I am a newbie to Cisco PIX 501, i have recently joined this company where they have servers at Data center and they are behind this PIX501. All the configuration were done by the former sys admin.
Now i have installed Advenet Application Manager in one of the data center linux machine, this s/w is used to monitor our clients servers, now my development team has installed JBoss on the clients server and they want to monitor this server through the monitoring software.
The network admin at my clients place have allowed full access to my monitoring servers ip, and now its my trun to give full access to the the clients server's ip.
I googled and gave some try to the PIX, but in vain, it didn't work.
I had issued this command to allow full access to the clients IP.
access-list outside_access_in permit tcp any host 202.87.xx.xxx
202.87.xx.xxx this is the IP of my monitoring s/w.
Can some one please tell me what all others command are needed to allow full access to all ports to the clients server.
When properly configured, the PIX Firewall can secure your network from outside threats. The PIX Firewall is not a turn-key system. You have to program it to identify which hosts can access your inside network and which cannot. It is your responsibility to protect your network. The PIX Firewall will not prevent all forms of security threats, but its features provide you with an arsenal of resources to repel network attacks. The PIX Firewall cannot protect your network from inside attackers. To properly protect against these threats, all persons with access to the inside network should be given only the least privilege and access they require to perform their jobs. This access should be reviewed periodically, and updated if necessary
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...