cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
421
Views
0
Helpful
4
Replies

Help!! PIX 515

danderson
Level 1
Level 1

I'm new with the PIX and don't know how to block ports. I'm using the CLI and need to block certain ports to avoid the mess with the blaster worm.

Can anyone tell me what to type in after I do the config t that will block these ports?

Thanks.

4 Replies 4

bdube
Level 2
Level 2

Hi Don,

Unfortunately, it's not just a simple command you have to enter. It's probably many commands, and the case is worst if your PIX has already access-list (PIX's filtering function) configured on.

But, we must begin at the beginning. Do you have some servers in the DMZ or inside which are accessible from outside? If yes, those one should be configured to leave only the needed ports, i.e. port TCP 80 for Web. If no, don't worry about your server security.

Ben

I'm not worried about my servers on the inside of the firewall. However the problem is that I have dial-up access to those servers. I'm afraid someone will dial in to my network (which is part orf a campus area network) and affect other servers in the campus.

Don, you don't tell us how your users are dialing in, through a specialized access server located in the DMZ, which is a good place, or directly to the servers with MS RAS. The last case cannot be helped with the PIX.

My first impression, all servers accesibles from outside, Internet or RAS, must be patched. It's the price to pay with MS servers as public servers.

If i can help you with the PIX, i'm in vacation, and we have electricity in Quebec. ;-)

Regards,

Ben

All my servers have been patched and updated with the latest antivirus software. However, we do allow users to dial in via PCAnywhere to a PC that is part of our network. We allow them to do this in order to access files on the network and to check their e-mail from home, hotels, etc. I fear someone is dialing in and "releasing" the worm in that manner. As I said, I am not concerned about MY servers, but the campus network administrator is telling me that I could potientally spread the worm to those servers on the campus network that has not been patched. My network is one of about 12 networks that are on the campus network. Each individual network is independantly administered by its own administrator. I was asked by the campus network administrator to "block" the ports in question on my firewall.

I realize that I'm probably not providing a lot of information, but as I said, I just recently took over the administration of my network and am totally unfamiliar with Cisco's IOS.

Thanks for all your attention and help in this matter.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card