Restricting smtp traffic to specific IP address ranges PIX 506e

Posted on 2011-03-22
Last Modified: 2012-05-11
We used to have our spam filter on the inside network; now we have outsourced to an outside spam filtering company.  Our current setting is to allow all smtp (port 25) traffic through our firewall to our Exchange 2003 server.  

I want to restrict all smtp traffic through the PIX 506 except from the following WAN IP address ranges: ( to subnet ( to subnet ( to subnet

current Pix access list entry is:

access-list acl-out permit tcp any interface outside eq smtp

I'm just a bit rusty on adding the ranges.
Question by:techcontracting

Expert Comment

ID: 35195809
I cant remember which why it is on the pix.
My 3750 does it this way
access-list 110 permit tcp any eq 22 log

so I would try

access-list acl-out permit tcp <network> <pattern> interface outside eq smtp
eg: for
/23 = 23 bits = pattern (not mask)
access-list acl-out permit tcp interface outside eq smtp
access-list acl-out permit tcp interface outside eq smtp

just check with the ? when you get to the "mask/pattern" and see if it wants a match pattern or subnet mask.

Accepted Solution

Draxonic earned 500 total points
ID: 35196104

access-list acl-out permit tcp interface outside eq smtp
access-list acl-out permit tcp interface outside eq smtp
access-list acl-out permit tcp interface outside eq smtp

LVL 79

Expert Comment

ID: 35197703
PIX always uses subnet masks for access-lists, where routers and IOS based switches always use wildcard masks.
Don't forget to remove the acl entry permitting any interface outside eq smtp
 no acl-out permit any interface outside eq smtp

Author Comment

ID: 35204089
Hey guys thanks for all your help... I had the config in there except I had "tcp host" instead of just "tcp";  thanks for the clarification... works like a dream.

Thanks again,

Author Closing Comment

ID: 35204095
Worked great... thanks!

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now