I've got a 525 with 3 interfaces and all works fine until I apply an access list (access-list dmz permit tcp host 10.10.20.10 host 192.168.1.39 eq smtp) to the dmz interface to allow a mail server to hit the inside. After I apply this access-list, dmz hosts can no longer access the outside. If...
I'm running an XP pro SP1 machine with a share that 5 people map a drive to. Since I brought the machine up yesterday this share becomes unavailable every 2 or 3 hours. I can still connect to the machine via remote desktop, and if I stop and restart the server service the share is once again...
I have a simple pix to pix vpn setup between my 515 and a 501 at my remote office. For security reasons I currently I have the tunnel locked down so that users behind the 501 can only hit server A behind my 515. This is working fine, but I am curious if there is a way to allow all users behind...
I have a single WWW server in the DMZ of my pix. I have a static command tying the public address to the private address of the server, but I realized today that there is no access list allowing traffic to hit the server, I must have removed it at some point. So, I can't figure out why people...
I am curious here if anyone has installed a Verisign certificate on a Cisco 3005 concentrator. I've read vague references here and there that this can be done, but no absolute statements from Cisco. The Cisco salespeople I've talked to so far have had very little knowledge of the 3005...
I am curious what those of you running OWA have done to make it as secure as possible. It was mentioned in the PIX firewall forum by Yizhar that OWA should not be run from inside of the network unless the users only access via VPN. This makes sense to me but unfortunately our users access OWA...
In an earlier post Yizhar wrote the following:
"My suggestion is not to solve that problem, but to avoid future worse advantures by not allowing OWA to your internal Exchange server, or at least only allowing it via VPN."
I am assuming this is due to the security risk? I am curious if...
I was wondering if anyone here is using certificates to enhance IPSEC security. The decision I need to make is wether to use a 3rd party CA source like Verisign, or to use an in house 2k machine for my CA server. Any suggestions/ experiences would be appreciated. Thanks.
Brian
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.