Ok, I have GroupWise 6 setup on a Netware 6 SBS with bordermanager. I
can't get access on the outside to the webaccess for the life of me. I am
fairly new to bordermanager, I found that if I unload ipfilt I can then
access from the outside. I will post my filter list below. ANy help would
be appreciated! ALso webaccess, all groupwise components and bordermanager
are running on the same server, the private ip address is the one that
starts with 172. We are using groupwise for intenal mail with no problems.

List Of Filters For RP, Wed May 12 14:23:23 2004

IPX Outgoing SAP Filters
Status: Enabled
Action: Deny Services in Filter List

Filters:

#1
Service Name: *
Service Type: FFFF

Destination: PUBLIC
All Circuits

Comment: Added by BCAPI to block all IPX SAP traffic.


Exceptions:

<none>


IPX Incoming SAP Filters
Status: Enabled
Action: Deny Services in Filter List

Filters:

#1
Service Name: *
Service Type: FFFF

Source: PUBLIC
All Circuits

Comment: Added by BCAPI to block all IPX SAP traffic.


Exceptions:

<none>


IPX Outgoing RIP Filters
Status: Enabled
Action: Deny Networks in Filter List

Filters:

#1
Filtered Route: 00000000/00000000

Do Not Advertise Route To: PUBLIC
All Circuits

Comment: Added by BCAPI to block all IPX RIP traffic.


Exceptions:

<none>


IPX Incoming RIP Filters
Status: Enabled
Action: Deny Networks in Filter List

Filters:

#1
Filtered Route: 00000000/00000000

Advertise Route To: PUBLIC
All Circuits

Comment: Added by BCAPI to block all IPX RIP traffic.


Exceptions:

<none>


IPX NetBIOS Filters
Status: Enabled
Action: Deny Packets in Filter List

Filters:

<none>


Exceptions:

<none>


IPX Packet Forwarding Filters
Status: Enabled
Action: Deny Packets in Filter List

Filters:

#1
Packet Type: <ANY>

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
Any Address

Comment: Added by BCAPI to block all IPX packets.

#2
Packet Type: <ANY>

Source: PUBLIC
All Circuits
Any Address

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BCAPI to block all IPX packets.


Exceptions:

<none>


TCP/IP Outgoing RIP Filters
Status: Enabled
Action: Deny Routes in Filter List

Filters:

#1
Filtered Route: All Routes

Do Not Advertise Route To: PUBLIC
All Circuits

Comment: Added by BRDCFG to block all IP RIP traffic.


Exceptions:

<none>


TCP/IP Incoming RIP Filters
Status: Enabled
Action: Deny Routes in Filter List

Filters:

#1
Filtered Route: All Routes

Advertise Route To: PUBLIC
All Circuits

Comment: Added by BRDCFG to block all IP RIP traffic.


Exceptions:

<none>


TCP/IP Outgoing EGP Filters
Status: Enabled
Action: Deny Routes in Filter List

Filters:

#1
Filtered Route: All Routes

Do Not Advertise Route To: PUBLIC
All Circuits

Comment: Added by BRDCFG to block all IP EGP traffic.


Exceptions:

<none>


TCP/IP Incoming EGP Filters
Status: Enabled
Action: Deny Routes in Filter List

Filters:

#1
Filtered Route: All Routes

Advertise Route To: PUBLIC
All Circuits

Comment: Added by BRDCFG to block all IP EGP traffic.


Exceptions:

<none>


TCP/IP OSPF External Route Filters
Status: Enabled
Action: Deny Routes in Filter List

Filters:

#1
Filtered Route: All Routes

Do Not Advertise Route To: All Routes
All Circuits

Comment: Added by BRDCFG to block all IP OSPF traffic.


Exceptions:

<none>


TCP/IP Packet Forwarding Filters
Status: Enabled
Action: Deny Packets in Filter List

Filters:

#1
Packet Type: <Any>

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
Any Address

Comment: Added by BRDCFG to block all IP packets.

#2
Packet Type: <Any>

Source: PUBLIC
All Circuits
Any Address

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to block all IP packets.


Exceptions:

#1
Packet Type: Remote Desktop

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
Any Address

Comment:

#2
Packet Type: WebAccess IN

Source: PUBLIC
All Circuits
Any Address

Destination: <All Interfaces>
All Circuits
172.19.1.1

Comment:

#3
Packet Type: WebAccess OUT

Source: <All Interfaces>
All Circuits
172.19.1.1

Destination: PUBLIC
All Circuits
Any Address

Comment:

#4
Packet Type: WebResponseOUT

Source: <All Interfaces>
All Circuits
172.19.1.1

Destination: PUBLIC
All Circuits
Any Address

Comment:

#5
Packet Type: Web Request IN

Source: PUBLIC
All Circuits
Any Address

Destination: <All Interfaces>
All Circuits
172.19.1.1

Comment: To allow incoming traffic for the web

#6
Packet Type: DNS Response

Source: PUBLIC
All Circuits
Any Address

Destination: Q57_1_E82
All Circuits
Any Address

Comment:

#7
Packet Type: DNS Query Out

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
Any Address

Comment:

#8
Packet Type: pop3-st

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow mail proxy.

#9
Packet Type: smtp-st

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow mail proxy.

#10
Packet Type: VPN-SKIP

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow SKIP Protocol for VPN.

#11
Packet Type: VPN-KeepAlive-st

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow VPN Client Keep-Alive & Disconnect.

#12
Packet Type: VPN-AuthGW-st

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow VPN Client Authentication.

#13
Packet Type: VPTUNNEL-st

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow VPN Master/Slave communication.

#14
Packet Type: ipx/tcp-st

Source: <All Interfaces>
All Circuits
Any Address

Destination: PUBLIC
All Circuits
xx.51.146.116

Comment: Added by BRDCFG to allow VPN Master/Slave communication.

#15
Packet Type: VPTUNNEL-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow VPN Master/Slave communication.

#16
Packet Type: ipx/tcp-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow VPN Master/Slave communication.

#17
Packet Type: telnet-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow transparent telnet proxy.

#18
Packet Type: dns/udp-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow DNS proxy.

#19
Packet Type: dns/tcp-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow DNS proxy.

#20
Packet Type: rtsp-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow RTSP proxy.

#21
Packet Type: realaudio-st

Source: PUBLIC
All Circuits
69.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow Real Audio proxy.

#22
Packet Type: nntp-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow news proxy.

#23
Packet Type: pop3-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow mail proxy.

#24
Packet Type: smtp-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow mail proxy.

#25
Packet Type: ftp-port-pasv-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow FTP proxy.

#26
Packet Type: www-https-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow secure HTTP.

#27
Packet Type: www-http-st

Source: PUBLIC
All Circuits
xx.51.146.116

Destination: <All Interfaces>
All Circuits
Any Address

Comment: Added by BRDCFG to allow HTTP proxy.


AppleTalk Outgoing Route Filters
Status: Disabled
Action: Permit Routes in Filter List

Filters:

<none>


Exceptions:

<none>


AppleTalk Incoming Route Filters
Status: Disabled
Action: Deny Routes in Filter List

Filters:

<none>


Exceptions:

<none>


AppleTalk Device Hiding Filters
Status: Disabled
Action: Hide Devices in Filter List

Filters:

<none>


Exceptions:

<none>


Source Route Bridge Protocol ID Filters
Status: Disabled
Action: Deny Packets in Filter List

Filters:

<none>


Exceptions:

<none>


Source Route Bridge Ring Number Filters
Status: Disabled
Action: Deny Packets in Filter List

Filters:

<none>


Exceptions:

<none>