Solved

WSUS access using Cisco 501 VPN tunnel

Posted on 2006-11-08
3
257 Views
Last Modified: 2013-11-16
Problem =  WSUS will not work on a VPN tunnel to a different subnet

Conditions  are:

**Remote site A connects to pdc remote home site.
**Site A cannot see Site B so it cannot validate with WSUS host on site B
**All site are connected with MPLS T1 with the exception of Site A
**Home Site sees all correctly.

Question??
How do you let the pix see site B to register and receive regular updates?
0
Comment
Question by:wwinkler
3 Comments
 
LVL 16

Accepted Solution

by:
The_Kirschi earned 250 total points
ID: 17910231
I have the same situation. It works but you have to make sure that clients can access WSUS http port. I installed with http port 8530 and so I had to open that port on the firewall to get clients connected from other sites.
0
 

Author Comment

by:wwinkler
ID: 17913932
Thanks for the comment and will try your suggestion.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question