Solved

Access list to allow pop3

Posted on 2006-11-02
6
188 Views
Last Modified: 2010-04-11

Can anyone supply me with the proper access list to allow incoming pop3 trafic (port 110 port 25) on a Cisco PIX 520?
0
Comment
Question by:rbrindisi
  • 3
  • 2
6 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17859654
access-list <Number> permit tcp any host <PublicIPOFServer> eq 110
access-list <Number> permit tcp any host <PublicIPOFServer> eq 25

access-group <Number> in interface outside

Cheers,
Rajesh
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17860354
remember to establish your static rules or it won't work...!!!!
0
 

Author Comment

by:rbrindisi
ID: 17860382
Mahe2000

How do I establish Static Rules?
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 
LVL 32

Expert Comment

by:rsivanandan
ID: 17863886
Static entries make a presence of inside host to the outside world using the public address by nat. So if the above access-list has to work, you need to first have that enabled which I assume is already there ? If not,

static(inside,outside) <PublicIPOFServer> <InternalIPOFServer> netmask 255.255.255.255

Cheers,
Rajesh
0
 
LVL 3

Accepted Solution

by:
mahe2000 earned 250 total points
ID: 17866129
the static statements are this way:

static (inside,outside) ooo.ooo.ooo.ooo iii.iii.iii.iii netmask 255.255.255.255

where
ooo.ooo.ooo.ooo is your public IP address for the pop server
iii.iii.iii.iii is your internal (real) IP address of the pop server
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17889799
So I didn't help you at all even after giving the access-lists and the static statements ?



0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question