Solved

Cisco PIX Router Config Question (ACL)

Posted on 2004-03-24
1
513 Views
Last Modified: 2013-11-29
Looking over my router config (actually put in place by the previous admin), and I'm trying to figure out the following :

access-list inbound permit tcp any host x.x.x.x eq 3389
access-list inbound permit tcp any host x.x.x.x eq 3389
access-list inbound permit tcp any host x.x.x.x eq 3389
- Each of these are different server address's

Correct me if I'm wrong, but isn't this allowing anyone access to those address's via terminal services?

Thank you
0
Comment
Question by:MrBean
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 79

Accepted Solution

by:
lrmoore earned 50 total points
ID: 10672162
Only if there is a matching static that matches the host x.x.x.x with an inside system.
If there is a static, then yes, anyone out there with Terminal services client can connect, but the login credentials must still be supplied. The security is now dependent on the security of the terminal server itself.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to rollback Windows updates with SCCM? 6 89
Hidden network 2 43
AD Design Best Practices 6 39
Migrating to Exchange 2016 - AD/DNS question 8 25
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question