12-03-2019 04:58 AM - edited 02-21-2020 09:44 AM
Our production network is 172.16.4.0 255.255.252.0 with a usable IP range of 172.16.4.1 to 172.16.7.254. We want to block any IP from 172.16.7.1 to 172.16.7.254 from sending outbound SMTP traffic. I'm fairly sure this is the correct ACL rule using an inverse netmask to do that:
access-list inside-in extended deny ip 172.16.7.0 0.0.0.255 any eq 25
Would someone please let me know if that's right?
12-03-2019 05:13 AM
Hi there,
The cisco ASA uses a network mask and not a wildcard mask in its ACL. You will need to change it to 255.255.255.0 .
As for placement of the ACL you will want to configure it inbound on the nearest interface which routes traffic sourced from 172.16.7.0/24
cheers,
Seb.
12-05-2019 01:51 AM
As Seb mentioned, on the ASA you need a netmask and not a wildcard mask. And this one line will not stop SMTP completely. If you want to block SMTP completely you also have to deny SMTPS tcp/465 and Submission tcp/587.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide