Chapter 5 Configuring Access Lists and Filtering GSS Traffic
Deploying GSS Devices Behind Firewalls
5-16
Cisco Global Site Selector Administration Guide
OL-10410-01
Configuring GSS Devices Behind a Firewall
To configure GSS devices to operate behind a firewall, perform the following
steps:
1.
Determine the level of access and the services that you want enabled on your
GSS and GSSM devices. Decide if you want to:
•
Allow FTP, SSH, and Telnet access to the GSS device
•
Permit GUI access to the primary GSSM
Table 5-2
and
Table 5-3
list the GSS-related ports and protocols to enable for
the GSS device to function properly.
2.
Construct your access lists to filter traffic incoming and outgoing from your
GSS device. See the
“Creating an Access List”
section for details.