Solved

Restrict internet access with PIX from all but one host

Posted on 2011-09-23
4
202 Views
Last Modified: 2012-05-12
Need to restrict internetaccess to all but one internal IP address for anything outgoing, as we will be streaming a presentation and want to make sure no one else on the network takes any bandwidth.

What kind of access list would I need?
0
Comment
Question by:Mystical_Ice
  • 2
4 Comments
 
LVL 16

Accepted Solution

by:
The_Kirschi earned 300 total points
ID: 36591465
Which OS version on PIX? Which model?

Should be something like:

access-list <name of access-list> permit tcp host <internal ip> host <destination ip> eq http

Other http traffic is denied by default if this is your only access-list entry for http.

You also need to apply the access-list to your PIXes inside interface like:

access-group <name of access-list> in interface inside
0
 

Author Comment

by:Mystical_Ice
ID: 36594325
Not sure of PIX OS

Not HTTP, I want to disable any traffic outbound - SSH, SMTP, anything.
0
 
LVL 16

Expert Comment

by:The_Kirschi
ID: 36594408
Any other outbound access is denied automatically when you configure an access-list for just a single host. There is an implicit "deny all".
0
 
LVL 2

Assisted Solution

by:dslam24
dslam24 earned 200 total points
ID: 36893721
Pretty much the way Krischi said, just modify it a bit for all protocols

access-list <name of access-list> permit ip host <internal ip> host any

Then apply it to the inside interface.

access-group <name of access-list> in interface inside

this would block all traffic trying to go from inside your network out for everything except your
conferencing device.

One more thing, this will work OK if you are initiating traffic from the inside going outbound,
if you have a video conferencing system that is connecting to another and you initiate the call
this will work OK but if the far end has to request the call you may have some problems
depending on what your access-list looks like on your OUTSIDE interface.

In that case you also have to add a permission to your outside interface ACL something like

access-list <Outside_to_inside> permit ip <Source> host <internal ip>

it's probably best to find out what port numbers are being used and lock it down further.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
traffic flow without STP 9 52
CISCO ATA 190 using PRI DID number 6 44
VTP / VLANs and Sub-Interfaces 4 39
nexus filter logs 3 44
This is about downgrading PIX Version 8.0(4) & ASDM 6.1(5) to PIX 7.2(4) and ASDM 5.2(4) but with only 64MB RAM and 16MB flash. Background: You have a Cisco Pix 515E which was running on PIX 7.2(4) and its supporting ASDM 5.2(4) without any i…
This article assumes you have at least one Cisco ASA or PIX configured with working internet and a non-dynamic, public, address on the outside interface. If you need instructions on how to enable your device for internet, or basic configuration info…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question