Solved

Access list to allow pop3

Posted on 2006-11-02
6
189 Views
Last Modified: 2010-04-11

Can anyone supply me with the proper access list to allow incoming pop3 trafic (port 110 port 25) on a Cisco PIX 520?
0
Comment
Question by:rbrindisi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17859654
access-list <Number> permit tcp any host <PublicIPOFServer> eq 110
access-list <Number> permit tcp any host <PublicIPOFServer> eq 25

access-group <Number> in interface outside

Cheers,
Rajesh
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17860354
remember to establish your static rules or it won't work...!!!!
0
 

Author Comment

by:rbrindisi
ID: 17860382
Mahe2000

How do I establish Static Rules?
0
Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

 
LVL 32

Expert Comment

by:rsivanandan
ID: 17863886
Static entries make a presence of inside host to the outside world using the public address by nat. So if the above access-list has to work, you need to first have that enabled which I assume is already there ? If not,

static(inside,outside) <PublicIPOFServer> <InternalIPOFServer> netmask 255.255.255.255

Cheers,
Rajesh
0
 
LVL 3

Accepted Solution

by:
mahe2000 earned 250 total points
ID: 17866129
the static statements are this way:

static (inside,outside) ooo.ooo.ooo.ooo iii.iii.iii.iii netmask 255.255.255.255

where
ooo.ooo.ooo.ooo is your public IP address for the pop server
iii.iii.iii.iii is your internal (real) IP address of the pop server
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17889799
So I didn't help you at all even after giving the access-lists and the static statements ?



0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

695 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question