Solved

How to set up access rules for the destination with a DHCP-assigned private address?

Posted on 2013-06-25
4
405 Views
Last Modified: 2013-06-26
My company is going to set up an on-line direct check deposit to our bank. The bank sent us the following notice:
----------
In order to successfully connect to the Bank website, your company‘s firewall must allow
the following IP address and port numbers to be accessible.  Depending on your company‘s internet firewall settings, it may require some configuration changes.
IP address: 216.82.178.59  (the bank's IP address)
Port Numbers:  80 & 443
----------

We have a Cisco ASA 5510. Do you think it is necessary for us to set up ACL for the above purpose since the connection will be initiated by our Accounting user inside our LAN?
If yes, since our Accounting pc doesn't have a public IP address then how to set up ACL for the destination with a private DHCP-assigned address?
0
Comment
Question by:Castlewood
4 Comments
 
LVL 28

Accepted Solution

by:
Jan Springer earned 200 total points
Comment Utility
If the connection is originating from the inside to the outside and you do not have an access-list restricting the inside interface, then you shouldn't have to do anything.

Your accounting server should be allowed to NAT out the outside interface.
0
 
LVL 6

Assisted Solution

by:gcl_hk
gcl_hk earned 200 total points
Comment Utility
If your Accounting PC is able to access any webpage by http and https currently, then no change require...
0
 
LVL 16

Assisted Solution

by:vivigatt
vivigatt earned 100 total points
Comment Utility
TCP ports 80 and 443 are http and https, usually not filtered at all.
Thus if the IP address 216.82.178.59 is accessible from the desired client via http://216.82.178.59 and https://216.82.178.59 , nothing needs to be done.

Assigning firewall configs/rules by DHCP is not standard and I don't know any firewall that uses this mechanism, so it is very unlikely that this would be possible (and it would be very problematic on a security standpoint).
0
 

Author Closing Comment

by:Castlewood
Comment Utility
Thank you guys so much.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now