Solved

Restrict internet access with PIX from all but one host

Posted on 2011-09-23
4
201 Views
Last Modified: 2012-05-12
Need to restrict internetaccess to all but one internal IP address for anything outgoing, as we will be streaming a presentation and want to make sure no one else on the network takes any bandwidth.

What kind of access list would I need?
0
Comment
Question by:Mystical_Ice
  • 2
4 Comments
 
LVL 16

Accepted Solution

by:
The_Kirschi earned 300 total points
ID: 36591465
Which OS version on PIX? Which model?

Should be something like:

access-list <name of access-list> permit tcp host <internal ip> host <destination ip> eq http

Other http traffic is denied by default if this is your only access-list entry for http.

You also need to apply the access-list to your PIXes inside interface like:

access-group <name of access-list> in interface inside
0
 

Author Comment

by:Mystical_Ice
ID: 36594325
Not sure of PIX OS

Not HTTP, I want to disable any traffic outbound - SSH, SMTP, anything.
0
 
LVL 16

Expert Comment

by:The_Kirschi
ID: 36594408
Any other outbound access is denied automatically when you configure an access-list for just a single host. There is an implicit "deny all".
0
 
LVL 2

Assisted Solution

by:dslam24
dslam24 earned 200 total points
ID: 36893721
Pretty much the way Krischi said, just modify it a bit for all protocols

access-list <name of access-list> permit ip host <internal ip> host any

Then apply it to the inside interface.

access-group <name of access-list> in interface inside

this would block all traffic trying to go from inside your network out for everything except your
conferencing device.

One more thing, this will work OK if you are initiating traffic from the inside going outbound,
if you have a video conferencing system that is connecting to another and you initiate the call
this will work OK but if the far end has to request the call you may have some problems
depending on what your access-list looks like on your OUTSIDE interface.

In that case you also have to add a permission to your outside interface ACL something like

access-list <Outside_to_inside> permit ip <Source> host <internal ip>

it's probably best to find out what port numbers are being used and lock it down further.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
Exchange server is not supported in any cloud-hosted platform (other than Azure with Azure Premium Storage).
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now