Link to home
Start Free TrialLog in
Avatar of mklunk79
mklunk79Flag for United States of America

asked on

Restrict User Internet access through a Pix firewall

I want to know the procedure, or if it is even possible, to restrict access to a group of individuals through my Cisco Pix 515 firewall.  I am running a DHCP network so I can not do it by IP address.  Any ideas??  
Avatar of rsivanandan
rsivanandan
Flag of India image

You can if you go for commercial products like WebSense.

Cheers,
Rajesh
Avatar of Keith Alabaster
It also depends on what traffic you are looking to restrict ie is it web traffic or something else?
Secondly, what is the infrastructure between your users and the PIX? Do you have an internal firewall or Proxy server between them?
Avatar of mklunk79

ASKER

I want to restrict all http, https, and ftp traffice to these users.  I want to continue to allow smtp traffice, just no Internet.  I do not have a proxy server.  I have 5 locations all connected via PTP t1 with a firewall sitting infront of the internet router.  The firewall internal interface is on my LAN that connects to the core router.  The external interface is public.  Let me know if this did not clear up the question for you, or you need more info.
ASKER CERTIFIED SOLUTION
Avatar of jjoseph_x
jjoseph_x

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of jjoseph_x
jjoseph_x

batry boy, isn't that for incoming connections as opposed to outgoing connections?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
No, it can be used for outbound connections. See the "aaa authentication" command in the PIX Firewall Command Reference for details.

Specifically,

http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a3.html#wp1111727

Regards...