Hello guys a bit of an urgent one , we have a worm on our network and our virus guy has asked us to block tcpip port 445 accross our 8600,s .
How can this be achieved given the 8600 is a layer3 device ??
We've created filters for our R-Series modules, its pretty hard from the command line but its only a pain from Device Manager. In any case I think they would work for you, search for a couple documents called "Configuring QoS and IP Filtering" - there is one for 'legacy' systems and one for R modules.
config ip traffic-filter create global src-ip 0.0.0.0/0.0.0.0 dst-ip 0.0.0.0/0.0.0.0 id 1
config ip traffic-filter filter 1 action mode drop
config ip traffic-filter filter 1 match dst-port 445 dst-option equal
config ip traffic-filter filter 1 match protocol tcp
Add to ports required.
config ip traffic-filter global-set 1 create name block445
config ip traffic-filter global-set 1 add-filter 1
config ethernet 1/1 ip traffic-filter create # slot/port has to be configured
config ethernet 1/1 ip traffic-filter add set 1
config ethernet 1/1 ip traffic-filter default-action forward
config ethernet 1/1 ip traffic-filter enableconf eth
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.