01-25-2005 10:12 PM - edited 02-20-2020 09:26 PM
Hi all,
In my network, 192.168.1.9 until 192.168.1.29 is not allowed to use msn messenger, smtp and ftp.
Is it correct i configure the access-list for example for 192.168.1.10 pc:
access-list acl_in deny tcp host 192.168.1.10 any eq 1863
access-list acl_in deny tcp host 192.168.1.10 any eq 21
access-list acl_in deny tcp host 192.168.1.10 any eq 25
access-list acl_in deny udp host 192.168.1.10 any eq 1503
access-list acl_in deny udp host 192.168.1.10 any range 5004 65535
Then I apply
access-group acl_in in interface outside
but nothing happen
Then I change to
access-group acl_in in interface inside
but the problem is all the pcs in network cannot access the internet and the traffic stop at all.
Already apply the clear xlate, but still the problem occur. Any help is highly appreciated
Thanks a lot
Tonny
Solved! Go to Solution.
01-26-2005 12:04 AM
Hi,
You need to apply this accesss-list to your inside interface as if you apply it to your outside interface it will only filter traffic coming into your PIX from the outside interface and not from the inside network to the outside which you are trying to achieve.
The reason that all other traffic is being dropped is that access-lists on Cisco devices have an implicit "deny ip any any" rule at the bottom.
So all packets that are not specifically listed in an access-list will be dropped by the last invisible rule.
In your case, you need to add "permit ip any any" as your last access-list rule on acl_in. This will permit all *other* traffic that you haven't specifically blocked in your access-list acl_in to traverse the PIX from the inside interface to lower securitity level intefaces.
This is assuming you have the correct NAT statements etc on your PIX
HTH
Paddy
01-26-2005 12:04 AM
Hi,
You need to apply this accesss-list to your inside interface as if you apply it to your outside interface it will only filter traffic coming into your PIX from the outside interface and not from the inside network to the outside which you are trying to achieve.
The reason that all other traffic is being dropped is that access-lists on Cisco devices have an implicit "deny ip any any" rule at the bottom.
So all packets that are not specifically listed in an access-list will be dropped by the last invisible rule.
In your case, you need to add "permit ip any any" as your last access-list rule on acl_in. This will permit all *other* traffic that you haven't specifically blocked in your access-list acl_in to traverse the PIX from the inside interface to lower securitity level intefaces.
This is assuming you have the correct NAT statements etc on your PIX
HTH
Paddy
01-26-2005 06:52 PM
Just an FYI. Blocking port 1863 will not be enough to stop MSN Messenger on your network. You need to block availability to MSN login servers as well. messenger.msn.com I believe.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide