Cisco PIX 525 Spezifikationen Seite 428

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 466
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 427
Ta b l e C-1 Names and Addresses
System Name IP Address Domain
Outside Windows NT Server outserver 209.165.201.2 pixout
Inside Windows NT Server inserver 192.168.42.2 pixin
PIX Firewall outside interface None 209.165.201.1 None
PIX Firewall inside interface None 192.168.42.1 None
C-2
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Appendix C MS-Exchange Firewall Configuration
Configuring the PIX Firewall
The PIX Firewall static command statement uses 209.165.201.5 as its global address. An administrative
domain is created with the Microsoft Exchange Administrator application named CISCO in this
example. This domain includes both servers.
The sections that follow show how to configure the Microsoft Exchange servers and the PIX Firewall.
Complete each section before moving to the next.
Configuring the PIX Firewall
Follow these steps to configure the PIX Firewall:
Step 1 Create static and access-list commands to permit the outside server access to the inside server via the
global address in the PIX
Firewall.
For example:
static (inside,outside) 209.165.201.5 192.168.42.2 0 0
access-list acl_out permit tcp host 209.165.201.2 host 209.165.201.5 eq 139
access-list acl_out permit udp host 209.165.201.2 host 209.165.201.5 eq 137
access-list acl_out permit udp host 209.165.201.2 host 209.165.201.5 eq 138
access-list acl_out permit tcp host 209.165.201.2 host 209.165.201.5 eq 135
access-group acl_out in interface outside
The static command statement permits the inside server, 192.168.42.2 to be accessible from the outside
at global address 209.165.201.5. The access-list commands give the outside server, 209.165.201.2,
access to the inside server’s global address, 209.165.201.5. Port 139 gives access to NetBIOS over TCP.
Access to UDP ports 137 and 138 is also required.
The last access-list command statement for TCP port 135 permits the outside server to come in via
MSRPC (Microsoft Remote Procedure Call), which uses TCP.
The access-group command statement binds the access-list command statements to the outside
interface.
Step 2 The static command statement in Step 1 also allows outbound initiation, but requires an established
command statement to allow back connections:
established tcp 135 permitto tcp 1024-65535
This command statement allows the RPC back connections from the outside host on all high ports (1024
through 65535) to deliver mail.
Step 3 Enter the syslog console command statement so that you can watch for messages after you configure the
two servers.
Seitenansicht 427
1 2 ... 423 424 425 426 427 428 429 430 431 432 433 ... 465 466

Kommentare zu diesen Handbüchern

Keine Kommentare