Specifications
5-15
Cisco Global Site Selector Administration Guide
OL-5480-01
Chapter 5 Configuring Access Lists and Filtering GSS Traffic
Deploying GSS Devices Behind Firewalls
Configuring GSS Devices Behind a Firewall
To configure GSS devices to operate behind a firewall:
1. Determine the level of access and the services you want enabled on your GSS
and GSSM devices. Decide if you want to:
• Allow FTP, SSH, and Telnet access to the GSS device
• Permit GUI access to the primary GSSM
Table 5-2 and Table 5-3 illustrate the GSS-related ports and protocols to
enable for the GSS device to function properly.
2. Construct your access lists to filter traffic incoming and outgoing from your
GSS device. See the
“Creating an Access List” section for details.