<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 web server help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817903#M1021168</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also see for bes practice of IIS security :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_6_0/reference/guide/icme60sg.pdf" target="_blank"&gt;http://www.cisco.com/en/US/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_6_0/reference/guide/icme60sg.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Page NO 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dharmesh Purohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 05 Aug 2007 22:16:46 GMT</pubDate>
    <dc:creator>purohit_810</dc:creator>
    <dc:date>2007-08-05T22:16:46Z</dc:date>
    <item>
      <title>PIX 501 web server help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817900#M1021133</link>
      <description>&lt;P&gt;So I'm going to be running a pix 501 with two web servers.  In order to make it as secure as possible I'm doing port forwarding (from a router), through the pix, to the web server.  Now here is where i need help... Do I have to create ACLs for each and every port to make it secure? What is the best way to go about doing this, because I don't want to open up to much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817900#M1021133</guid>
      <dc:creator>homeboarder8</dc:creator>
      <dc:date>2019-03-11T10:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 web server help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817901#M1021148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure why you need to do it twice. Lets just say if your web server is in the Inside zone with an ip address of 192.168.1.10 and the public IP is 200.200.200.1, this is what you need to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.200.200.1 www 192.168.1.10 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 200.200.200.1 eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should help you out. Do the same way for the second server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Hoogen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Aug 2007 16:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817901#M1021148</guid>
      <dc:creator>hoogen_82</dc:creator>
      <dc:date>2007-08-04T16:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 web server help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817902#M1021159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See, One way you can implement security on WEBSERVER.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You must have to PATCH the server before you live it.&lt;/P&gt;&lt;P&gt;2) You must have to do hardning of server. (See Webserver hardning procedure.)&lt;/P&gt;&lt;P&gt;3) You must have password of mean .. web admin.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) after you need access-list. USE FIXUP command to change port no than default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dharmesh Purohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Aug 2007 22:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817902#M1021159</guid>
      <dc:creator>purohit_810</dc:creator>
      <dc:date>2007-08-05T22:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 web server help</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817903#M1021168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also see for bes practice of IIS security :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_6_0/reference/guide/icme60sg.pdf" target="_blank"&gt;http://www.cisco.com/en/US/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_6_0/reference/guide/icme60sg.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Page NO 90&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dharmesh Purohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Aug 2007 22:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-web-server-help/m-p/817903#M1021168</guid>
      <dc:creator>purohit_810</dc:creator>
      <dc:date>2007-08-05T22:16:46Z</dc:date>
    </item>
  </channel>
</rss>

