Solved

I have a question about configuration of an ASA 5505 to work with a IP Based Credit Card Reader in a retail business.

Posted on 2015-02-03
2
65 Views
Last Modified: 2015-05-04
The card readers are IP based and will communicate with a processing company via TCPIP. With these readers placed behind the ASA what are the security configurations to allow these readers to connect and transport data out and in to the processing company?
0
Comment
Question by:Dennis Pillow
2 Comments
 
LVL 7

Accepted Solution

by:
CorinTack earned 500 total points
ID: 40586904
This is something you'll likely need to contact the processing company about, unfortunately.

Most likely, there won't be any special configuration, as most of these devices use common secure ports that are already open on the ASA. However, if the software uses special ports, you'd need to make sure these are allowed to pass through the firewall in order to have it allow that traffic.
0
 

Author Comment

by:Dennis Pillow
ID: 40586924
Thank you for the prompt response. I will wait to see if any other comments are posted.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Occasionally, we encounter connectivity issues that appear to be isolated to cable internet service.  The issues we typically encountered were reset errors within Internet Explorer when accessing web sites or continually dropped or failing VPN conne…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now