Solved

Setup Cisco Pix506 for IMAP4 and SMTP (Ports 143,25, and 993)

Posted on 2007-11-21
2
920 Views
Last Modified: 2010-04-21
Experts

I have a Cisco Pix506 that i need to setup to open ports and allow access for IMAP4, SMTP, and SSL IMAP4.  I know the ports are 143, 25, and 993 respectively  I am in the Cisco router, but am not sure of what the configuration lines to add to open these ports and allow access.

Here is what is in the config thus far, which leads me to believe I have SMTP (port 25) covered, I just need help adding the rest.

.....
fixup protocol dns maximum-length 640                                    
fixup protocol ftp 21                    
fixup protocol h323 h225 1720                            
fixup protocol h323 ras 1718-1719                                
fixup protocol http 80                      
fixup protocol ils 389                      
fixup protocol rsh 514                      
fixup protocol rtsp 554                      
fixup protocol sip 5060                      
fixup protocol sip udp 5060                          
fixup protocol skinny 2000                          
fixup protocol smtp 25                      
fixup protocol sqlnet 1521                          
fixup protocol tftp 69                      
names    
access-list 101 permit tcp any any eq smtp                                          
access-list 101 permit tcp any any eq 3389                                          
access-list 101 permit tcp any any eq www                                        
access-list 101 permit tcp any any eq pop3                                          
access-list 101 permit tcp any any eq https
.....  
0
Comment
Question by:Jaceallan
2 Comments
 
LVL 28

Accepted Solution

by:
batry_boy earned 500 total points
ID: 20337235
Here are the commands to allow those 3 ports inbound:

access-list 101 permit tcp any any eq smtp
access-list 101 permit tcp any any eq 143
access-list 101 permit tcp any any eq 993
access-group 101 in interface outside

Now, having said that, there's one other aspect that we haven't covered here and that is that those commands above allow inbound traffic on those 3 ports to ANY destination, which I don't recommend.  I would identify the specific hosts on your network that you want to allow that traffic to, create static translations for them and then put in the commands above referencing those specific destination hosts.

For instance, say you have a single SMTP server that you want to allow those ports inbound to and it's internal IP address is 192.168.1.20.  You also have a public IP address assigned to you by your ISP of 7.7.7.7 (just an example, of course).  You will need to translate 192.168.1.20 to a public IP (7.7.7.7) so that Internet traffic can be initiated to that host since that public IP is routable across the Internet and 192.168.1.20 is a private class address that is non-routable.

Assuming all of the above info, here is the list of commands you would put in to achieve that configuration:

static (inside,outside) 7.7.7.7 192.168.1.20 netmask 255.255.255.255
access-list 101 permit tcp any host 7.7.7.7 eq smtp
access-list 101 permit tcp any host 7.7.7.7 eq 143
access-list 101 permit tcp any host 7.7.7.7 eq 993
access-group 101 in interface outside

The first command above establishes the static translation between 192.168.1.20 and 7.7.7.7
Commands 2-4 configure any Internet host to send traffic to host 7.7.7.7 (that will then be translated into 192.168.1.20 when it is allowed inbound to the inside interface) on those 3 ports.
The last command applies the access list "101" to the outside interface in an inbound direction.

Hope this helps...
0
 

Author Closing Comment

by:Jaceallan
ID: 31410900
thanks..
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now