<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISCO PIX 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338067#M549296</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should be possible, I have seen that the SOHO97 Router supports standard in extended ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing that you have to change is to replace the access-list name by a number, lets say 101 and then add the access-list to the right interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Apr 2005 10:26:20 GMT</pubDate>
    <dc:creator>Patrick Iseli</dc:creator>
    <dc:date>2005-04-14T10:26:20Z</dc:date>
    <item>
      <title>CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338063#M549292</link>
      <description>&lt;P&gt;I have a  CISCO PIX 501 Configured and working fine&amp;#133;.&lt;/P&gt;&lt;P&gt;All I need is to block these things for my clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;YAHOO Messenger&lt;/P&gt;&lt;P&gt;MSN Messenger&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also I don&amp;#146;t need to give www access ( Internet Browsing ) to few of my users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But all must have access to use their outlook to send &amp;#150; receive their e-mails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Possible&amp;#133;?? I am sure yeah it is possible..Can you tell me what commands I need to enter in my ACCESS-LIST.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338063#M549292</guid>
      <dc:creator>ahmadnaveed</dc:creator>
      <dc:date>2020-02-21T08:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338064#M549293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Naveed,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To stop MSN, add the following ACL to your inside interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq 1863&lt;/P&gt;&lt;P&gt;access-list inside deny ip any 64.4.13.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside deny ip any 207.46.110.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside deny ip any 207.46.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not too sure for Yahoo, but try a quick search on Google and I'm sure you'll find the apporiate IP addresses/ports to block.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your other question on limiting www access for your internal users, what you can do is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside permit tcp host &lt;INSIDE_HOST_IP_ADDRESS&gt; any eq www&lt;/INSIDE_HOST_IP_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-list inside permit tcp host &lt;INSIDE_HOST_IP_ADDRESS&gt; any eq www&lt;/INSIDE_HOST_IP_ADDRESS&gt;&lt;/P&gt;&lt;P&gt;access-list inside deny tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list inside permit ip any any&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will control which internal user has access to the internet, this is controlled by the inside_host_ip_address, ofcourse you'll need to make sure those internal ip addresses are static and not dynamic (DHCP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Save with write mem and also, issue clear xlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps and if it does please rate post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Apr 2005 11:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338064#M549293</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2005-04-13T11:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338065#M549294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To block Internet access to a few internal hosts is easy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;# Block access to 192.168.1.10 and 11&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp 192.168.1.10 255.255.255.0 any eq http&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp 192.168.1.11 255.255.255.0 any eq http&lt;/P&gt;&lt;P&gt;# Block MSN&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 1863&lt;/P&gt;&lt;P&gt;access-list outbound deny ip any 64.4.13.0 255.255.255.0&lt;/P&gt;&lt;P&gt;# Block Yahoo&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 5050&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 5100&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 5001&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 5050&lt;/P&gt;&lt;P&gt;# Permit all the rest&lt;/P&gt;&lt;P&gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yahoo! Messenger Ports are:&lt;/P&gt;&lt;P&gt;- 5050 (outbound TCP)&lt;/P&gt;&lt;P&gt;- 5101 (inbound TCP)&lt;/P&gt;&lt;P&gt;- 5100 for webcam (TCP)&lt;/P&gt;&lt;P&gt;- 5001 for voice (TCP)&lt;/P&gt;&lt;P&gt;- For voice: cs1.yahoo.com, cs2.yahoo.com, and cs3.yahoo.com&lt;/P&gt;&lt;P&gt;- Yahoo will search ports 5050, 80, 20, 21, 25, 37 and 119 if 5050 is blocked &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To block Yahoo and MSN messanger is quit complicate with PIX OS 6.3.x . They uses all kind of ports as http and https and even if you block some of them the will dynmicly find another port to connect to the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Apr 2005 11:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338065#M549294</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-13T11:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338066#M549295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patric&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I`d like to block also this ports on my SOHO97 router.Can I do that. Does this router support it..&lt;/P&gt;&lt;P&gt;Can you help me with any sugestion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You in Advance &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gjergji&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Apr 2005 08:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338066#M549295</guid>
      <dc:creator>gjergji_abcom</dc:creator>
      <dc:date>2005-04-14T08:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338067#M549296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should be possible, I have seen that the SOHO97 Router supports standard in extended ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing that you have to change is to replace the access-list name by a number, lets say 101 and then add the access-list to the right interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Apr 2005 10:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338067#M549296</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-14T10:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338068#M549297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Partic,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I blocked all the ports that you sugested but yahoo and msn still connects maybe they try another port and connects through that port..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gjergji&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Apr 2005 07:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338068#M549297</guid>
      <dc:creator>gjergji_abcom</dc:creator>
      <dc:date>2005-04-15T07:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: CISCO PIX 501</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338069#M549298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MSN uses HTTP nd HTTPS to tunnel their traffic. This protocols cannot be inspected at the application layer with an Access-list of a Router or PIX OS 6.3.x and lower.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With PIX OS 7.0 this has changedand it is now possible to inspect the HTTP Protocol and block that kind of traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry but I would need a packet sniffer to analyse the traffic and to find a new way to block that.&lt;/P&gt;&lt;P&gt;I do not have time right now for that but will do it later, in a couple of days....???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody still has a working way to block that traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Apr 2005 14:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501/m-p/338069#M549298</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2005-04-15T14:51:13Z</dc:date>
    </item>
  </channel>
</rss>

