[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Ipchains question:

Posted on 2002-04-09
3
Medium Priority
?
241 Views
Last Modified: 2010-03-18
Hello Experts:

I need some assistance allowing terminal services through our firewall:

ETH0- 10.102.1.x
ETH1- 10.103.1.x

Terminal Server 10.102.1.90

Terminal Server uses tcp port 3389

So, Im assuming that outbound client connections are in the dynamic range of 1024:65535

So, if i have a client in the 10.103.1.x network, what would the chains look like?  Default policy is DENY Everything
0
Comment
Question by:escheider
  • 2
3 Comments
 
LVL 1

Accepted Solution

by:
swapsthegreat earned 100 total points
ID: 6937573
ipchains -A forward -s 10.103.1.0/24 1024: -d 10.102.1.90 3389 -j ACCEPT

ipchains -A forward -s 10.102.1.90 3389 -d 10.103.1.0/24 1024: -j ACCEPT
0
 
LVL 4

Author Comment

by:escheider
ID: 6937925
works like a champ...thanks
0
 
LVL 4

Author Comment

by:escheider
ID: 6938207
sorry, thought I graded this question.
0

Featured Post

[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses
Course of the Month18 days, 12 hours left to enroll

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question