<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows 2000 Authentication through Pix in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7481#M7255</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configure to open all netbios ports as outlined here: &lt;A class="jive-link-custom" href="http://www.cisco.com/warp/customer/110/pixfaq.shtml#Q21" target="_blank"&gt;http://www.cisco.com/warp/customer/110/pixfaq.shtml#Q21&lt;/A&gt; For testing you can conduit permit ip any any to verify connectivity and then remove that narrow that down to the specific ports &amp;amp; protocols in the FAQ.  The syslog in debugging mode is the window into the PIX&amp;#146;s mind that tells you all.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Jun 2001 19:17:14 GMT</pubDate>
    <dc:creator>a-vazquez</dc:creator>
    <dc:date>2001-06-05T19:17:14Z</dc:date>
    <item>
      <title>Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7480#M7254</link>
      <description>&lt;P&gt;We are trying to put an OWA Server for Exchange 2000 in the DMZ.  We cannot logon to the domain when we have the server in the DMZ.   What ports need to be opened or other configuration needs to be done to get authentication to work through the Pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 06:29:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7480#M7254</guid>
      <dc:creator>rainier</dc:creator>
      <dc:date>2020-02-22T06:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7481#M7255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configure to open all netbios ports as outlined here: &lt;A class="jive-link-custom" href="http://www.cisco.com/warp/customer/110/pixfaq.shtml#Q21" target="_blank"&gt;http://www.cisco.com/warp/customer/110/pixfaq.shtml#Q21&lt;/A&gt; For testing you can conduit permit ip any any to verify connectivity and then remove that narrow that down to the specific ports &amp;amp; protocols in the FAQ.  The syslog in debugging mode is the window into the PIX&amp;#146;s mind that tells you all.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2001 19:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7481#M7255</guid>
      <dc:creator>a-vazquez</dc:creator>
      <dc:date>2001-06-05T19:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7482#M7258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can get a range of tips from Microsofts whitpaper "Exchange 2000 Front-end and Back-end topology". They have examples of exchange in a DMZ and what ports needed to be open (quite a few..).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whitepaper:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.microsoft.com/exchange/techinfo/deployment/2000/E2KFrontBack.asp" target="_blank"&gt;http://www.microsoft.com/exchange/techinfo/deployment/2000/E2KFrontBack.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Henrik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2001 13:38:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7482#M7258</guid>
      <dc:creator>henrik.aslund</dc:creator>
      <dc:date>2001-06-13T13:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7483#M7261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wouldn't suggest allowing domain login's from a lower security interface to the inside.  There are known vulnerabilities with ports 137 and 139, which are used by the feared SUB-7 trojan which would compromise the internal LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use AAA with Cisco ACS and then you only have to allow port tcp-49 to connect via tacacs to the ACS server on the inside and have ACS use the PDC for authenticating the exchange server's login.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just thought that would be safer...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gary Freeman&lt;/P&gt;&lt;P&gt;Network Analyst II&lt;/P&gt;&lt;P&gt;Rogers Communication Inc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Jun 2001 02:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7483#M7261</guid>
      <dc:creator>gtfree</dc:creator>
      <dc:date>2001-06-17T02:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7484#M7263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree use AAA and configure IIS TacAcs service to control logins.  Much more secure&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2001 13:58:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7484#M7263</guid>
      <dc:creator>zharling</dc:creator>
      <dc:date>2001-07-31T13:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7485#M7264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it works&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 19:36:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7485#M7264</guid>
      <dc:creator>ssyed</dc:creator>
      <dc:date>2001-11-14T19:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Windows 2000 Authentication through Pix</title>
      <link>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7486#M7265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am working on same issue. But how can you configure a NT server in DMZ to use TACCA and do a PDC login. Can you explain the whole thing in detail.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2001 20:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/windows-2000-authentication-through-pix/m-p/7486#M7265</guid>
      <dc:creator>ssyed</dc:creator>
      <dc:date>2001-11-14T20:11:01Z</dc:date>
    </item>
  </channel>
</rss>

