Solved

Block port 25 for training

Posted on 2008-10-08
11
294 Views
Last Modified: 2012-05-05
I'm a trainer part time and have consistently to be patient and put up with folk claiming they're paying attention while I know they're e-mailing. I'm good at my job and give good and interesting lessons but other than taking my clothes off to illicit attention I'd like a safe way to block and unblock port 25 during class remembering that I'm sometimes at a client site.



Any suggestions would be appreciated and also help those with mild ADD learn Excel, Word etc.
0
Comment
Question by:macmic
  • 4
  • 4
  • 2
  • +1
11 Comments
 
LVL 17

Expert Comment

by:Andres Perales
ID: 22669123
well if you are using a mobile classroom that has a closed network you can put a firewall in place between the clients network port that they give you for access and the switch where your test boxes would hook into...
0
 

Author Comment

by:macmic
ID: 22669215
No, I can't interfere with others networks too much. I'm thinking either Windows firewall or group policy. something I can quickly add and remove. Cheers though
0
 
LVL 17

Expert Comment

by:Andres Perales
ID: 22669282
Windows firewall would work as long as the user accounts the users are using do not have admin rights to the change the windows firewall, are all of these boxes windows xp or vista boxes?  If so you can consider Steadystate....
http://www.microsoft.com/windows/products/winfamily/sharedaccess/default.mspx
 
0
 
LVL 10

Expert Comment

by:kukno
ID: 22669409
Hi,

use WinArpSpoofer, to "announce/mask" the trainer PC/Laptop as the default gateway. Then all packtes of the clients will be routed to your PC. You can then decide what to do with them. Assuming you can run a decent firewall on your PC, you could simply drop SMTP and re-route the rest to the legitimate router.

     http://www.nextsecurity.net/software/Windows_ARP_Spoofer.html

Here is a list with some other arp poisioning tools.

http://www.l0t3k.org/security/tools/arp/

Regards
Kurt
0
 

Author Comment

by:macmic
ID: 22669975
Yeah in our own office that would be cool but I can't add software to computers at client sites. Good recommend though for future stuff
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Author Comment

by:macmic
ID: 22670013
kukno - yeah but for a client site I'd be tampering on their network. I'd just like a sneaky yet acceptable block on the individual PC if you get my gist
0
 
LVL 4

Expert Comment

by:Interserv
ID: 22670249
you would want to block port 80 and 443 as well because hotmail, gmail, Outlook Web Access and many more use the web and not port 25 for email.  You could do this with a GPO by setting up a proxy or adding an ip in the proxy settings that does not exist.  Just remember if you set up a proxy using GPO, you need to manually remove the proxy settings when you stop enforcing the GPO.
0
 

Author Comment

by:macmic
ID: 22670604
Interserv: how to using GPO mate?
0
 
LVL 10

Expert Comment

by:kukno
ID: 22699745
>I'd just like a sneaky yet acceptable block on the individual PC if you get my gist

o.k., then block the ports with the IPSEC subsystem.

http://support.microsoft.com/kb/813878

HOWEVER: You must install ipseccmd.exe and possibly netdiag on the clients!

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=7D40460C-A069-412E-A015-A2AB904B7361

Filter for port 25 should be:

IPSeccmd.exe -w REG -p "Block SMTP" -r "Block Outbound SMTP" -f 0=*:25:TCP -n BLOCK


0
 
LVL 10

Expert Comment

by:kukno
ID: 22699804
running ipseccmd.exe from a USB stick is actually not "installing" any software.
0
 
LVL 10

Accepted Solution

by:
kukno earned 500 total points
ID: 22699808
running ipseccmd.exe from a USB stick is actually not "installing" any software.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Use email signature images to promote corporate certifications and industry awards.
Resolve DNS query failed errors for Exchange
This Experts Exchange video Micro Tutorial shows how to tell Microsoft Office that a word is NOT spelled correctly. Microsoft Office has a built-in, main dictionary that is shared by Office apps, including Excel, Outlook, PowerPoint, and Word. When …
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now