Re: deny ts connection based on ip?
On Aug 29, 4:30 pm, "TP" <tperson.knowsp...@mailandnews.com> wrote:
> You could program the firewall to block traffic that is
> destined for the RDP port that originates from her IP
> address. The trouble with this solution is that her address
> may change in the future, or she may connect from a
> different location/address.
>
> For example, she may have a dynamic address, or switch
> ISPs, or perhaps purchase a mobile broadband card and
> connect from her laptop, etc.
>
> -TP
>
> robert.waters wrote:
> > I have a PIX 501, but there are many other employees that need to use
> > the TS remotely. I have gone through the security event logs on the
> > TS and found the remote IP she's been using to connect; is it possible
> > for me to check the remote IP with a login script and automatically
> > log her off if it matches the one I know? Would you know how to go
> > about doing that? I don't want to ban her IP completely at the
> > firewall, b/c that would cut her off from our intranet (which shares
> > the IP w/ the rest of the wan-facing stuff).
I've thought of that, but Cisco IOS is just ridiculously confusing to
somebody who has zero time to sit down and learn it from the ground
up.
static interface ip address netmask 1.2.3.4 nat(inside) whatnow??
I just barely have the thing working
learned just enough to get
the outside ports to the inside ports, vice-versa, and keep the bad
guys out.
(OT) I purchased a PIX book, 'security specialists guide to cisco pix
firewalls'; to all you who got to this post from a 'cisco 501' query,
I wouldn't recommend it if you're new to the PIX or cisco in general.
In the beginning it looks like it's going to start explaining things
on a newbie level, and all of a sudden you're NATing the hell out of
everything, and subnetting and routing and basically learning, by
example, very advanced topics. It goes from "This is cisco IOS. It's
like a programming language, but for your firewall! OMG! Well,
here's how you access the terminal. Good job, children! Now, let's
break your corporate class-B network into 15 differently sized
subnets, set up 47 crazy never-would-happen-in-the-real-world access
lists, and and configure per-user RADIUS attributes before breakfast!
"
Sorry for the OT. I never got to rant about that damn book