Nomarian
IS-IT--Management
- Jan 8, 2002
- 27
Thanks in advance for any help.
I have configured our PIX 515 firewall with the rules down below. Everything works fine until I delete the first rule with regards to the permit anything. Once I delete that rule, we lose access to pretty much everything. I thought that if I put in rules that specified what is allowed with explicit deny at the end this should work. Can anyone look this over and help? I want to lock down the network and only allow the customer service groups listed access out.
access-list inside_access_in extended permit ip 172.18.0.0 255.255.0.0 any
access-list inside_access_in extended deny tcp any object-group BinaryNewsGroups any object-group BinaryNewsGroups
access-list inside_access_in extended deny tcp any object-group BitTorrent1 any object-group BitTorrent1
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group DNS_ALL any object-group DNS_ALL
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group RDP any object-group RDP
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Ichat any object-group Ichat
access-list inside_access_in extended deny tcp any object-group WOW-All any object-group WOW-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Petrobras any object-group Petrobras inactive
access-list inside_access_in extended permit udp 172.18.0.0 255.255.0.0 object-group Petrobras any object-group Petrobras inactive
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Email-All any object-group Email-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group FTP-All any object-group FTP-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Google_Talk any object-group Google_Talk
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group ICQ any object-group ICQ
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group IMAP-All any object-group IMAP-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group MAC_Email any object-group MAC_Email
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group MSNMessenger any object-group MSNMessenger
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group POP_Mail any object-group POP_Mail
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group PolyCom any object-group PolyCom
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group SSH-All any object-group SSH-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group SharePoint any object-group SharePoint
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Telnet-All any object-group Telnet-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group VNC any object-group VNC
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group VPN any object-group VPN
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Web-All any object-group Web-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group WebEx any object-group WebEx
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Yahoo_Messenger any object-group Yahoo_Messenger
access-list inside_access_in extended deny ip any any
access-list inside_access_in extended deny tcp any any
Norman Moy
I hope I helped.
I have configured our PIX 515 firewall with the rules down below. Everything works fine until I delete the first rule with regards to the permit anything. Once I delete that rule, we lose access to pretty much everything. I thought that if I put in rules that specified what is allowed with explicit deny at the end this should work. Can anyone look this over and help? I want to lock down the network and only allow the customer service groups listed access out.
access-list inside_access_in extended permit ip 172.18.0.0 255.255.0.0 any
access-list inside_access_in extended deny tcp any object-group BinaryNewsGroups any object-group BinaryNewsGroups
access-list inside_access_in extended deny tcp any object-group BitTorrent1 any object-group BitTorrent1
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group DNS_ALL any object-group DNS_ALL
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group RDP any object-group RDP
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Ichat any object-group Ichat
access-list inside_access_in extended deny tcp any object-group WOW-All any object-group WOW-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Petrobras any object-group Petrobras inactive
access-list inside_access_in extended permit udp 172.18.0.0 255.255.0.0 object-group Petrobras any object-group Petrobras inactive
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Email-All any object-group Email-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group FTP-All any object-group FTP-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Google_Talk any object-group Google_Talk
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group ICQ any object-group ICQ
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group IMAP-All any object-group IMAP-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group MAC_Email any object-group MAC_Email
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group MSNMessenger any object-group MSNMessenger
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group POP_Mail any object-group POP_Mail
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group PolyCom any object-group PolyCom
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group SSH-All any object-group SSH-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group SharePoint any object-group SharePoint
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Telnet-All any object-group Telnet-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group VNC any object-group VNC
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group VPN any object-group VPN
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Web-All any object-group Web-All
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group WebEx any object-group WebEx
access-list inside_access_in extended permit tcp 172.18.0.0 255.255.0.0 object-group Yahoo_Messenger any object-group Yahoo_Messenger
access-list inside_access_in extended deny ip any any
access-list inside_access_in extended deny tcp any any
Norman Moy
I hope I helped.