 1 0 0 00:00:53 0
r1#
*Oct 22 20:47:15.873: %BGP-5-ADJCHANGE: neighbor 10.0.0.1 Up
r2#
r2#
r2#sh ip bgp summary
BGP router identifier 22.22.22.22, local AS number 65001
BGP table version is 1, main routing table version 1
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.0.0.1 4 65001 4 4 1 0 0 00:00:19 0
r2#
As we see everything works fine. Now I will change software on ASA to 8.4 and I check what is required to keep the same functionality
2) Cisco Adaptive Security Appliance Software Version 8.4(4)5
The new version has some requirements for transparent feature. Like on IOS you need to create BVI interface where you add ip address.
This command is no longer support:
no ip address 10.0.0.100 255.255.255.0
and IP for management we can set on new BVI interface:
!
interface BVI1
ip address 10.0.0.100 255.255.255.0
!
Both interfaces need to belong to one of the bridge-groups, in my case to '1’:
interface Ethernet0/0.10
bridge-group 1
!
interface Ethernet0/1.20
bridge-group 1
!
After reloading I see BGP is still working fine:
r2#
*Oct 22 21:05:23.577: %BGP-5-ADJCHANGE: neighbor 10.0.0.1 Up
r2#
r2#sh ip bgp summary
BGP router identifier 22.22.22.22, local AS number 65001
BGP table version is 1, main routing table version 1
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.0.0.1 4 65001 4 4 1 0 0 00:00:12 0
r2#
r1#
*Oct 22 21:44:14.521: %BGP-5-ADJCHANGE: neighbor 10.0.0.2 Up
r1#
r1#sh ip bgp summary
BGP router identifier 11.11.11.11, local AS number 65001
BGP table version is 1, main routing table version 1
Neighbor V AS MsgRcvd MsgSent TblVer InQ OutQ Up/Down State/PfxRcd
10.0.0.2 4 65001 4 4 1 0 0 00:00:16 0
r1#
asa1# sh conn
1 in use, 2 most used
TCP outside 10.0.0.1:38297 inside 10.0.0.2:179, idle 0:00:42, bytes 276, flags UIOB
asa1#
Comments
Post a Comment