Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

How do I configure my Cisco pix 515 to prevent outbound port 25 connections to the Internet except for my mail server?

Posted on 2009-12-17
3
Medium Priority
?
434 Views
Last Modified: 2013-11-22
We've been blacklisted by Spamhouse because we have a cutwail2 spamBOT infection.
We run Trend MIcro neatsuite advanced, but haven't been able to identify the infected computer yet.
0
Comment
Question by:jkassil
3 Comments
 
LVL 22

Accepted Solution

by:
Jody Lemoine earned 2000 total points
ID: 26073545
access-list inside_out permit tcp host 1.1.1.1 any eq smtp
access-list inside_out deny tcp any any eq smtp
access-list inside_out permit ip any any
access-group inside_out out interface outside

Replace 1.1.1.1 with your mail server's IP address and you're good to go.  If you already have an access list assigned to outbound traffic on the outside interface, you'll need to incorporate the above access list into that.
0
 

Expert Comment

by:hitek0001
ID: 26077411
Also once you add the acl as jodylemonie provided an example of you can then do: show logging | grep (106023|106100)
this will show you deny's from your new acl and help identify the device that is sending email.
0
 

Author Closing Comment

by:jkassil
ID: 31667387
We are still evaluating the results, but to date this solution apparently has been successful.
0

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
Powerful tools can do wonders, but only in the right hands.  Nowhere is this more obvious than with the cloud.
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question