[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Configure PIX firewall to only accept port 25 traffic from a range of IP addresses

Posted on 2006-07-19
3
Medium Priority
?
249 Views
Last Modified: 2013-11-16
Would someone please tell me the command to only accept incoming port 25 traffic from a ip range?
0
Comment
Question by:LAzuberi
  • 2
3 Comments
 
LVL 5

Expert Comment

by:Dbergert
ID: 17143109
you need to create an access list...

access-list 100 permit tcp 172.16.10.0 0.0.0.255 host [smtpserver IP] eq 25
 
where 172.16.10.0 0.0.0.255 is the range from  172.16.10.0  - 172.16.10.254

What is the IP range ?
0
 

Author Comment

by:LAzuberi
ID: 17143117
[smtpserver IP] is my internal mail server right?
0
 
LVL 5

Accepted Solution

by:
Dbergert earned 2000 total points
ID: 17143134
This will actually be the External IP of the mail server.

you will also need to NAT the Extrenal IP and port 25 to the internal mail server


this is done with a static command:

static (inside,outside) tcp [external IP] 25 [internal ip] 25 netmask 255.255.255.255 0 0

this opens port 25 and directs it to the internet mail server port 25
0

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
Although free tools can be helpful to a limited extent, it’s better to stick to paid versions for business use.
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

612 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question