Solved

Cisco 4700-M router to be set as company Firewall.

Posted on 2003-10-23
4
220 Views
Last Modified: 2010-03-18
Hi,

I have joined a company that has no network firewall (only software firewalls on their workstations).

I have purchased a Cisco4700-M router and have connected my PC Com1 to it's console port and have successfully uploaded my network diagram using Cisco's ConfigMaker v2.6. I have set this to use the only 2 ethernet ports that both connect to a hub on both sides (eg. - private hub to ether0 then ether1 to public hub). Both hubs sit on different ip address ranges and I have assigned an IP (not used elsewhere) on either side with their appropriate subnets.

I have also started the Firewall wizard in the ConfigMaker and denied all access apart from HTTP and SMTP ports.

When I connect the router up to, I am unable to ping or find this device on my network.

Do I have to enable or what ?

Thanks.
0
Comment
Question by:jramsden
4 Comments
 
LVL 5

Accepted Solution

by:
vtobusman earned 63 total points
ID: 9607640
 Enabling the firewall on a router and only allowing the http and smtp traffic hmmm
what about echo ping enabling a firewall will disable the ping on the router
enable the telnet port on the firewall port 23 ( I think ) and try telneting to the router...

  its probally running you just dont know it...
0
 
LVL 11

Assisted Solution

by:ewtaylor
ewtaylor earned 62 total points
ID: 9607850
Also you said they are running software firewalls, make sure they turn those off the could be blocking icmp
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now