Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

PIX 515 and Outbound Security

Status
Not open for further replies.

mofusjtf

IS-IT--Management
Apr 20, 2004
471
US
I have a PIX 515 in place and would like to know if it is advantageous to limit outbound access? By default all outbound traffic is allowed. Typically, I only secure traffic that attempts to come in. Is this secure enough?
 
A couple of thoughts..

1) Outbound ACLs are how my orginization blocks certain websites & ports for IM services.

2) Outbound ACLs can be used as a second layer of security, blocking worms from leaving your enterprise after you are already infected, so that you do not continue to infect the rest of the world.

Computer/Network Technician
CCNA
 
Using these ACL's is it possible to prevent spyware from communicating out if an internal system gets infected? Typically with a product like ISA I would only allow the necassary protocols out like http(s), SMTP, POP, FTP etc. I assume that is the same as using ACL's to limit ports/protocols.
 
same exact thing...

you write it the exact same way.. source address first, destination address second, but apply it to the inside interface..

so the source would become the internal network or host, and the destination would be the internet IP.

Computer/Network Technician
CCNA
 
Outbound ACLs are as valuable as inbound ones. Some things to consider blocking:

Outbound traffic with source addresses not on your network (spoofing).
All Microsoft protocols (135,137,139,445..)
SMTP from a source other than your internal mail servers.
Source service ports not originating at the proper servers (80,21,25 etc).

The only difference between an inbound and an outbound acl is where it's applied. If you know router ACLs you won't have any problem with the Pix. Just remember that the Pix only applies an ACL to an interface as inbound (there's no "access-group xxx out").
 
I won't set up a firewall without both inbound and outbound ACLs for all the good reasons already noted. The pain comes up when you have to "lock down" a non-restricted path. The only way I have found reasonable is to setup logging to a syslog server and collect data (at level 6 or 7) on what traffic is passed. Once you have some data to work with, sift through it (manually if you have to, or using some shell scripts to sort and pull out only unique data), and write rules to permit those items you want to let out. If you are sure you have everything, cool, otherwise iterate the process until you are confident that you can remove the "permit ip any any" rule. Using the suffix "log" on the "any any" rule will create a unique syslog ID 106100, allowing you to track traffic that passed that rule (cuts down on the analysis big-time).
 
Hello,

Anyone have any idea to how configure the outgoing blocking with cisco PDM ......?

Just tryaround wo success ....


Thanks
Dan
 
I never use PDM (use access-list statements, it's easier).
I have always implemented inbound and outbound access-lists and it makes the overall network security so much stronger. I block all outgoing expcet explicitly permitted, HTTP, HTTPS, POP3 and SMTP plus AOL for my boss. Normally users should not need any more ports open than what I mentioned above.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top