Solved

Cisco PIX Router Config Question (ACL)

Posted on 2004-03-24
1
523 Views
Last Modified: 2013-11-29
Looking over my router config (actually put in place by the previous admin), and I'm trying to figure out the following :

access-list inbound permit tcp any host x.x.x.x eq 3389
access-list inbound permit tcp any host x.x.x.x eq 3389
access-list inbound permit tcp any host x.x.x.x eq 3389
- Each of these are different server address's

Correct me if I'm wrong, but isn't this allowing anyone access to those address's via terminal services?

Thank you
0
Comment
Question by:MrBean
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 79

Accepted Solution

by:
lrmoore earned 50 total points
ID: 10672162
Only if there is a matching static that matches the host x.x.x.x with an inside system.
If there is a static, then yes, anyone out there with Terminal services client can connect, but the login credentials must still be supplied. The security is now dependent on the security of the terminal server itself.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question