Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


accessing internal web services from outside

Posted on 2004-10-24
Medium Priority
Last Modified: 2010-04-09
I have a pix 520 and have a need for public ip addresses to access some web servers on the inside (private). In the past, I've used static addresses but think now that it too risky. Also, how to I limit, through the pix, just the ports needed per web server?
Question by:gaskew
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 79

Expert Comment

ID: 12393912
Statics are not risky - they are the only way to do what you want.
You limit the ports accessible by either conduit commands or access-lists, depending on what version OS you are running on the old 520..

Author Comment

ID: 12396362
can I have an example of an access-list limiting traffic for web box that is statically mapped to 206.188.2.# ? I only want the specific ports needed for that web box to run, say port 80.
LVL 79

Accepted Solution

lrmoore earned 2000 total points
ID: 12396393

static (inside,outside) 206.108.2.x netmask
access-list outside_in permit tcp any host 206.108.2.x eq 80
access-group outside_in in interface outside

  static (inside,outside) tcp 80 206.108.2.x 80 netmask


Author Comment

ID: 12396525
Thanks a bunch!

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
This lesson discusses how to use a Mainform + Subforms in Microsoft Access to find and enter data for payments on orders. The sample data comes from a custom shop that builds and sells movable storage structures that are delivered to your property. …
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question