<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block smtp traffic except for mail server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231320#M840920</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're wanting to allow one host smtp traffic, you should be able to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nooutmail extended permit tcp host 192.168.0.240 any eq 25&lt;/P&gt;&lt;P&gt;access-list nooutmail extended deny tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list nooutmail extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group nooutmail in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm assuming that you're wanting to allow smtp traffic out from the 192.168.0.240 server. Also, what's the actual problem that you're seeing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 May 2009 13:14:50 GMT</pubDate>
    <dc:creator>John Blakley</dc:creator>
    <dc:date>2009-05-20T13:14:50Z</dc:date>
    <item>
      <title>Block smtp traffic except for mail server</title>
      <link>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231319#M840917</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm trying to block smtp form all hosts, except for mail server. I made this configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nooutmail extended permit tcp host 192.168.0.240 any &lt;/P&gt;&lt;P&gt;access-list nooutmail extended deny tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list nooutmail extended permit ip any any &lt;/P&gt;&lt;P&gt;access-group nooutmail in interface "interfacename"&lt;/P&gt;&lt;P&gt;what I made wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231319#M840917</guid>
      <dc:creator>bojan.vujic</dc:creator>
      <dc:date>2019-03-11T15:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Block smtp traffic except for mail server</title>
      <link>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231320#M840920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're wanting to allow one host smtp traffic, you should be able to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nooutmail extended permit tcp host 192.168.0.240 any eq 25&lt;/P&gt;&lt;P&gt;access-list nooutmail extended deny tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list nooutmail extended permit ip any any&lt;/P&gt;&lt;P&gt;access-group nooutmail in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm assuming that you're wanting to allow smtp traffic out from the 192.168.0.240 server. Also, what's the actual problem that you're seeing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 May 2009 13:14:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231320#M840920</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2009-05-20T13:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: Block smtp traffic except for mail server</title>
      <link>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231321#M840923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is my scenario&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Cisco ASA 5510 with 5 subnets, and in one subnet is mail server. When I configure on every interface set in ACL like in example, i was able to block all smtp except smtp from mail server which is ok. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I really want is to set one outbound ACL on outside interface instead of 5 inbound ACL on insides interfaces. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 May 2009 06:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231321#M840923</guid>
      <dc:creator>bojan.vujic</dc:creator>
      <dc:date>2009-05-22T06:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Block smtp traffic except for mail server</title>
      <link>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231322#M840926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apply the access-list only to the outside interface, although it is not common:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group nooutmail out interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA/Pix version 7.0 and later support this, but rarely seen in real work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fuming&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 May 2009 01:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231322#M840926</guid>
      <dc:creator>fmjiang1966</dc:creator>
      <dc:date>2009-05-24T01:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Block smtp traffic except for mail server</title>
      <link>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231323#M840929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If this access list is applied outbound, keep in mind that you will need to use the "post-nat'd" (public) source address.  The outbound acl matches the traffic as it egress the interface (after the nat or static nat has occurred).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 May 2009 17:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-smtp-traffic-except-for-mail-server/m-p/1231323#M840929</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2009-05-24T17:30:06Z</dc:date>
    </item>
  </channel>
</rss>

