Solved

Cisco PIX port opening

Posted on 2006-07-15
5
1,009 Views
Last Modified: 2013-11-16
i want to open a range of ports in my cisco pix firewalla nd that is from 5100 -5200 .i want to open it in my DMZ port also.how do i go about it .please guide me .
0
Comment
Question by:kolcorp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 30

Expert Comment

by:ded9
ID: 17114202
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17114228
This is pretty open ended, you'll have to explain a little more than this.

1. Open ports for connecting from Internet to inside ?

2. Open ports from connecting from inside to Internet ?

I mean, explain so that we can understand and have a solution that doesn't break anything.

Cheers,
Rajesh
0
 
LVL 1

Author Comment

by:kolcorp
ID: 17114401
i need to open this port range to allow DTC which in turn i need for distributed transactions on two sql servers which are linked togather. So i want to open both kind of access.
0
 
LVL 30

Accepted Solution

by:
ded9 earned 125 total points
ID: 17114565
access-list 101 permit tcp any host xxx.xxx.xxx.xxx range 5100 5200

check this link

http://www.experts-exchange.com/Hardware/Routers/Q_21519914.html?query=Cisco+PIX+port+opening+range&clearTAFilter=true


Reps
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17114723
Post your configuration and mention the ips to which you want this to be done.

1. You need to mention the inside ip address of sql server

2. You need to mention the outside ip (Public ip) address of the sql server

and same for the other sql server too.

Mask off the first 2 octects of your public ip for security. Remove all passwords.'

Cheers,
Rajesh
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For months I had no idea how to 'discover' the IP address of the other end of a link (without asking someone who knows), and it drove me batty. Think about it. You can't use Cisco Discovery Protocol (CDP) because it's not implemented on the ASAs.…
Powerful tools can do wonders, but only in the right hands.  Nowhere is this more obvious than with the cloud.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question