Solved

Configuring smtp for pix 506e vpn

Posted on 2006-06-30
4
285 Views
Last Modified: 2013-11-16
Hi,

I have an exchange server that I am trying to access through a pix vpn.

Do I need to setup access lists for both firewalls?  And if so what is the most secure way?

example

exchange server 192.168.1.x/10.1.x.x
pix 506e<---vpn-->
exchange client 192.168.2.x/10.2.x.x

Any help would be greatly appreciated.
0
Comment
Question by:tashmore
  • 2
  • 2
4 Comments
 
LVL 32

Accepted Solution

by:
rsivanandan earned 125 total points
ID: 17022767
Both firewalls ? I see only a single firewall here.

It would be a good start to set the ip address (internal ip) of the exchange server in the 'hosts' file of vpn client so that the resolution happens fast.

2 main things that you might encounter with exchange and outlook over vpn is 'name resolution' and 'mtu problems'. So do the first thing and see if it gives a better result.

If this is not what you meant, then please explain and also post the config.

Cheers,
Rajesh
0
 

Author Comment

by:tashmore
ID: 17024190
thanks

I had already added the ip address of the exchange server.  I am also able to ping the server.  

I am separated by two pix 506e firewalls.  The vpn is established.

example:

my pc-->pix 506e-->dsl-->internet<--dsl<--pix 506e<--exchange server
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17024211
Oh Okay, that would be enough on the security aspect as long as you access the exchange server through the VPN.

The VPN should be configured already with security with access-lists and so no problems. If you think there is something of concern, post the config and lets see.

Cheers,
Rajesh
0
 

Author Comment

by:tashmore
ID: 17024504
You were correct about the 'hosts' file.  I had logged in on an xp machine with a different account.

thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
NSD FAIL 2 101
Cisco ASA5508-X vs Barracuda X200 2 56
Remote site access to DMZ via Site-to-Site (L2L) VPN - Cisco ASA 3 47
Load Balancing 3 15
Cisco Pix/ASA hairpinning The term, hairpinning, comes from the fact that the traffic comes from one source into a router or similar device, makes a U-turn, and goes back the same way it came. Visualize this and you will see something that looks …
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now