Solved

Restrict internet access with PIX from all but one host

Posted on 2011-09-23
4
200 Views
Last Modified: 2012-05-12
Need to restrict internetaccess to all but one internal IP address for anything outgoing, as we will be streaming a presentation and want to make sure no one else on the network takes any bandwidth.

What kind of access list would I need?
0
Comment
Question by:Mystical_Ice
  • 2
4 Comments
 
LVL 16

Accepted Solution

by:
The_Kirschi earned 300 total points
ID: 36591465
Which OS version on PIX? Which model?

Should be something like:

access-list <name of access-list> permit tcp host <internal ip> host <destination ip> eq http

Other http traffic is denied by default if this is your only access-list entry for http.

You also need to apply the access-list to your PIXes inside interface like:

access-group <name of access-list> in interface inside
0
 

Author Comment

by:Mystical_Ice
ID: 36594325
Not sure of PIX OS

Not HTTP, I want to disable any traffic outbound - SSH, SMTP, anything.
0
 
LVL 16

Expert Comment

by:The_Kirschi
ID: 36594408
Any other outbound access is denied automatically when you configure an access-list for just a single host. There is an implicit "deny all".
0
 
LVL 2

Assisted Solution

by:dslam24
dslam24 earned 200 total points
ID: 36893721
Pretty much the way Krischi said, just modify it a bit for all protocols

access-list <name of access-list> permit ip host <internal ip> host any

Then apply it to the inside interface.

access-group <name of access-list> in interface inside

this would block all traffic trying to go from inside your network out for everything except your
conferencing device.

One more thing, this will work OK if you are initiating traffic from the inside going outbound,
if you have a video conferencing system that is connecting to another and you initiate the call
this will work OK but if the far end has to request the call you may have some problems
depending on what your access-list looks like on your OUTSIDE interface.

In that case you also have to add a permission to your outside interface ACL something like

access-list <Outside_to_inside> permit ip <Source> host <internal ip>

it's probably best to find out what port numbers are being used and lock it down further.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Overview The Cisco PIX 501, PIX 506e, ASA 5505 and ASA 5510 (most if not all of this information will be relevant to the PIX 515e but I do not have a working configuration handy to verify the validity) are primarily used within small to medium busi…
This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now