So here's an update:
1. I have turned off fixup smtp and checked that inspect esmtp or inspect
smtp is not running.
2. I have also enabled ICMP for both ends from our DMZ mail server and
internal mail server. It is still happening.

Plot thickens huh.

On Mon, Feb 15, 2010 at 6:22 PM, DJ Lucas <d...@lucasit.com> wrote:

> On 02/14/2010 10:17 PM, Jafaruddin Lie wrote:
> >
> > We do have a CISCO ASA 5520 that the outgoing mailserver sits behind,
> > and I have done the no fixup protocol on the box to no avail.
> > I have also enabled ICMP from that box to our internal mail server,
> > and ping works so I figure the ICMP NO-FRAGMENT wouldn't be an issue
> > here now.
> >
> It sounds as though the issue surfaced about the same time the new
> security device came into play.  If so, it might help to make that
> absolutely clear to everyone who reads this thread.  Is this the only
> change in the environment?  From what you've said above, it sounds like
> you're on the right track.  Only thing I noticed is that you mentioned
> fixup (PIX) and not inspect (ASA).  I don't have an ASA in front of me
> ATM (and honestly, I'm not all that good with them anyway), however
> something 'like' the following commands should get you to the right
> place if you don't have access to ASDM (assuming you haven't changed too
> much in the default configuration).  There are plenty of examples all
> over the net if you use the correct search terms.  Obviously, you should
> do a 'show run' to make sure my second assumption is correct (and that
> this could even be the problem).
>
> {{{
> policy-map global_policy
>  class inspection_default
>   no inspect esmtp
> }}}
>
> Don't forget to write, else it'll be gone on reboot if it works.  Sorry,
> done that a couple of times myself, though I always dump my configs.  A
> friendly reminder never hurts either way.
>
> BTW, here is a better example than the Cisco docs (IMO), probably should
> have just linked to there in the first place instead of the above
> gibberish.  Oh well.
>
>
> http://www.experts-exchange.com/Security/Software_Firewalls/Enterprise_Firewalls/Cisco_PIX_Firewall/Q_24438893.html
>
> -- DJ Lucas
>
>
> --
> This message has been scanned for viruses and
> dangerous content, and is believed to be clean.
>
>


-- 
Registered Linux user no. 384430

Reply via email to