Solved

Cisco Extended Access-List and logging question

Posted on 2006-10-27
7
353 Views
Last Modified: 2008-02-01
I have a question regarding applying an extended access list on a Cisco 1721.  There's a possiblity that a PC in my network is spamming.  However, I don't think it's the mail server (Windows 2003 SP1 with Exchange 2003 SP2) because the queues are clean and my server is not open for SMTP relay.  Therefore, I believe a PC on the network might have caught a virus and is spamming without going through Exchange.  Although antivirus is installed on all PCs, something might have come through.

I'm trying to isolate the issue by disabling SMTP access through the Cisco for all PCs on the network except for the Exchange server.  I know I have to use extended access-list for specific ports, but I'm not sure how to configure it.  Any insight would be greatly appreciated.

Also, once SMTP is disabled for all computers on the network (except for Exchange), how I can set up logging on the Cisco to monitor SMTP access?  If I can log which PCs are trying to access SMTP through the router, it will help to isolate the PC in quesiton.

Thanks in advance, here are my router configs:

Current configuration:
!
version 12.0
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Router
!
enable password *******
!
!
!
!
!
memory-size iomem 25
ip subnet-zero
no ip domain-lookup
!
!
!
!
interface Serial0
 ip address x.x.18.242 255.255.255.252
 no ip directed-broadcast
 ip nat outside
!
interface FastEthernet0
 ip address y.y.7.254 255.255.255.0
 no ip directed-broadcast
 ip nat inside
 full-duplex
!
ip nat pool NATPOOL z.z.29.139 z.z.29.139 netmask 255.255.255.248
ip nat inside source list 1 pool NATPOOL overload
ip nat inside source static tcp y.y.7.40 3389 z.z.29.139 3389 extendable
ip nat inside source static tcp y.y.7.10 9201 z.z.29.139 9201 extendable
ip nat inside source static tcp y.y.7.5 25 z.z.29.139 25 extendable
ip nat inside source static tcp y.y.7.5 443 z.z.29.139 443 extendable
ip classless
ip route 0.0.0.0 0.0.0.0 x.x.18.241
no ip http server
!
access-list 1 permit y.y.7.0 0.0.0.255
!
line con 0
 transport input none
line aux 0
line vty 0 4
 password *******
 login
!
end

Router#
0
Comment
Question by:jimcmu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 17823941
access-list extended STOPSPAM
 permit tcp host y.y.7.5 any eq 25
 deny tcp y.y.7.0 0.0.0.255 any eq 25 log
 permit ip any any
interface Fast 0
 ip access-list STOPSPAM in

logg buff 4096

router#show log

0
 

Author Comment

by:jimcmu
ID: 17824092
Hi lrmoore,

Thanks for the quick reply!  Just for my understanding, why would you tie the access-list to Fast0 inside?  I thought it would be tied to Serial0 inside, since Serial0 is used for external access.

Thanks again  
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 17824111
Because you want to block/log  traffic that originates on the INside . . no the outside

0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:jimcmu
ID: 17824343
One more question regarding

interface Fast0
 ip access-list STOPSPAM in

Since the potential spam is going outbound, it wouldn't be ip access-list STOPSPAM out?  Isn't it an outbound packet?
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17824560
As far as the fast ethernet is concerned, it is coming inbound. Now if you were to apply it on the serial interface, then it would've been outbound.

The ingress and egress are with respect to the interface. Just to add to Lrmoore's comments (he had answered it all), why you want to apply it to the fa interface is because, that way your traffic is analyzed and dropped at the entry point itself, otherwise if you apply it on the outbound interface, the router would have to process the packet and then drop it (Processing in a sense, routing needs to be done and if nat is enabled that needs to be done as well).

Cheers,
Rajesh
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 17825444
I like to use the analogy of a box and doormen.

Think of the router as a box. Each interface is a door. From outside the box, all doors say "IN" from inside the box, all doors say "OUT". If you place an acl "in" then the doorman is stationed outside the door checking ID's as packets come IN.
Only authorized packets get inside where there is a tour guide (route processor) to show them the way to the next interface to get OUT to the next hop router. Some packets get new color tags (perhaps natted) as they go out the door because the next hop router only recognizes blue tags.
Some packets can come in door#1 and are only allowed out door #3, so there is also a bouncer in the box along with the tour guide. His instructions are to only let packets with red tags go out door#2, all blue tags go out door #3 (gently guided by the tour guide, no need for bouncer) but all others can go wherever they need to. This is an "out" acl on door #2 and maybe door #4.
The rule of thumb is to place the restrictions as close to the packet origination as possible. The only authorized SMTP packets must come from the mail server, else the doorman never lets them "in" the door to then have to be kicked out by the bouncer inside. Too much work for the one bouncer (CPU) when the doorman could have just turned them away outside.

Hope this helps.

0
 

Author Comment

by:jimcmu
ID: 17825486
Thanks for the clarification, very good analogy for future reference.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

While it is possible to put two routes in place with the secondary having a higher metric, this may not always work. In the event of a failure that does not bring down the physical interface on the router the primary route is not removed. There is a…
It happens many times that access list (ACL) have to be applied to outgoing router interface in order to limit some traffic.This article is about how to test ACL from the router which is not very intuitive for everyone. Below scenario shows simple s…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question