<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS FW:  how to block port 25? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057732#M396157</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I will give that a try then. Actually I,like to log what I can so I catch the offending infected spambot oc on my network but hits against deny all I guess won,t be the way, the explicit deny on 25 might be closer. I havn,t actually learned logging yet :). Still a newbie here. But I know in theory how it should help here hough. I,ll update the ACL now.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 03 Nov 2012 03:39:46 GMT</pubDate>
    <dc:creator>cluovpemb</dc:creator>
    <dc:date>2012-11-03T03:39:46Z</dc:date>
    <item>
      <title>IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057728#M396147</link>
      <description>&lt;P&gt;Typing sucks on iPad, plz forgive for short sentences.&lt;BR /&gt;&lt;BR /&gt;I want to block all internal LAN systems from sending to port 25 outbound to Internet, except the mail server which is on same LAN. 192.168.0.0/24. This is to prevent an unknown inside PC infected with a spambot from sending mail.&lt;BR /&gt;&lt;BR /&gt;Have 891w isr, using zbfw. Outside int to internet is gig0, inside int to LAN is vlan1, just a bridge group combining switch ports fa 0-7&lt;BR /&gt;&lt;BR /&gt;Vlan1=inside zone, gig0=outside zone&lt;BR /&gt;Two zone pairs, inside-outside and outside-inside&lt;BR /&gt;&lt;BR /&gt;Inside-outside has permit ip any any from an ACL, no other match criteria. Policy map is set to inspect. Need to add the blocking to this zone pair, I assume to same ACL?&lt;BR /&gt;&lt;BR /&gt;Outside-inside zone pair probably doesn't,t impact this but let me know if it does or should be mentioned here.&lt;BR /&gt;&lt;BR /&gt;Thank you for your help.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057728#M396147</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2019-03-12T00:18:22Z</dc:date>
    </item>
    <item>
      <title>IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057729#M396149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes just modify the ACL called out on inside-outside to add a line preceding the permit any-any with one telling it to deny any-any eq 25. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may need to modify it to be an extended ACL vs. the current type (likely standard)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 02:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057729#M396149</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-11-03T02:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057730#M396152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But to allow the mail server that,s on that same LAN, would it be something like:&lt;BR /&gt;&lt;BR /&gt;Deny tcp any any eq 25&lt;BR /&gt;Permit top host 192.168.0.123 any eq 25&lt;BR /&gt;Permit ip any any&lt;BR /&gt;&lt;BR /&gt;?&lt;BR /&gt;I should mention I am a bit new to zbfw so am not sure how the sequence of these lines work except there is an implicit deny-all for this inside-outside pair at the end of the ACL (I think)&lt;BR /&gt;&lt;BR /&gt;Thank you again!&lt;BR /&gt;&lt;BR /&gt;Oh also, yes it is an extended (named)ACL already.&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 02:46:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057730#M396152</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2012-11-03T02:46:26Z</dc:date>
    </item>
    <item>
      <title>IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057731#M396154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh yes sorry - neglected to mention the legitimate mail server. The line for that needs to go first. access-list works on a first match basis - once a match is made, that ACL is not parsed further for a given flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, there is an implicit "deny any". Some people like to make it explicit to see hits but since you are preceding it with a "permit any" it should never get a hit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 02:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057731#M396154</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2012-11-03T02:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057732#M396157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I will give that a try then. Actually I,like to log what I can so I catch the offending infected spambot oc on my network but hits against deny all I guess won,t be the way, the explicit deny on 25 might be closer. I havn,t actually learned logging yet :). Still a newbie here. But I know in theory how it should help here hough. I,ll update the ACL now.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 03:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057732#M396157</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2012-11-03T03:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057733#M396165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright done. Here,s the ACL&lt;BR /&gt;&lt;BR /&gt;Extended IP access list INSIDE-OUTSIDE&lt;BR /&gt; 5 permit tcp host 192.168.0.123 any eq smtp&lt;BR /&gt; 9 deny tcp any any eq smtp&lt;BR /&gt; 10 permit ip any any (439 matches)&lt;BR /&gt;&lt;BR /&gt;Used sh ip access-list for this output.&lt;BR /&gt;&lt;BR /&gt;Using smtp instead of eq 25 should be ok I think?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This router won,t go live until new ISP switchover and DNS and MX record changes propagate in the next day, so will test this tomorrow. Will post results here. Thanks again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 04:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057733#M396165</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2012-11-03T04:03:18Z</dc:date>
    </item>
    <item>
      <title>IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057734#M396172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Looks like all went well with the ISP switchover, except two things which I'll work on myself.&amp;nbsp; One, I can no longer RDP to the internal servers, yet if I modify the same NAT rules to point to a PC for example, that works.&amp;nbsp; From said PC, I can no longer RDP to the server.&amp;nbsp; It's a server issue, yet is extremely coincidental that after putting this router online this weekend, access to the server stops.&amp;nbsp; There are no update cycles or other, and it was rebooted with no effect.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, also, I have to still figure out how to log what system is a spambot (via logging who hits port 25).&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 14:55:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057734#M396172</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2012-11-05T14:55:49Z</dc:date>
    </item>
    <item>
      <title>IOS FW:  how to block port 25?</title>
      <link>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057735#M396180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Ok figured out how to log the offending system, and also the lack of remote abilkity to the server is the servers fault in some way, nothing to do with the router at all.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 16:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-fw-how-to-block-port-25/m-p/2057735#M396180</guid>
      <dc:creator>cluovpemb</dc:creator>
      <dc:date>2012-11-13T16:21:17Z</dc:date>
    </item>
  </channel>
</rss>

