Solved

Restrict access by ddns on firewall

Posted on 2014-01-02
4
363 Views
Last Modified: 2014-01-09
I have a webserver with an external ip behind a firewall but I don't want everybody to have access on it.  I am thinking of setting up ddns on the site that I would allow access to then I will restrict access based on these ddns on the firewall.  Seems perfect but when I put these policies in, the firewall does not detect those ddns address but I can ping it.  The policy is

xyz.domain.com (untrust)       x.x.x.x (external true ip - trust)        http (service)


If I change the untrust to any, it works fine.  If I put this ddns address in, the policy greys out and it searches very slow.

My firewall is a netscreen ssg5
0
Comment
Question by:johnyu1997
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 9

Expert Comment

by:jeff_01
ID: 39753186
Ping uses ICMP not HTTP so you would need to block ICMP requests as well I believe.
0
 

Author Comment

by:johnyu1997
ID: 39753204
You are not getting my point.  I am trying to allow access from certain ddns addresses.
0
 

Accepted Solution

by:
johnyu1997 earned 0 total points
ID: 39757023
The problem is the dns setting on the firewall was pointed to the trusted interface instead of untrusted interface.  Working good now.
0
 

Author Closing Comment

by:johnyu1997
ID: 39767538
Because the answer is the exact solution.
0

Featured Post

 Database Backup and Recovery Best Practices

Join Percona’s, Architect, Manjot Singh as he presents Database Backup and Recovery Best Practices (with a Focus on MySQL) on Thursday, July 27, 2017 at 11:00 am PDT / 2:00 pm EDT (UTC-7). In the case of a failure, do you know how long it will take to restore your database?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
Invest in your employees with these five simple steps to improve employee engagement and retention.
This video shows how use content aware, what it’s used for, and when to use it over other tools.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question