Solved

Need to open all the ports

Posted on 2006-06-10
7
207 Views
Last Modified: 2010-04-09
DEar All

I want to open all the ports from outside to inside for one IP, what is the ACL needed for that

example 10.10.10.10


how it should be typed
0
Comment
Question by:ibmas4002
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16877256
I'm not sure what you expect from us.

What is the device? Is it a firewall? A router?
What ios or system is it running?
What version?

Help us out here.
0
 
LVL 2

Author Comment

by:ibmas4002
ID: 16878082
its a PIX 520
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16878173
I can't help with just this info. I'll leave it for others.
0
Are Your IoT Devices Out to Get You?

IoT business is booming, with manufacturers connecting any and every “thing” to the Internet. But as pressure grows to release new products faster and faster, we’re all left to wonder: is security a priority? Join our webinar on June 29th for the answer.

 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 16880549
access-list outside_in permit ip any host x.x.x.x
static (inside,outside) x.x.x.x 10.10.10.10 netmask 255.255.255.255
access-group outside_in in interface outside
 
0
 
LVL 9

Expert Comment

by:jabiii
ID: 16888098
you sure you want to allow any ports from anywhere to this one box?...
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 16891855
Many people want to do this; for example, when handing off to another device that is inside and they want this to do the filtering rather than the external device. A prime example is when ISA server is the inside firewall. However, allowing all ports through like this does make the excellent 520 practically redundant apart from acting as a forwarder.
0
 
LVL 9

Expert Comment

by:jabiii
ID: 16894443
true, but as a general practice would be best to deny at all possible entries ..00..
nice plug btw :)

ibmas4002, in case you missed it lrmoore gave you what you need above. if that will/won't work for you can you let us know so we can help?

Jim
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question