<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: blocking nachi worm with cisco Pix 7.x in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633331#M1026948</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need any other assistance with respect to this case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Feb 2007 23:42:01 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2007-02-06T23:42:01Z</dc:date>
    <item>
      <title>blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633327#M1026941</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I would like to block nachi worm on a Cisco &lt;/P&gt;&lt;P&gt;Pix firewall running version 7.2(2) code. &lt;/P&gt;&lt;P&gt;On Cisco IOS, I do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 199 permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list 199 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;route-map nachi-worm permit 10&lt;/P&gt;&lt;P&gt;  match ip address 199&lt;/P&gt;&lt;P&gt;  match length 92 92&lt;/P&gt;&lt;P&gt;  set interface Null0&lt;/P&gt;&lt;P&gt;interface f0/0   &lt;/P&gt;&lt;P&gt;  no ip unreachables&lt;/P&gt;&lt;P&gt;  ip route-cache policy&lt;/P&gt;&lt;P&gt;  ip policy route-map nachi-worm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be very easily with Checkpoint&lt;/P&gt;&lt;P&gt;firewalls 'cause I've done it many times.&lt;/P&gt;&lt;P&gt;I would like to accomplish this Cisco Pix&lt;/P&gt;&lt;P&gt;7.x code.  Is it possible?  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633327#M1026941</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2019-03-11T09:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633328#M1026944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX will not do source based routing.. anyway, the way pix works is different than router !! On a PIX, all packets are  blocked by default from outside to inside, which is not a feature on routers... You can put the following access-list on the PIX, to block nachi based traffic going from inside to outside .....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_inside deny icmp any any echo&lt;/P&gt;&lt;P&gt;access-list acl_inside deny icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list acl_inside deny tcp any any eq 135&lt;/P&gt;&lt;P&gt;access-list acl_inside deny udp any any eq 135&lt;/P&gt;&lt;P&gt;access-list acl_inside deny udp any any eq 69&lt;/P&gt;&lt;P&gt;access-list acl_inside deny tcp any any eq 137&lt;/P&gt;&lt;P&gt;access-list acl_inside deny udp any any eq 137&lt;/P&gt;&lt;P&gt;access-list acl_inside deny tcp any any eq 138&lt;/P&gt;&lt;P&gt;access-list acl_inside deny udp any any eq 138&lt;/P&gt;&lt;P&gt;access-list acl_inside deny tcp any any eq 139&lt;/P&gt;&lt;P&gt;access-list acl_inside deny udp any any eq 139&lt;/P&gt;&lt;P&gt;access-list acl_inside deny tcp any any eq 445&lt;/P&gt;&lt;P&gt;access-list acl_inside deny tcp any any eq 593&lt;/P&gt;&lt;P&gt;access-list acl_inside permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl_inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the best thing you can do with a firewall.. if you want more protection, i think you have to have an IPS in place.... Please refer to this security notice:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/sw/voicesw/ps556/products_security_notice09186a00801b143a.html" target="_blank"&gt;http://cisco.com/en/US/products/sw/voicesw/ps556/products_security_notice09186a00801b143a.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.. all the best.. rate replies if found useful..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 00:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633328#M1026944</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2007-02-05T00:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633329#M1026946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;Point very well taken.  However, I think you may want to rephrase this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"This is the best thing you can do with a firewall".  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think what you meant to say is "Cisco Pix/ASA&lt;/P&gt;&lt;P&gt;firewall" because I can accomplish this quite&lt;/P&gt;&lt;P&gt;easily with both Checkpoint and Juniper &lt;/P&gt;&lt;P&gt;Firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 02:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633329#M1026946</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-05T02:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633330#M1026947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i meant was, firewalls give only 70 % security to the network.. if there are some ports opened on the firewall, it generally passes the traffic on those ports, without doing application inspection, the level in which normal IPS does.. with the modern ASA firwalls, you can have IPS modules inbuilt on the firewall (with SSM), which can give you much more better protection !! probably the firewalls u had, had the built in IPS functionality !!! .... anyway, with Cisco, you can do everything that is possible with other firewalls... i dont think there can be anything missed out.. the biggest positive of Cisco ,anyday, is the support or documentation, which is not even 50 % of what other vendors provide....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.. all the best... rate replies if found useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Feb 2007 03:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633330#M1026947</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2007-02-05T03:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633331#M1026948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need any other assistance with respect to this case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Feb 2007 23:42:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633331#M1026948</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2007-02-06T23:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633332#M1026949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically no.  I just got confirmed from Cisco TAC that what I am trying to do is not possible&lt;/P&gt;&lt;P&gt;with Cisco Pix.  I don't understand why Cisco &lt;/P&gt;&lt;P&gt;doesn't design firewall like other vendors such&lt;/P&gt;&lt;P&gt;as Juniper or Checkpoint.  Checkpoint had this&lt;/P&gt;&lt;P&gt;capability since version 4.1, like six years ago.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Feb 2007 13:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633332#M1026949</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-07T13:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: blocking nachi worm with cisco Pix 7.x</title>
      <link>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633333#M1026950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think each vendor has his own architecture.. with PIX, there are features which arent available as routers , since they are functionally two different products (like soure routing/route maps etc)... With 7.x version of PIX, you do have QOS , with classmaps, policy maps etc... you can make sure you dont allow junk traffic like nachi across your PIX, by configuring QOS, and shaping... I'm really not sure if this will solve ur issue.. anyway, as I had given above, the following URL will give u a basic protection again nachi's...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/sw/voicesw/ps556/products_security_notice09186a00801b143a.html" target="_blank"&gt;http://cisco.com/en/US/products/sw/voicesw/ps556/products_security_notice09186a00801b143a.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and of course, all firewalls arent same  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; there can be pros and cons for any manufacturer !!! anyway, cisco works a lot to put more features as time goes !! probably they will incorporate the features u need in the future releses ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.. all the best.. rate replies if found useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Feb 2007 07:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-nachi-worm-with-cisco-pix-7-x/m-p/633333#M1026950</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2007-02-08T07:57:50Z</dc:date>
    </item>
  </channel>
</rss>

