Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

I have a question about configuration of an ASA 5505 to work with a IP Based Credit Card Reader in a retail business.

Posted on 2015-02-03
2
Medium Priority
?
77 Views
Last Modified: 2015-05-04
The card readers are IP based and will communicate with a processing company via TCPIP. With these readers placed behind the ASA what are the security configurations to allow these readers to connect and transport data out and in to the processing company?
0
Comment
Question by:Dennis Pillow
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
CorinTack earned 2000 total points
ID: 40586904
This is something you'll likely need to contact the processing company about, unfortunately.

Most likely, there won't be any special configuration, as most of these devices use common secure ports that are already open on the ASA. However, if the software uses special ports, you'd need to make sure these are allowed to pass through the firewall in order to have it allow that traffic.
0
 

Author Comment

by:Dennis Pillow
ID: 40586924
Thank you for the prompt response. I will wait to see if any other comments are posted.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question