?
Solved

I have a question about configuration of an ASA 5505 to work with a IP Based Credit Card Reader in a retail business.

Posted on 2015-02-03
2
Medium Priority
?
74 Views
Last Modified: 2015-05-04
The card readers are IP based and will communicate with a processing company via TCPIP. With these readers placed behind the ASA what are the security configurations to allow these readers to connect and transport data out and in to the processing company?
0
Comment
Question by:Dennis Pillow
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
CorinTack earned 2000 total points
ID: 40586904
This is something you'll likely need to contact the processing company about, unfortunately.

Most likely, there won't be any special configuration, as most of these devices use common secure ports that are already open on the ASA. However, if the software uses special ports, you'd need to make sure these are allowed to pass through the firewall in order to have it allow that traffic.
0
 

Author Comment

by:Dennis Pillow
ID: 40586924
Thank you for the prompt response. I will wait to see if any other comments are posted.
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question