/build/static/layout/Breadcrumb_cap_w.png

K2000 RSA behind NAT

Hello,

Is it possible to set up a K2000 RSA behind a NAT ? Which ports to open ? How to configure appliance link ?

Thank you



0 Comments   [ + ] Show comments

Answers (1)

Posted by: Nico_K 9 years ago
Red Belt
0
See this list:
https://support.software.dell.com/kb/129799
 

80 -- HTTP

139 -- SAMBA share

135 -- SAMBA share

445 -- SAMBA share (Direct-hosted SMB traffic without a network basic input/output system (NetBIOS): port 445 (TCP and UDP).

22 -- SSH (outbound only for tethers)

22 -- SSH for syncing to RSA and single sign-on

389 -- LDAP (if using LDAP authentication)

636 -- LDAPS (if using secure LDAP authentication)

67 -- DHCP

69 -- TFTP

4011 -- PXE

8108 -- Media Manager

These ports also cover communication between the K2000 and an Rempte Site Appliance.

Ensure routers / firewalls are setup to allow DHCP to traverse them (BootP protocol) if clients span across them.

K2000 does not have a built-in firewall. The K2000 is not recommended for DMZ operations, only for operation on the internal network.


Comments:
  • Thank you, I've already open theses ports, the rsa can connect to the k2 but th k2 can't do it to the RSA... - gwir 9 years ago
    • this looks more like a DNS issue. Try the IP, if this don't help, open a ticket with support, since it is easier to check what is causing this with a webex on your env - Nico_K 9 years ago
      • I think it's a port forwarding issue, is there a way to specifie the host name as remote.server.com:2222 ? - gwir 9 years ago

Don't be a Stranger!

Sign up today to participate, stay informed, earn points and establish a reputation for yourself!

Sign up! or login

Share

 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ