Solved

Change Firewall/Routing conditions on a Unix Firewall

Posted on 2014-04-11
2
346 Views
Last Modified: 2014-05-02
Hello Experts,

I'm working to assist a non-profit with their IT issues. If you could provide any advice or guidance on the issue below I would greatly appreciate it.

There is an internal resource/document database that is (and should be) only accessible internally. The issue is as follows. Only computers/devices in the same subnet (actually, its own network) can access that resource.

Their office recently replace their modem/firewall. Behind that modem/firewall is another Unix firewall (with very basic content filtering, I'm told). My level of unix knowledge is very basic. I had a Unix guru looking at their config with me briefly and he indicated that access to the internal database was restricted on the unix firewall.

How may I pull up the network/firewall config on the firewall and make basic modifications to accommodate this.

Assume I'm a unix noob, because I am! Thank you very much!
0
Comment
Question by:grindsmygeaqrs
2 Comments
 
LVL 57

Expert Comment

by:giltjr
ID: 39995035
Do you know which Unix it is?  AIX, HP-UX, Solaris, one of the other many OS's that are branded Unix.
0
 
LVL 61

Accepted Solution

by:
gheist earned 500 total points
ID: 39997867
Since it does not exit to other networks:
Is IP packet TTL bigger than 1
Is default router set on the machine
Is netmask matching what router(firewall?) expects?
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now