.NET messenger voice chat not working through PIX firewall

Hi All,

From local LAN i am not able to do voice chat using .NET messenger service.

Below is the configuration of my pix firewall.

Some the sites suggested to open ports for messenger service to work through pix. Can you please suggest if i am missing any configuration steps.

Thanks in Advance Satheesh Kiran

Configuration

-------------------- wr ter Building configuration... : Saved : PIX Version 6.3(5) interface ethernet0 auto interface ethernet1 auto nameif ethernet0 outside security0 nameif ethernet1 inside security100 enable password zfhA6hiWi6pqC2m5 encrypted passwd zfhA6hiWi6pqC2m5 encrypted hostname gw-hyd-stpi domain-name portalplayer.com fixup protocol dns maximum-length 512 fixup protocol ftp 21 fixup protocol h323 h225 1720 fixup protocol h323 ras 1718-1719 fixup protocol http 80 fixup protocol rsh 514 fixup protocol rtsp 554 fixup protocol sip 5060 fixup protocol sip udp 5060 fixup protocol skinny 2000 fixup protocol smtp 25 fixup protocol sqlnet 1521 fixup protocol tftp 69 names access-list vpn-out permit tcp any host 196.12.45.12 access-list vpn-out permit udp any host 196.12.45.12 access-list vpn-out permit tcp any host 196.12.45.12 eq 6901 access-list vpn-out permit udp any host 196.12.45.12 eq 6901 access-list vpn-out permit udp any host 196.12.45.12 eq 1863 access-list vpn-out permit tcp any host 196.12.45.12 eq 1863 access-list vpn-out permit udp any host 196.12.45.12 range 1 65535 access-list vpn-out permit tcp any host 196.12.45.12 range 1 65535 access-list vpn-out permit icmp any any access-list vpn-out permit gre any host 196.12.45.10 access-list vpn-out permit tcp any host 196.12.45.10 eq pptp access-list vpn-out permit udp any host 196.12.45.10 eq isakmp pager lines 24 logging on logging monitor debugging logging trap debugging logging history debugging logging facility 23 logging host inside 10.2.0.189 mtu outside 1500 mtu inside 1500 ip address outside 196.12.45.2 255.255.255.224 ip address inside 10.2.2.222 255.255.240.0 ip audit info action alarm ip audit attack action alarm no failover failover timeout 0:00:00 failover poll 15 no failover ip address outside no failover ip address inside pdm history enable arp timeout 14400 global (outside) 1 196.12.45.3 nat (inside) 1 0.0.0.0 0.0.0.0 0 0 static (inside,outside) 196.12.45.10 10.2.0.44 netmask 255.255.255.255

0 0 static (inside,outside) 196.12.45.11 10.2.0.27 netmask 255.255.255.255 0 0 static (inside,outside) 196.12.45.12 10.2.0.122 netmask 255.255.255.255 0 0 access-group vpn-out in interface outside route outside 0.0.0.0 0.0.0.0 196.12.45.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00 timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00 timeout sip-disconnect 0:02:00 sip-invite 0:03:00 timeout uauth 0:05:00 absolute aaa-server TACACS+ protocol tacacs+ aaa-server TACACS+ max-failed-attempts 3 aaa-server TACACS+ deadtime 10 aaa-server RADIUS protocol radius aaa-server RADIUS max-failed-attempts 3 aaa-server RADIUS deadtime 10 aaa-server LOCAL protocol local no snmp-server location no snmp-server contact snmp-server community Iwannabe1 no snmp-server enable traps floodguard enable sysopt connection permit-ipsec service resetinbound telnet timeout 5 ssh 10.2.0.10 255.255.255.255 inside ssh 10.2.0.9 255.255.255.255 inside ssh 0.0.0.0 255.255.255.255 inside ssh 10.2.0.0 255.255.240.0 inside ssh timeout 60 console timeout 0 terminal width 80 Cryptochecksum:100f37de68e4579a9b632ad071823245 : end [OK] gw-hyd-stpi(config)#
Reply to
Satheesh Kiran
Loading thread data ...

so you are working for _the_ nvidia, your xp pro (10.2.0.122) is online with rdp open to the whole world. you are posting your encrypted pix password and all public ip's. you make sure that _all_ ports are open to 196.12.45.12.

access-list vpn-out permit tcp any host 196.12.45.12 access-list vpn-out permit udp any host 196.12.45.12 ... access-list vpn-out permit udp any host 196.12.45.12 range 1 65535 access-list vpn-out permit tcp any host 196.12.45.12 range 1 65535

i think you should get someone who knows what their doing as far as security at nvidia _soon_

yeah, your snmp community is also posted.

M
Reply to
mak

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.