I have a question here. Lets say if there is one router (184.108.40.206) connected to 220.127.116.11 of PIX FW interface, and there is 18.104.22.168/24 network to come in to 22.214.171.124/24 (SAP Server) from the router, (routing : 0.0.0.0 0.0.0.0 126.96.36.199 ),
How to apply permit list on the PIX Inside interface?
Am i suppose to apply on 188.8.131.52(inside) interface ?
Where is the segment 184.108.40.206/24 located physically.?
Are they residing behind your inside interface of the firewall and you want to protect access to SAP server from this segment.?
This is not a good design.
As the source and destination segments are in your inside network, You cannot make this traffic to pass through firewall. ( unless you are using vlan segmentation of zones in your firewall, which i suppose not the case in your setup)
What do you want to achive?
If you want firewall protection for the SAP server from 220.127.116.11/24 segment, then you need to redesign the way in which your firewall is deployed.
If you dont want firewall protection for the sap server from the 18.104.22.168/24 segment, then you need to check the way routing is configured from the segment 22.214.171.124/24 till the sap server and do necessary changes, so that traffic from 126.96.36.199/24 segment will reach the SAP server with out passing through the firewall.
Kindly revert back with more details on your setup/requirement to us, if the above explanation doesn't apply to your network/needs.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...