<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347975#M749002</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have some issues with emails and the domain gets blacklisted. I am thinking if there is some kind of virus on some computers which may be using port 25 to send smtp traffic. I was wondering if there is any way to configure the PIX for it to accept smtp traffic only from the mail servers and block any kind of smtp traffic from individual PCs. This is all on the LAN. I thought of creating ACLs on inside interface but I may have to create multiple ACLs and hard to manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And is there any way on the PIX to see the host IP or MAC which may be sending lot of SMTP traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:12:54 GMT</pubDate>
    <dc:creator>techtips03</dc:creator>
    <dc:date>2019-03-11T17:12:54Z</dc:date>
    <item>
      <title>Blocking on PIX</title>
      <link>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347975#M749002</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have some issues with emails and the domain gets blacklisted. I am thinking if there is some kind of virus on some computers which may be using port 25 to send smtp traffic. I was wondering if there is any way to configure the PIX for it to accept smtp traffic only from the mail servers and block any kind of smtp traffic from individual PCs. This is all on the LAN. I thought of creating ACLs on inside interface but I may have to create multiple ACLs and hard to manage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And is there any way on the PIX to see the host IP or MAC which may be sending lot of SMTP traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347975#M749002</guid>
      <dc:creator>techtips03</dc:creator>
      <dc:date>2019-03-11T17:12:54Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking on PIX</title>
      <link>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347976#M749011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use ACL to restrict only your e-mail server to sent traffic destined to tcp port 25 and block every one else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l inside-acl permit tcp host x.x.x.x any eq 25&lt;/P&gt;&lt;P&gt;access-l inside-acl deny tcp any any eq 25&lt;/P&gt;&lt;P&gt;access-l inside-acl permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above acl will be applied IN on the inside interface where x.x.x.x is the private/inside IP address of your e-mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same thing can be done on the outside acl.&lt;/P&gt;&lt;P&gt;access-l outside-acl permit tcp any host y.y.y.y eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;meaning only y.y.y.y which is the translated/public address of the e-mail server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cannot use MAC address to block on a PIX/ASA/FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Feb 2010 21:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347976#M749011</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-02-21T21:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking on PIX</title>
      <link>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347977#M749018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Feb 2010 16:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-on-pix/m-p/1347977#M749018</guid>
      <dc:creator>techtips03</dc:creator>
      <dc:date>2010-02-24T16:58:56Z</dc:date>
    </item>
  </channel>
</rss>

