<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prevent SPAM from Leaving the network. (ISP) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233465#M347898</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied this on the Interface Vlan (logical int) of that server.&lt;/P&gt;&lt;P&gt;This is the interface that has the Ip address of the server and so forth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a named ACL instead of a Numbered, dont think i can actually debug a named ACL.&lt;/P&gt;&lt;P&gt;If what you suggest is for me to create a numbered ACL, apply it to the Vlan interface and then debugging it, i might be able to do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hate to do ACL debugging though, because this is a Core Switch, has LOTS of traffic and i dont like seeing the CPU sky-rocket!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what your suggestions are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ezequiel Pineda&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Jun 2013 22:35:32 GMT</pubDate>
    <dc:creator>Ezequiel Pineda</dc:creator>
    <dc:date>2013-06-17T22:35:32Z</dc:date>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233461#M347886</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am working for an ISP, and we are having a few issues, im not sure how to fix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are an ISP with 4 uplink providers and BGP sessions to 3 of them. We get full tables from 2 of them and partial tables from 1 of them.&lt;/P&gt;&lt;P&gt;Our business is the rental of servers, and we have about 500 servers at the present moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every single server is on its own vlan with something like a /27.&lt;/P&gt;&lt;P&gt;When i get a customer asking for more than a /27, or when they ask the many different c-class subnets, i KNOW they way to use the server as a mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created an ACL that looks like the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;EDGE01.PRIVATELAYER.CH#show access-lists SPAM&lt;/P&gt;&lt;P&gt;Extended IP access list SPAM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9 permit icmp any any (787857 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny tcp any any eq pop3 (8106 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 11 deny tcp any any eq pop2 (38 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12 deny tcp any any eq 27 (65 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13 deny udp any any eq 27 (2369 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14 deny tcp any any eq 58 (243 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15 deny udp any any eq 58 (2365 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16 deny tcp any any eq 61 (13 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 17 deny udp any any eq 61 (2352 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 18 deny tcp any any eq 24 (7 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 19 deny udp any any eq 24 (2306 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 deny tcp any any eq 143 (1266 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 21 deny tcp any any eq 174 (3 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 22 deny udp any any eq 174 (2347 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23 deny tcp any any eq 209 (468 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24 deny udp any any eq 209 (2326 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25 deny tcp any any eq 220 (3 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 deny udp any any eq 220 (2328 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 27 deny tcp any any eq 3206 (42285 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 28 deny udp any any eq 3206 (2463 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29 deny tcp any any eq 3332 (42816 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 deny tcp any any eq smtp (238570513 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31 deny udp any any eq 3332 (2354 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 32 deny tcp any any eq 1723 (43657 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 33 deny udp any any eq 1723 (2345 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 deny tcp any any eq 585 (18 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50 deny tcp any any eq 993 (820 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60 deny tcp any any eq 995 (1233 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70 deny tcp any any eq 8080 (2025630 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100 permit ip any any (7969222 matches)&lt;/P&gt;&lt;P&gt;EDGE01.PRIVATELAYER.CH#&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my knowledge, this ACL should be catching ALL email ports, and dropping those packets.&lt;/P&gt;&lt;P&gt;I then get an email from Spamhaus, telling me that this server is sending email (SPAM)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i asked them, they said that the customer might be using GRE tunnels to the server or asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im not familiar with asymmetric routing, but after doing some research, i think that GRE tunnels are normally configured ion port 1723, which is blocked as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone point me to the best way to prevent email from leaving an Interface Vlan (SVI)&lt;/P&gt;&lt;P&gt;I am working on a 65095 Series Switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i should add something to the EDGE ACL, or something else, please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ezequiel Pineda&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233461#M347886</guid>
      <dc:creator>Ezequiel Pineda</dc:creator>
      <dc:date>2019-03-12T01:59:18Z</dc:date>
    </item>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233462#M347891</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is this situation caused by only one server?&lt;/P&gt;&lt;P&gt;If you know what is the server that is doing all this, you can create a span session and take a look at the connections it is establishing externally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A temporary action i would take, would be to create an Access-list on that server's vlan allowing only what needs to go out, denying the rest of the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jun 2013 20:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233462#M347891</guid>
      <dc:creator>Favaloro.</dc:creator>
      <dc:date>2013-06-17T20:31:36Z</dc:date>
    </item>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233463#M347893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have had this issue with very few people.&lt;/P&gt;&lt;P&gt;It looks like they are part of the Rosko Spam operation, which is a big deal, and being spammers with a LOT of spamming experience, they somehow have found a way to avoid ACL's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment yes, this is the only server that was causing the issue, but i have killed the account already, and shut the vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did however, create another ACL with the following statement, to try seeing exactly what was going on but couldnt see much to be honest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# 1 permit tcp any any log-input&lt;/P&gt;&lt;P&gt;# 2 permit udp any any log-input&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried this with the log and log-input options, but i dont see Session information, Only TCP-IP source and destination traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you elaborate more on that span session you mentioned?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ezequiel Pineda&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jun 2013 20:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233463#M347893</guid>
      <dc:creator>Ezequiel Pineda</dc:creator>
      <dc:date>2013-06-17T20:50:01Z</dc:date>
    </item>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233464#M347895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Where did you place the Access-list you created?&lt;/P&gt;&lt;P&gt;The idea behind the &lt;STRONG&gt;SPAN&lt;/STRONG&gt; session is to determine what traffic is flowing in/out of an interface, specifically what the server is sending.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way you can understand its behavior and proceed accordingly, by adding more services to the list of denied ports on the SPAM Access-list or by checking the server itself and correcting its functionality if necessary. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jun 2013 21:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233464#M347895</guid>
      <dc:creator>Favaloro.</dc:creator>
      <dc:date>2013-06-17T21:01:37Z</dc:date>
    </item>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233465#M347898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied this on the Interface Vlan (logical int) of that server.&lt;/P&gt;&lt;P&gt;This is the interface that has the Ip address of the server and so forth.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a named ACL instead of a Numbered, dont think i can actually debug a named ACL.&lt;/P&gt;&lt;P&gt;If what you suggest is for me to create a numbered ACL, apply it to the Vlan interface and then debugging it, i might be able to do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hate to do ACL debugging though, because this is a Core Switch, has LOTS of traffic and i dont like seeing the CPU sky-rocket!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what your suggestions are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ezequiel Pineda&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jun 2013 22:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233465#M347898</guid>
      <dc:creator>Ezequiel Pineda</dc:creator>
      <dc:date>2013-06-17T22:35:32Z</dc:date>
    </item>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233466#M347899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm suggesting you get a packet capture on the interface the server is connected to.&lt;/P&gt;&lt;P&gt;The way to do it is with a &lt;STRONG&gt;SPAN&lt;/STRONG&gt; session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's how you do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml"&gt;http://www.cisco.com/en/US/products/hw/switches/ps708/products_tech_note09186a008015c612.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that's not an option, you can get the capture from the server itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jun 2013 23:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233466#M347899</guid>
      <dc:creator>Favaloro.</dc:creator>
      <dc:date>2013-06-17T23:55:32Z</dc:date>
    </item>
    <item>
      <title>Prevent SPAM from Leaving the network. (ISP)</title>
      <link>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233467#M347901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So for anyone with the same issue, i have learned that you can block GRE as a whole on an extended ACL by adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny gre any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this solved my issue, hope it helps someone else having the same issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jun 2013 03:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/prevent-spam-from-leaving-the-network-isp/m-p/2233467#M347901</guid>
      <dc:creator>Ezequiel Pineda</dc:creator>
      <dc:date>2013-06-27T03:52:51Z</dc:date>
    </item>
  </channel>
</rss>

