Solved

Allowing an Exception to an IPSEC rule.

Posted on 2010-08-26
3
573 Views
Last Modified: 2013-11-16
I have setup an IPSEC rule to block all inbound/outbound traffic on port 80.  This has stopped any internet access which was the goal.  However, there is one program that seems to be using port 80 as well.  It comes up with an error talking to host server (which is housed off site).  Is there a way to allow this program access to port 80 or perhaps include an exception to my IPSEC rule to allow the servers IP to communicate on port 80?
0
Comment
Question by:slcls
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 33

Accepted Solution

by:
MikeKane earned 500 total points
ID: 33663006
The answer would depend on the appliance/software you are using.        

For example, in cisco's world, the answer would be yes since the IPSEC VPN filter is just an access list which you can build with any number of allow/deny elements.  
i.e. logic:
allow this 1 server to use tcp 80
deny all other servers tcp 80
allow all addresses all ip


0
 
LVL 38

Expert Comment

by:younghv
ID: 34580886
This question has been classified as abandoned and is being closed as part of the Cleanup Program.  See my comment at the end of the question for more details.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question