Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 360
  • Last Modified:

Cisco PIX 525 error

Hi Guys, i am trying to add a new line into my existing firewall list and i am getting this error

ERROR: missing command argument(s)

I had added a few lines in before and everything is smooth, but now when i try to add this line in again, i am encountering the error.

This is the line i am trying to add in:

access-list OUTSIDE line 38 permit tcp xxx.xxx.xxx.xxx 255.255.255.248 host BAM_Public object-group mgmt_svc

Anyone knows what went wrong?
0
usanet21
Asked:
usanet21
  • 3
  • 2
1 Solution
 
renillCommented:
access-list 100 permit object-group protocols object-group
   remotes object-group locals object-group services

try this
access-list 101 permit tcp  xxx.xxx.xxx.xxx 255.255.255.248 host BAM_Public object-group mgmt_svc eq "network_service"

you have to specify the service associated .
network_service can be ftp , telnet ...etc..etc

renill
0
 
usanet21Author Commented:
in my current access list, there are already some commands with the below without any error, so i do not think adding a eq will solve the prob. Furthermore, below are the ports for the object-group service mgmt_svc.

access-list OUTSIDE line 38 permit tcp xxx.xxx.xxx.xxx 255.255.255.248 host BAM_Public object-group mgmt_svc

object-group service mgmt_svc tcp
  port-object eq ftp-data
  port-object eq ftp
  port-object eq telnet
  port-object eq www
  port-object eq sqlnet
  port-object eq 4001
  port-object eq 5001
  port-object eq 5002
  port-object eq 5003
 
0
 
lrmooreCommented:
Try it without the "line 38"

access-list OUTSIDE permit tcp xxx.xxx.xxx.xxx 255.255.255.248 host BAM_Public object-group mgmt_svc

Else, use the PDM GUI and insert the acl right where you want it.
0
 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

 
lrmooreCommented:
If that fixed your issue precisely, then why the C grade?
0
 
usanet21Author Commented:
Thats not the precise fixed. But anyway, it is resolved. Thank you so much. I am not using the PDM by the way, i am typing the ACL one by one.
0
 
lrmooreCommented:
OK, thanks!
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

  • 3
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now