?
Solved

Allowing an Exception to an IPSEC rule.

Posted on 2010-08-26
3
Medium Priority
?
574 Views
Last Modified: 2013-11-16
I have setup an IPSEC rule to block all inbound/outbound traffic on port 80.  This has stopped any internet access which was the goal.  However, there is one program that seems to be using port 80 as well.  It comes up with an error talking to host server (which is housed off site).  Is there a way to allow this program access to port 80 or perhaps include an exception to my IPSEC rule to allow the servers IP to communicate on port 80?
0
Comment
Question by:slcls
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 33

Accepted Solution

by:
MikeKane earned 2000 total points
ID: 33663006
The answer would depend on the appliance/software you are using.        

For example, in cisco's world, the answer would be yes since the IPSEC VPN filter is just an access list which you can build with any number of allow/deny elements.  
i.e. logic:
allow this 1 server to use tcp 80
deny all other servers tcp 80
allow all addresses all ip


0
 
LVL 38

Expert Comment

by:younghv
ID: 34580886
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain how to manually move a SEP client to a different client group by performing steps on the client-side. These steps may prove particularly useful because they allow the client to move after it has alrea…
For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question