• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 334
  • Last Modified:

Restrict User Internet access through a Pix firewall

I want to know the procedure, or if it is even possible, to restrict access to a group of individuals through my Cisco Pix 515 firewall.  I am running a DHCP network so I can not do it by IP address.  Any ideas??  
0
mklunk79
Asked:
mklunk79
  • 2
  • 2
  • 2
  • +2
3 Solutions
 
rsivanandanCommented:
You can if you go for commercial products like WebSense.

Cheers,
Rajesh
0
 
Keith AlabasterCommented:
It also depends on what traffic you are looking to restrict ie is it web traffic or something else?
Secondly, what is the infrastructure between your users and the PIX? Do you have an internal firewall or Proxy server between them?
0
 
mklunk79Author Commented:
I want to restrict all http, https, and ftp traffice to these users.  I want to continue to allow smtp traffice, just no Internet.  I do not have a proxy server.  I have 5 locations all connected via PTP t1 with a firewall sitting infront of the internet router.  The firewall internal interface is on my LAN that connects to the core router.  The external interface is public.  Let me know if this did not clear up the question for you, or you need more info.
0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 
jjoseph_xCommented:
It'd be a bit of a pain, but can do that with access-lists and the necessary access-group statement.  However you'll have two problems:

1) you'll have to create explicit denies for each user (if all users are on the same subnet).
2) you'll have to create an explict allow over everyone use for those services (which is just a single access-list).

Maintaining the list could be a pain if the addresses for which you want to block access could change (i.e. you're not using DHCP reservations).

You'd coud something like this:

access-list inbound-out deny TCP any host xxx.xxx.xxx.xxx eq ftp    <--- blocks FTP for that IP
access-list inbound-out deny TCP any host xxx.xxx.xxx.xxx eq http  <--- blocks http for that IP
access-list inbound-out deny TCP any host xxx.xxx.xxx.xxx eq https <--- blocks https for that IP
access-list inbount-out permit IP any any                                      <--- allows all IP services for everyone else
access-group inbound-out in internet inside                                  <--- binds the access-list to the inside interface

The denies have to come before the permit because the access-list is processed like a chain (from top to bottom), so those who match the host address will be blocked (as the rule applies to them) whereas those who don't will be allowed.

However, you'd be better-off with using something like ISA Server or Websense than only the PIX.  It will be a pain to manage the access-list if the address change (i.e. relatively short DHCP leases) or if you have lots of users to add (you'd need the three denies for each user).





0
 
batry_boyCommented:
You could also try what Cisco has called "cut-through proxy" authentication through the PIX for certain services such as http and ftp.  See the following link under the section "Configuring AAA":

http://www.cisco.com/en/US/customer/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a008017278e.html#wp1090040

You can define usernames and passwords either locally on the PIX or on an external RADIUS server.  Everytime the PIX sees traffic that matches a service you have specified with the "aaa authentication include" command, it will prompt the user for credentials.  This may fit your need.
0
 
jjoseph_xCommented:
batry boy, isn't that for incoming connections as opposed to outgoing connections?
0
 
rsivanandanCommented:
0
 
batry_boyCommented:
No, it can be used for outbound connections. See the "aaa authentication" command in the PIX Firewall Command Reference for details.

Specifically,

http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a3.html#wp1111727

Regards...
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

  • 2
  • 2
  • 2
  • +2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now