Solved

Add an Access-List item to a Cisco Pic Firewall

Posted on 2006-06-29
3
391 Views
Last Modified: 2013-11-29
I'm trying to add an access-list item to my cicso pix firewall so I can accept ftp traffic to a server.
Here's what I'm doing
ssh <pix ip>
enter username
enter password
enable
enter password
conf t
access-list outside_acl permit tcp any host 70.69.184.115 255.255.255.255 0 0 ftp

I then get error "ERROR: extra command argument(s)"

I've also tried access-list outside_acl permit tcp any host 70.69.184.115 255.255.255.255 ftp

but get the same error.

Can anyone tell me what I'm doing wrong or what it is I need to do?
0
Comment
Question by:RPIIT
3 Comments
 
LVL 19

Accepted Solution

by:
nodisco earned 500 total points
ID: 17014436
hi there

You need to work it as :

access-list outside_acl permit tcp any host 70.69.184.115 eq ftp

You may also need to add the ftp-data port

access-list outside_acl permit tcp any host 70.69.184.115 eq ftp-data

And you will need to apply this to the outside interface (assuming its allowing ftp access to this host from outside) if its not already:

access-group outside_acl in interface outside

hth

0
 

Author Comment

by:RPIIT
ID: 17014737
Perfect, worked great.
Thank you.

What does the "eq" mean?
0
 
LVL 27

Expert Comment

by:Nopius
ID: 17015247
'eq' means 'equal', look here http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a3.html#wp1067755
and read about 'operator' in the table below.
..
The operator compares the source IP address (sip) or destination IP address (dip) ports. Possible operands include lt for less than, gt for greater than, eq for equal, neq for not equal, and range for an inclusive range.
...
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Let’s list some of the technologies that enable smooth teleworking. 
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now