Solved

BLOCK A HOST FROM THE INSIDE

Posted on 2006-10-23
9
201 Views
Last Modified: 2013-11-16
Hello,

Is there a way to block a host from the inside using only there MAC address on a PIX 501?

Thank You
0
Comment
Question by:vreyesii
  • 4
  • 4
9 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 17793315
Only by IP address on PIX. By MAC on switches or on routers.
Does the switch that the PIX is connected to support acls? What kind of switch is it?
0
 

Author Comment

by:vreyesii
ID: 17793325
It is a 3500 XL Switch.
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 17793364
No acls supported on 3500XL
Can you be more specific on what you are trying to do?
Do you have a misbehaving user that keeps changing their IP address?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:vreyesii
ID: 17793375
I have a user which connects to the network using a wireless connection. They are assigned an IP address from Wireless DHCP router. I want to block this user from having access to the network. The DHCP address for the wireless users are changed everyday by the DHCP server.

 
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 17793392
Try adjusting the lease time for DHCP on the router so that the IP's don't change every day.
Do these wireless users get an IP address on a different IP subnet than the users on the inside of the PIX? In other words  is this wireless router's WAN port or LAN port connected to your network? What kind of router is it? Are you trying to block this user from using the Internet though the PIX, or access the LAN from the Wireless net?
There's not a lot you can do with what you have.
0
 

Author Comment

by:vreyesii
ID: 17793409
The wireless users get an IP address from a different subnet then the inside of the PIX. However, the WAN port on the wireless router is on the same subnet as the inside of the PIX. Also, the wireless routers is running NAT.
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 200 total points
ID: 17794903
Then the wireless router is where you have to put the restrictions. All the PIX will ever see is the natted IP address and the MAC address of the router.
0
 
LVL 4

Assisted Solution

by:LBACIS
LBACIS earned 50 total points
ID: 17807041
I would suggest a Mac-IP address mapping to the user for the dhcp appliance. Have the appliance use a different subnet which will not allow the two nets to talk. then use a acl as suggested before for a bootstrap.
0
 

Author Comment

by:vreyesii
ID: 17808500
Thank you both for all your help.

vreyesii
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Netgear WMS5316 Guest SSiD 1 82
Itunes Thru ISA 2000 Server 2 132
Probable TCP NULL scan detected 10 331
VPN tunnel between Watchguard and OpenVPN? 1 75
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question