ACS 4.0 behind a firewall

Hi, we have an ACS 4.0 behind a firewall...

I want to know what are the ports that must be open beyond 2002 to end of remote connection... ?

Any idea... ?

Hello

ACS is accessible via tcp, 2002, for the initial connection. For subsequent access (moving from one page to the other), it will be used at random ports 2003 or higher (tcp).

To access this box remotely, you must open a range of ports, for example-> 3500 2002 or 2002-> 5000. PLS, be careful when you specify the range, as too many ports allowed ports COULD present a risk to your ACS server.

example:

list of access outside the range of allowed hosts 2002 5000 tcp

Hope this helps.

Rgds,

AK

Tags: Cisco Security

Similar Questions

  • Will be - this safe to use XP behind a firewall after the end of LIFE?

    I have a netbook that I use as an external 1 TB NAS with a hard drive device on my LAN.  I use it also for connection of MagicJack.  I have a firewall in my router and the only thing that that accesses this machine online is updated antivirus and places / receives calls from Magic Jack.  I don't respect the minimum specifications for Windows 7.

    If I keep this machine behind the firewall and prevent web access, it will be safe to stay with XP after the end of life?  MagicJack is a security breach?  My only other option is to switch to a Linux distribution, but I need to configure to run on a Windows network and it seems that you have to do back flips to get the MagicJack to work on Linux.
    Any advice will be appreciated.

    End of the security updates is something much more...

    antivirus support, but again, you are not protected completely...
  • It is possible to configure router CISCO1921/K9 from site to Site vpn behind a firewall?

    I am looking to buy CISCO1921/K9 to configure vpn site to site with Amazon VPN. We are behind a firewall. I try to install the new CISCO1921/K9 router according to the scheme of quick text below. My setup work? and what are the ports will it transfer to my firewall?

    INTERNET--> Modem to ISP---> firewall - CISCO1921/K9

    Hi Paul,.

    (192.168.1.0/24) - router (10.1.1.1)-(10.1.1.2) firewall(81.92.61.x/27)---Internet

    The configuration is very simple...

    1. There will be no modifications on the configuration of the VPN router with the exception that the interface of the router (turning to the firewall) will be to have private IP 10.1.1.1

    2. you will need to take a public IP of your range of public (e.g. 81.92.61.2) and will share the same to your remote location which they set up as peers IP to their end.

    3. now you have to configure 2 NAT type on your firewall.

    NAT source:-when your router will initiate VPN

    Before NAT: Destination - Source 10.1.1.1-(homologous remote IP)

    After NAT: Destination - Source 81.92.61.2-(homologous remote IP)

    Destination NAT:-when the remote location will launch the VPN

    before NAT: Destination - Source (remote peer IP)-(81.92.61.2)

    After NAT: Destination - Source (remote peer IP)-(10.1.1.1)

    I hope this is clear :)

  • Monitoring of the BONE located behind a firewall

    We must monitor the infrastructure of the operating system on our web servers. These servers are locked for NIS accounts SSH connections, but we can configure a local user with permissions of SSH to a remote agent.

    If we wanted to install a Manager agent on that server instead, is anyway to configure agent manager so that the data is only collected in a survey of the FMS, rather than pushing for the https port 8443 on network internal? Basically, do the transfer information officer Manager of a 'pull' instead of a 'push '.

    Or y at - it a way to get this information to the FMS server internal without opening a two-way port, or not allowing a connection on one direction to be open?

    Or the bottom line here - what is the accepted best practice to create a secure communication information of OS of DMZ servers behind a firewall of SGF?

    Unfortunately, it is currently the only solution.

    In the next major release, we'll add a feature where you can enable reverse-vote for Manager of the specific agent. Those who would be interviewed by the FMS instead of pushing their data and the connection will always be initialized by the FMS.

    This will reverse the direction of the connection and the FMS now needs to open a connection in the demilitarized zone. This will remove the requirement to open an outgoing socket of the DMZ to the host of the FMS.

    Stefan

  • Use Virtual Cener behind a firewall - high security

    OK, 2 ESX servers are connected behind a firewall. My VC/VIM is a virtual machine on the second ESX host. I installed VC on the virtual machine and was able to connect to it very well. Virtual Infrastructure Client connects to the server VC/VIM. When I try to add one of the ESX servers to my new 'Datacener' I go through the guests of identification and so on. I get to the point where it gives me a list of all the VMS on the server, then click on the "Finish" button and I get an error...

    "Failed to connect to host".

    Keep in mind here that the ESX what IP console is on another segment of the VC/VM.

    Any ideas on what prevents traffic? Appropriate for VIC to work ports are correct. Did I miss a port somewhere?

    Thank you

    How is the routing between the n/w for the n/w VM Console? It is a layer 3 with intravLAN active routing switch or go you through a router? can you run a scan of the virtual machine on the ESX server console IP port and see what all the ports are open. I doubt if the VMware-vpxa agent is installing on the ESX Server.

    You can manually copy the installation script for the VPXagent on the ESX Server and start the installation manually. Check if the connected ESX Server getts now.

    -Surya

  • DMVPN router behind a firewall

    Hi all

    I would like to know if the router DMVPN works behind a virtual firewall.

    We use ISR routers

    ISR router (spoke)--> virtual firewall--> WAN<-- isr="">

    Please notify

    HIII Jocelyn

    Nice to meet you here also...

    Yes, you are right. all you have to do is open the ports for traffic dmvpn. and also the NAT if the firewall is also performing NAT.

  • How one not acquire Modules for ffx installed behind the firewall?

    I have several installations of firefox on platforms behind several firewalls without internet access. They are maintained to easily access LAN servers, containing notes/logs, etc.. I used several addons, more precisely the all-in-One sidebar for several years. However the current addon page to automatically install the active browser rather than provide a download I can migrate to other browsers. Info in the text below is a MSW platform, but also have many * nix installs that I would like to support.

    Question - how does a download and NOT ask on an active browser, but rather migrate to other facilities in offline mode.

    Hello, when I right click on the button Add to firefox on https://addons.mozilla.org/en-US/firefox/addon/all-in-one-sidebar/ and select Save link under , then as the addon file will be downloaded which could then be transferred to the other pc without internet access.

  • Behind a firewall for Internet connections and wireless and inaccessible

    My netbook (XP) was attacked by viruses and therefore the firewall has blocked the internet and wireless connections. I installed the new Norton protection and this shows the machine also Ok. Here's the question - how can I activate the connections again? I realize that he is probabl; is really easy, but I just can not understand. Your help is appreciated. Thank you, Steve.

    You can try to disable the Windows Firewall:

    http://www.Webcam123.com/en/FAQ/xp_firewall.html

    If you have installed the new Norton protection, I don't think that you need more Windows Firewall.

  • SX10 - how to access the web interface behind a firewall

    Howdy

    I have a very simple configuration, router and behind her SX10. I can't access the web interface of the remote unit. Is there a port that I need to activate or something?

    When the device was connected directly to the modem, with the public IP address, I was able to connect to the web interface.

    any suggestions here?

    I enter anything in the field AllowRemote.

    Thanks in advance!

    Web interface can be accessed using HTTP ether (80) or HTTPS (443).  To you how you want to deploy, but you can use NAT on the router, port forwarding, or even put the SX10 in DMZ on the router.

  • Device behind a Firewall other, ASA VPN

    I have a client who wants to put their VPN / behind the ASA ASA main connected to the Internet.  Both devices have an inside leg for the internal network, but the ASA VPN connects directly to the Internet ASA.

    Topology:

    Outisde FW: Internet transfer Procedure > ASA/FW > leg DMZ to ASA/VPN

    ASA VPN: Outside the L3 Interface interface DMZ of ASA/FW link

    On the outside NAT FW I would be the external address of the VPN / ASA outside the public IP address is available and I have a rule that allows all IP from outside to outside the private IP VPN.  Inside = 192.168.254.1 outside = public IP address.

    Configured on the VPN / ASA, ASA standard SSL Remote Access.

    When I hit the NAT public IP address, nothing happens.  I've run packet - trace on the FW outside, and everything seems good.

    Someone at - it a sampling plan / config for a similar topology?     Internet > ASA/FW > dmz-leg > ASA/VPN

    Thanks in advance,
    Bob

    Can share you your NAT and routing configuration? Of these two ASAs

  • ESX 3.5 behind a firewall

    Requirement

    ESX server is on DMZ on material internal HP and VC (2.5) on the local network. The server license to be used and the lic Flex-based server located on the same server as the CV

    Ability to deploy software on ESX by use of the ILO by the Admins (media access both Console & virtual)

    Ability to support the app remotely to the virtual machine is in DMZ to manage virtual machines only, and deploy software. Preference if support app can load the application themselves, and if possible not admin wants if for them. mstsc/landesk/sms/dameware, etc. is not allowed.

    Ability to deploy the server software of Altiris RDP, which is inside the internal network

    DNS name resolution should be allowed.

    It operates a strict policy and ports must be reduced to the bare minimum

    ******************************************************************************************************************************************************************************************************

    Ports to open and the solution that I can think off

    ESX to Flex lic (27000 & 27010), ESX Vcenter/Web server (443 and 903/UDP), VI to ESX (902 and 903), ILO of ESX (23 & 17988), DNS (53 TCP/UDP)

    Is there another that add IP helper ipaddresses on switches all the ports required for VM server RDP altiris deployment? Is the risk of using RDP over that advantage?

    Support team App access through 'Generate Remote Console URLS' for VM on VC. And admin teams put the software for them on VM. Is there a better solution to this?

    If we used the host-based authorization, would be 27000 and 27010 should still be open on the firewall

    Suggest ports that can be added or removed, or anything else useful. Thanking you

    I suggest you use a VPN system.

    I have more secure and you have open (usually) a single port.

    André

    * If you found this device or any other answer useful please consider awarding points for correct or helpful answers

  • ACS 4.0 Local firewall devices

    All,

    I just read a message labeled "ACS 4.0 firewall" and he talked about opening 2004 for 5000 ports to access the ACS server that is behind the firewall. My question is this same range of ports apply if you try to access and authenticate on a device that is behind a firewall. When I try to access one of my devices located behind the firewall I can't authenticate via the GBA so I find myself using the local username and password. Can someone tell me what are the ports I need to open the firewall to allow the authetication return to the ACS server. Thank you

    Hello

    GANYMEDE + authentication service between network devices and AAA server is running on TCP 49. The port 2004-5000 range applies only if you need to access the ACS server (for the purposes of management) from the outside / internet. In your case, if you want to access your devices behind the firewall from external network, what you need is to map your internal network with the public IP devices and open the port of ddesired service, for example SSH (tcp 22) on your Firewall outside interface ACL to allow incoming access.

    For your internal devices, you must have the configuration appropriate AAA that point to ACS (e.g. GANYMEDE +). In your GBA, set these devices as customer AAA and set up appropriate IP, key secret and using GANYMEDE +.

    Before testing ssh access internet/external network, test your SSH access locally. He must succeed in getting AAA to authenticate your request of SSH connection.

    http://www.Cisco.com/en/us/partner/products/sw/secursw/ps2086/products_user_guide_chapter09186a008052e996.html

    I hope this helps.

    Rgds,

    AK

  • several customers behind peripheral pptp firewall/nat at vpn3015

    Hello

    I'll try the following:

    Win2K PC behind a modem to Lan 3com (making the nat) try to make a pptp connection to our vpn concentrator. A customer will always be to establish contact, but future clients will fail. The vpn concentrator has the following message is displayed:

    815 10/21/2002 19:55:49.870 SEV = 4 RPT PPTP/33 = 20 x.x.x.x

    Tunnel PPTP for peer x.x.x.x refused - already put in place

    We also tried another site that is behind a firewall, and the same thing happens.

    Such an arrangement is possible support 3015 vpn concentrator using?

    Will this work if I use the client ipsec (cisco or win2k)?

    Thank you

    Norman

    I suspect that you really have an environment PAT (Port Address Translation, or more within a single address on the outside). If this is the case, PPTP will fail because it uses GRE, which is IP (Protocol 47, I think) as well as TCP port 1723. Since GRE is not a port associated with this such as TCP or UDP, most implementations fail completely or, as in your case, allow only one simultaneous connection.

    If you go to IPSec by using the Cisco Unity client, you can work around this by implementing IPSec over UDP, which will transport over UDP, thus allowing the ports to associate with different connections.

  • Upgrade behind firewall settings against TMS

    Hello

    We have hundreds of endpoints at home on the Internet. (E20, 1700MXP, EX etc.). All are now in need of a software upgrade.

    I know TMS connection could not be established for the endpoints behind the firewall.

    Thus, we have planned for the upgrade manually.

    But I still want to check, is it a way automate this either through the software upgrade option MSDS or any other option.

    Any practical solution is appreciated.

    Best regards / / Rio

    From what I remember, because TMS does not have direct access to the endpoints to trigger the upgrade.  TMS tells endpoints at the start when they contact TMS if they have an update on hold, indicating then endpoints to start to download the update and install it.  If endpoints are configured in the connection settings in MSD to be behind the firewall, that TMS won't know if you are planning of these units go through a software update, it will delay the schedule until it receives feedback from start from the endpoint to initiate the upgrade process.

  • ASA behind Firewall VPN

    Hello

    Does anyone know if a remote access VPN (ASA) behind another firewall with NAT (Checkpoint), works just fine?

    I need to set up a remote access SSL vpn in an ASA 5512 - X but the ASA is in a DMZ to a firewall checkpoint with the public IP address and internet connection.

    Thank you.

    Andres

    Yes. I used remote VPN SSL ASA access when the SAA outside interface is behind another firewall that is NATting address. As long as the second firewall allows tcp/443 (SSL, assuming a default configuration), it works fine.

    For a VPN IPsec, a little more ports are required (udp/500 and 4500 in general).

Maybe you are looking for