Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Access list to allow pop3

Posted on 2006-11-02
6
Medium Priority
?
193 Views
Last Modified: 2010-04-11

Can anyone supply me with the proper access list to allow incoming pop3 trafic (port 110 port 25) on a Cisco PIX 520?
0
Comment
Question by:rbrindisi
  • 3
  • 2
6 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17859654
access-list <Number> permit tcp any host <PublicIPOFServer> eq 110
access-list <Number> permit tcp any host <PublicIPOFServer> eq 25

access-group <Number> in interface outside

Cheers,
Rajesh
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17860354
remember to establish your static rules or it won't work...!!!!
0
 

Author Comment

by:rbrindisi
ID: 17860382
Mahe2000

How do I establish Static Rules?
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 
LVL 32

Expert Comment

by:rsivanandan
ID: 17863886
Static entries make a presence of inside host to the outside world using the public address by nat. So if the above access-list has to work, you need to first have that enabled which I assume is already there ? If not,

static(inside,outside) <PublicIPOFServer> <InternalIPOFServer> netmask 255.255.255.255

Cheers,
Rajesh
0
 
LVL 3

Accepted Solution

by:
mahe2000 earned 1000 total points
ID: 17866129
the static statements are this way:

static (inside,outside) ooo.ooo.ooo.ooo iii.iii.iii.iii netmask 255.255.255.255

where
ooo.ooo.ooo.ooo is your public IP address for the pop server
iii.iii.iii.iii is your internal (real) IP address of the pop server
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17889799
So I didn't help you at all even after giving the access-lists and the static statements ?



0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
Although free tools can be helpful to a limited extent, it’s better to stick to paid versions for business use.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question