Allowed bidirectional traffic on port 6464 on Cisco PIX 515E

Posted on 2006-05-01
Last Modified: 2008-02-01
I would like to allow bidirectional traffic through port 6464 on my pix 515E.  What is the best way to do this?
Question by:exiscapital
    LVL 51

    Expert Comment

    by:Keith Alabaster
    That doesn't really give us much to go on does it.

    Are you talking about from any device to any device?
    Are you talking about allowing this outgoing and the outside to respond or vice-a-versa?
    is the outside going to initiate the connection?

    Author Comment

    It would be for any device to any device.  

    LVL 51

    Accepted Solution

    I'll make the assumption that it can be initiated from inside or outside.

    As long as you have a global (outside) and a matching NAT statement with no outgoing ACL applied. the outbound traffic (and the response) will work ok.
    For example
    global (outside) 1 interface
    nat (inside) 1 0 0

    Outside source = any
    inside device =
    your outside pix interface = - .8

    static (inside,outside) tcp 6464 6464 netmask 0 0
    access-list outside-coming-in permit tcp any host eq 6464
    access-group outside-coming-in in interface outside
    no sysopt norproxyarp outside
    LVL 51

    Expert Comment

    by:Keith Alabaster
    OK, so you are just going to let the 6464 incoming pass through rather than forwarding to a specific address?

    Author Comment

    Yes just going to let it pass though rather than forwarding to specific address.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Join & Write a Comment

    Suggested Solutions

    Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now