Solved

Web access crawling on non-default port, something lost in translation?

Posted on 2006-10-23
6
262 Views
Last Modified: 2010-04-12
Group,
Wanted to ask you a question, we have a apache server that is a dev box we are using right now. We already had a webserver on another IP (.3) running on port 80. This is correctly mapped and everything is working great. The Apache server we are running (.6) we changed to port 81 and internally everything works great. I added this to our ACL and our static mappings, however access from the outside CRAWLS, on Firefox you can see on the bottom "connecting to 192.168.0.6" and it seems as if it is having a very hard time loading images. What do you guys think?

Update, something interesting, keeping in mind I am outside the firewall so I have to type www.domain.com:81 which is in the 24.73.166.x block. If I click on a link I am getting a "connection timed out" error saying the server at 192.168.0.6 is taking to long to respond, shouldn't this be my outside IP address, do I have a mapping backwards?
0
Comment
Question by:blakmoon91
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 11

Accepted Solution

by:
prueconsulting earned 250 total points
ID: 17790488
Post your static statements and acls which are applicable.

Also did you do a clear xlate following updating the rules and the statics

0
 

Author Comment

by:blakmoon91
ID: 17790594
No, I didn't clear the xlate, I will have to remember that. I will post the ACL's and Static when I get back tonight
Thanks for the response.
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17790805
Assuming it is a pix, should look like this for the second server

static (inside,outside) tcp interface 81 192.168.0.6 81 netmask 255.255.255.255 0 0
access-list outside_access_in permit tcp any interface outside eq 81
access-group in interface outside
0
How to Defend Against the WCry Ransomware Attack

On May 12, 2017, an extremely virulent ransomware variant named WCry 2.0 began to infect organizations. Within several hours, over 75,000 victims were reported in 90+ countries. Learn more from our research team about this threat & how to protect your organization!

 

Author Comment

by:blakmoon91
ID: 17793116
Here are the statements as I have it in my Pix 6.3(5)

access-list outside_access_in permit tcp any host 24.73.166.50 eq 81

and

static (inside,outside) tcp 24.73.166.50 81 192.168.0.6 81 netmask 255.255.255.255 0 0

I just re-applied the group and cleared the xlate, I will let you know if it made a difference tomorrow.
0
 
LVL 11

Expert Comment

by:prueconsulting
ID: 17793166
That should work just fine for you.. clearing the xlate is an important step to making it function proprely
0
 

Author Comment

by:blakmoon91
ID: 17850982
Group,
Thanks for all the response, I was able to work out the issue, however it was actually un-related to the Pix. I do however agree that anytime you apple or re-apply a access-group you need to be sure to clear the xlate, a step that I had forgotten. I do appreciate your time!
0

Featured Post

How Do You Stack Up Against Your Peers?

With today’s modern enterprise so dependent on digital infrastructures, the impact of major incidents has increased dramatically. Grab the report now to gain insight into how your organization ranks against your peers and learn best-in-class strategies to resolve incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Can't locate my firewall, not sure if one is in place 2 82
windows 10 being blocked by AVG 3 80
SQL Server Communications Audit 5 125
Checkpoint interface differences 1 47
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question