I'm not sure I ran the correct acl permit statements to enable https on the Cisco PIX 506E. I'm testing a proxy server which is connected to the Cisco PIX 506E. From a browser, I'm able to successfully view web pages, however, for all https protocols, its being refused. Are the ff two lines enough to open https traffic?
access-list acl-in permit tcp host 10.10.10.2 any eq 443
access-list acl-in permit udp host 10.10.10.2 any eq 443
Thanks much and appreciate any advice you could provide a newbie on PIX.
If this is acl is applied on the inside interface, and you're allowing the host 10.10.10.2 out, then it should be enough. Do you have the same lines for port 80? You could try to allow all out port 443 and see if that fixes the issue as a test, and then narrow it down from there. I'm assuming that 10.10.10.2 is your proxy server?
PIX permits all traffic originated from inside interface by default, so you dont have to put any ACL statements. You dont have to enable https either, yet enabling https in PIX means you enable secure web access to PIX for administration (PDM)
Assuming that you are using Internet Explorer in internet explorer options, click connections tab>lan settings>advanced and check "Use the same proxy server for all protocols" box. If not resolved, most probably thers something wrong with your proxy server configuration
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :