Solved

Cisco PIX 501 - Port Forwarding and VPN configuration

Posted on 2003-10-29
4
431 Views
Last Modified: 2010-04-11
hello all,

     I've been an NT/2k admin for about 8 years, and I'm just learning Cisco products.  I bought a Cisco PIX 501 and I'm attempting to conigure it.  I have a static IP address (from my ISP), and I'd like to know how configure port forwrarding via the Web interface.  I have an Exchange server (192.168.0.50) and need to forward ports 21, 25, 80, 110, 443, and 3389 to that box.  How do I do that?

     Also, I have the Cisco VPN client, and I'd like to configure the PIX for total access to all authenticated users to the inside.  I used the VPN wizzard in the web interface, but the results aren't the desired results.  I get authenticated, but I can't ping (or access) a single device on the inside of the network.

Regards,

Phil Borkstrom
pborkstrom@hotmail.com
0
Comment
Question by:pborkstrom
  • 2
4 Comments
 
LVL 9

Expert Comment

by:cooledit
ID: 9649276
you must look in your configuration for access list seems to me thats where you hang up, the people get authenticated but stands only at the gate to your network. Access list look into.
for VPN you must determine which addresses you want to allow and put them into the access list as well. Look at the Cisco.com site for your puposes.
0
 

Author Comment

by:pborkstrom
ID: 9649701
I guess I just need to know what to set it to - specifically.  I'm on the VPN tab under CONFIGURATION, and on the left hand side under REMOTE ACCESS - Cisco VPN Client, I have the group I created.

      Also, the port forwarding is a pretty important issue.  I can't get email @domain.com, or access to my FTP server.  It isn't mission critical (seeing only 10 people know that address :), but I'd like to learn a little bit about how cisco products work.

0
 
LVL 9

Accepted Solution

by:
cooledit earned 250 total points
ID: 9649865
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Hi All,  Recently I have installed and configured a Sonicwall NS220 in the network as a firewall and Internet access gateway. All was working fine until users started reporting that they cannot use the Cisco VPN client to connect to the customer'…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now