Solved

VPN and open ports

Posted on 2006-11-10
3
224 Views
Last Modified: 2013-11-16
Hi I have created a L2L vpn between my network and a vendor. On the VPN concentrator I am only allowing them to see 2 IP addresses which they can ping just fine, however they need to get to a specific port 4000 and I am not sure why they cannot see it. The server they are connecting to is a unix server and doing a netstat I can see the server is listening on that port but the vendor cannot get to it.


Here is the setup:




(Server)--------(Cisco 6509)----------(Cisco 4000 router)---------(VPN 3030)--------(L2L over Internet)---------------------(vendor's VPN 3030)

The cisco 4000 router has no ACLs so would I have to modify an access-list on the 6509 to allow access to that port?

Thanks

0
Comment
Question by:rh102801
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 10

Expert Comment

by:srgilani
ID: 17913384
what access-list your are using with your vpn tunnel
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 17914228
If they can ping the server's IP address then they should be able to access any port.
Ping response takes routing issues out of the problem.
Any access-lists on the C6509?
0

Featured Post

Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
decoding the error message TEI_ASSIGNED 8 84
Internet testing device? 5 47
Applying Computer Settings 12 83
Router speed limit 7 61
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question