Solved

Restrict User Internet access through a Pix firewall

Posted on 2006-10-30
10
293 Views
Last Modified: 2013-11-16
I want to know the procedure, or if it is even possible, to restrict access to a group of individuals through my Cisco Pix 515 firewall.  I am running a DHCP network so I can not do it by IP address.  Any ideas??  
0
Comment
Question by:mklunk79
  • 2
  • 2
  • 2
  • +2
10 Comments
 
LVL 32

Expert Comment

by:rsivanandan
Comment Utility
You can if you go for commercial products like WebSense.

Cheers,
Rajesh
0
 
LVL 51

Expert Comment

by:Keith Alabaster
Comment Utility
It also depends on what traffic you are looking to restrict ie is it web traffic or something else?
Secondly, what is the infrastructure between your users and the PIX? Do you have an internal firewall or Proxy server between them?
0
 

Author Comment

by:mklunk79
Comment Utility
I want to restrict all http, https, and ftp traffice to these users.  I want to continue to allow smtp traffice, just no Internet.  I do not have a proxy server.  I have 5 locations all connected via PTP t1 with a firewall sitting infront of the internet router.  The firewall internal interface is on my LAN that connects to the core router.  The external interface is public.  Let me know if this did not clear up the question for you, or you need more info.
0
 
LVL 9

Accepted Solution

by:
jjoseph_x earned 43 total points
Comment Utility
It'd be a bit of a pain, but can do that with access-lists and the necessary access-group statement.  However you'll have two problems:

1) you'll have to create explicit denies for each user (if all users are on the same subnet).
2) you'll have to create an explict allow over everyone use for those services (which is just a single access-list).

Maintaining the list could be a pain if the addresses for which you want to block access could change (i.e. you're not using DHCP reservations).

You'd coud something like this:

access-list inbound-out deny TCP any host xxx.xxx.xxx.xxx eq ftp    <--- blocks FTP for that IP
access-list inbound-out deny TCP any host xxx.xxx.xxx.xxx eq http  <--- blocks http for that IP
access-list inbound-out deny TCP any host xxx.xxx.xxx.xxx eq https <--- blocks https for that IP
access-list inbount-out permit IP any any                                      <--- allows all IP services for everyone else
access-group inbound-out in internet inside                                  <--- binds the access-list to the inside interface

The denies have to come before the permit because the access-list is processed like a chain (from top to bottom), so those who match the host address will be blocked (as the rule applies to them) whereas those who don't will be allowed.

However, you'd be better-off with using something like ISA Server or Websense than only the PIX.  It will be a pain to manage the access-list if the address change (i.e. relatively short DHCP leases) or if you have lots of users to add (you'd need the three denies for each user).





0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 
LVL 28

Assisted Solution

by:batry_boy
batry_boy earned 41 total points
Comment Utility
You could also try what Cisco has called "cut-through proxy" authentication through the PIX for certain services such as http and ftp.  See the following link under the section "Configuring AAA":

http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008017278e.html#wp1090040

You can define usernames and passwords either locally on the PIX or on an external RADIUS server.  Everytime the PIX sees traffic that matches a service you have specified with the "aaa authentication include" command, it will prompt the user for credentials.  This may fit your need.
0
 
LVL 9

Expert Comment

by:jjoseph_x
Comment Utility
batry boy, isn't that for incoming connections as opposed to outgoing connections?
0
 
LVL 32

Assisted Solution

by:rsivanandan
rsivanandan earned 41 total points
Comment Utility
0
 
LVL 28

Expert Comment

by:batry_boy
Comment Utility
No, it can be used for outbound connections. See the "aaa authentication" command in the PIX Firewall Command Reference for details.

Specifically,

http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a3.html#wp1111727

Regards...
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
increase internet speed 3 53
Cisco ASA 5506 4 39
Cisco Layer 2 Switches 6 48
Configuring EIGRP with neighbor command 25 39
If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now