05-09-2005 05:22 AM - edited 02-21-2020 12:07 AM
i need to block non-exchange server smtp traffic from leaving my network. i tried an access list on my default gateway (2620 router) managed to kill http
access-list 198 deny tcp any any eq 25
access-list 198 permit tcp 10.80.80.10 255.255.255.255 any eq 25
I applied this to the F 0/0
i would like to add this to the pix instead - what is the best method?
thanks!
05-09-2005 05:42 AM
Orv,
If you just want to stop port 25 from leaving your internal network then you can apply ACL on the inside interface of the pix for this:
Ex.
access-list inside deny tcp any any eq 25
access-list inside permit ip any any
access-group inside in interface inside
save with write mem and also issue: clear xlate
I presume you don't need any e-mail for your internal users? My reason for asking is your ACL on the router says that you are trying to allow smtp traffic BUT you have stopped this by denying everything with > deny tcp any any eq 25, remember that http also uses tcp!
So are you sure that you want to stop access for smtp? because you say that you want to stop non-exchange server traffic.
Hope this helps / Jay
05-09-2005 06:31 AM
Jay - thanks for the info. I do need smtp traffic from my exchange server (10.80.80.10) to leave the internal network. The problem is that apparantly we have been infected with a virus contains its own SMTP server. Therefore I want to block all SMTP traffic except from the Exchange server.
Thanks!
05-09-2005 06:44 AM
Orv,
OK, If this server has ben infected with virus then I would take it off-line and run apporiate ant-virus software on it first before bringing it back on line!!
What sort of ant-virus software have you got running, if any? Do you know the type of virus it is?
If you are running McAfee then download stinger.exe from McAfee website and run this on the server off-line and see what it picks up. If you can not locate stinger from McAfee website then do a search on google for it.
You can also apply ACL filtering on the pix for specific virus ports.
I would take this server off-line first and patch it up with the apporiate anti-virus patches!
Let me know if you need further help.
Jay
05-09-2005 06:50 AM
Orv,
Also, forgot to add on my other post, have a read of this post of mine:
Hope this is of help.
Jay
05-09-2005 07:15 AM
We have checked all of our servers/workstations. However, we have nine branch offices and several teleworkers that all connect to a Cisco 3005 VPN concentrator. We use Symantec Enterprise for servers and workstations. Combination of TrendMicro and AVG on laptops.
The port 25 blocking was recommended by the blacklist we were put on as a "Best Practice".
Thanks for the other link as well. Good info.
On the acl if I do the deny any any eq 25 then a permit 10.80.80.10 any eq 25 will that work?
Thanks again for your assistance.
05-09-2005 07:46 AM
Orv,
On the ACL if you deny everything for port 25 then try to permit for port 25 this will not work as the order of the ACL works from top down so if it matchs a rule it will be actioned and will nerver read the following permit rule. But your problem from what I can make out is with smtp virus - correct, so to block port 25 and then try to allow for port 25 will not resolve your problem!
You mention that you have been put on a blacklist - why so? Was it for e-mail relaying or propergating virus? I would suggest two things here, 1. try out those ACLs from my 2nd post for port 445 etc and see if this picks up anything. 2. If you have a free switch port on the inside, download Ethereal and scan for ports 445 et al and see which hosts are propergating on those mentioned ports.
Hope this helps out a little.
Jay
05-09-2005 09:08 AM
Yes - we were listed on the Composite Blocking List for propegating virus.
I will run Ethereal - i have a laptop running Auditor that I can plug in. what do you recommend for a permanent Ethereal system? it seems to use quite a bit of resources if it runs for more than a day or two.
Thanks
05-09-2005 09:20 AM
Orv,
Yes Ethereal does take up a lot of resource, you can setup syslog for the pix with the ACL filters for port 445/137 etc. I had a customer not so long ago with exact problem as you and Ethreal came to the rescue and it's FREE!
You could take snap-shots of data flow from your network, say for half an hour at a time for those ports so not to take up too much resource.
Let me know how you get on and good luck.
Jay
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide