Solved

Cisco 4700-M router to be set as company Firewall.

Posted on 2003-10-23
4
213 Views
Last Modified: 2010-03-18
Hi,

I have joined a company that has no network firewall (only software firewalls on their workstations).

I have purchased a Cisco4700-M router and have connected my PC Com1 to it's console port and have successfully uploaded my network diagram using Cisco's ConfigMaker v2.6. I have set this to use the only 2 ethernet ports that both connect to a hub on both sides (eg. - private hub to ether0 then ether1 to public hub). Both hubs sit on different ip address ranges and I have assigned an IP (not used elsewhere) on either side with their appropriate subnets.

I have also started the Firewall wizard in the ConfigMaker and denied all access apart from HTTP and SMTP ports.

When I connect the router up to, I am unable to ping or find this device on my network.

Do I have to enable or what ?

Thanks.
0
Comment
Question by:jramsden
4 Comments
 
LVL 5

Accepted Solution

by:
vtobusman earned 63 total points
ID: 9607640
 Enabling the firewall on a router and only allowing the http and smtp traffic hmmm
what about echo ping enabling a firewall will disable the ping on the router
enable the telnet port on the firewall port 23 ( I think ) and try telneting to the router...

  its probally running you just dont know it...
0
 
LVL 11

Assisted Solution

by:ewtaylor
ewtaylor earned 62 total points
ID: 9607850
Also you said they are running software firewalls, make sure they turn those off the could be blocking icmp
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now