I have tried to setup the firewal to accept access for port 80
I have tried almost everything with this firewall, I just can't get the firewall to accept trafic on port 80.
I have set up the server int the Address book and I have published the IP on the Wan Port and I have set up the rules with SAT and Allow. I have followed the instrucktions completely and still the firewall will not accept trafic on port 80
Re: I have tried to setup the firewal to accept access...
Some ISP's block port 80, the problem is not the firewall, following the procedure as described on d-link website should do it. If the problem is really the ISP, you have two choices:
Switching to a plan that allows you to use port 80.
Use port 8080, as alternate web port. The disadvantage is that acess will require http://ipadress:8080
- If you need clarification, ask it in the comment box above.
- Better answers use proper spelling and grammar.
- Provide details, support with references or personal experience.
Tell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only.
Tip: The max point reward for answering a question is 15.
Do you have an email server in place? If so, you need to setup port 25 for inbound access to the IP address of the email server. I would suggest that you don't allow all as that will open up everything and kind of negates the reason to have a firewall. Some ISPs block port 25 though and use port 587.
If you don't have an email server then the problem might be with your email client configuration.
hi, As per your description,in your d link firewall outgoing 51215 port is not opened.go to the access-list or security policy or access rule (I am not sure about the name) tab.make a entry like from :your ip or network id to:the sms site ip. service:51215 action:accept.
The pix does not allow you to block urls except if you use it in conjunction with websense for example. You could however deny all outgoing traffic to port 80 except for the ip address of the websites you want to be able to access.
To do that you would setup an access-list allowing you internal network to access certain ips on port 80 and deny all other traffic outgoing.
Let me know if you need more information on how to accomplish this.
You can follow the steps on this link, click here. This is the steps on how to setup port forwarding for pc anywhere on a DFL-200. There is big possibility that the DFL-80 might have the setup configuration page as the DFL-200.
Have you checked the subnet? i.e. 255.255.225.248, make sure both PC and firewall are set the same.
Check the firewall settings on the PC, for port 80, 8080 & 443 and the ip address of the unit if you connecting with web access.
Try to up the IP on the PC to 169.254.236.185, it some times does not like being before the device.
Aslo, some times the PC needs to have the network port reset, as windows keeps the old IP address, but shows the new. The quick way to check this, is to disable the network connection and then enable it again.
From the main configuration screen select Network Setup, and then click on the Connections Tab. In the tabline below that click on Aliases.
At this point you input the Alias IP address and the netmask and add it, selecting port 25. The firewall now knows that it is to forward all traffic on port 25 to the computer that has the IP address you put in.
You should be aware that doing the above opens a direct access point into your network! Port 25 is the port used for SMTP (Sendmail) and it is the most vulnerable and most hacked service on the Internet! You should seriously consider not doing this.
A better option would be to goto the DMZ tab and configure a DMZ net on your firewall - you will need to obtain a second routable IP address from your ISP to do this though. By creating the DMZ and then routing port 25 to a machine inside the DMZ you isolate the machine running SMTP from all of the other machines inside your protected network and so make a compromise much less likely.
All of the systems inside your protected network will still have demand access to the machine in our DMZ, but the machine in your DMZ would be unable to initialize access to the protected network, which is a much safer setup.