block all outgoing traffic on port 25 while still allowing only exchange traffic on port 25?
this is probably an easy question for most..
It seems that my exchange server or a client on my network has been compromised and my exchange server or an outlook client being used to send spam. Our IP has landed on a couple blacklists. In an attempt to block these clients i want to create a rule to block outbound traffic on port 25 accept from the exchange server. My exchange servers IP is 192.168.7.200 what commands do i need to apply to this config to achieve this?
Thanks in advance..
Current configuration : 11313 bytes
no service pad
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
security authentication failure rate 3 log
security passwords min-length 6
logging buffered 4096
logging console critical
enable secret 5
--More-- aaa new-model
aaa authentication login default local
aaa authentication login vpnclient local
aaa authentication login ciscocp_vpn_xauth_ml_1 local
aaa authentication login userauth local
aaa authorization exec default local
aaa authorization network localgroups local
aaa authorization network vpnclient-group local
aaa session-id common
clock timezone PCTime -5
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...