Solved

Restrict access by ddns on firewall

Posted on 2014-01-02
4
357 Views
Last Modified: 2014-01-09
I have a webserver with an external ip behind a firewall but I don't want everybody to have access on it.  I am thinking of setting up ddns on the site that I would allow access to then I will restrict access based on these ddns on the firewall.  Seems perfect but when I put these policies in, the firewall does not detect those ddns address but I can ping it.  The policy is

xyz.domain.com (untrust)       x.x.x.x (external true ip - trust)        http (service)


If I change the untrust to any, it works fine.  If I put this ddns address in, the policy greys out and it searches very slow.

My firewall is a netscreen ssg5
0
Comment
Question by:johnyu1997
  • 3
4 Comments
 
LVL 9

Expert Comment

by:jeff_01
ID: 39753186
Ping uses ICMP not HTTP so you would need to block ICMP requests as well I believe.
0
 

Author Comment

by:johnyu1997
ID: 39753204
You are not getting my point.  I am trying to allow access from certain ddns addresses.
0
 

Accepted Solution

by:
johnyu1997 earned 0 total points
ID: 39757023
The problem is the dns setting on the firewall was pointed to the trusted interface instead of untrusted interface.  Working good now.
0
 

Author Closing Comment

by:johnyu1997
ID: 39767538
Because the answer is the exact solution.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PCAnywhere 2 94
Using Cisco Meraki for home use after the license expired ? 7 80
Calyptix AE1200 VLAN Question 3 38
contractual requirements for app hosting 3 72
Today companies are subjected to more-and-more data, and it won't stop any time soon.  But there are obvious opportunities for reducing data, particularly data duplicated among companies.
Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
This video demonstrates basic masking and how to edit the mask to reveal the desired image.
This video demonstrates how to use each tool, their shortcuts, where and when to use them, and how to use the keyboard to improve workflow.

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now