Can anybody tell my why my firewall allowed a computer behind it to spam the $%*@ out of the world when it got infected with the Rustock bot? The configuration is below and I believe that I set it up only to allow the exchange server to utilize port 25. The pertinent configuration info is below:
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list inside_outbound_nat0_acl permit ip any x.x.x.x 255.255.255.0
access-list inside_outbound_nat0_acl permit ip interface inside x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip any x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip x.x.x.x 255.255.255.0 x 255.255.255.0
access-list outside_cryptomap_dyn_20 permit ip any x.x.x.x 255.255.255.0
access-list e3_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list e3_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list outside_cryptomap_dyn_40 permit ip any x.x.x.x 255.255.255.224
access-list inside permit ip x.x.x.x 255.255.255.0 any
access-list inside permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list inside permit ip any any
access-list inside permit tcp host x.x.x.x any eq smtp
access-list inside deny tcp any any eq smtp
access-list outside_cryptomap_dyn_60 permit ip any x.x.x.x 255.255.255.224
access-list x_splitTunnelAcl_1 permit ip x.x.x.x 255.255.255.0 any
access-list x_splitTunnelAcl_1 permit ip x.x.x.x 255.255.255.0 any
access-list outside_cryptomap_dyn_80 permit ip any x.x.x.x 255.255.255.224
access-list emailt1 permit tcp any host x.x.x.x eq smtp
access-list emailt1 permit tcp any host x.x.x.x eq www
access-list emailt1 permit tcp any host x.x.x.x eq https
access-list emailt1 permit tcp any host x.x.x.x eq 3389
access-list emailt1 permit tcp any host x.x.x.x eq pop3
access-list emailt1 permit tcp any host x.x.x.x eq 8101
access-list emailt1 permit tcp any host x.x.x.x eq 8301
access-list emailt1 permit tcp any host x.x.x.x eq ftp
access-list emailt1 permit icmp any any echo-reply
access-list emailt1 permit icmp any any time-exceeded
access-list emailt1 permit icmp any any unreachable
access-list emailt1 permit ip x.x.x.x 255.255.255.0 any
access-list emailt1 permit tcp any host x.x.x.x eq imap4
access-list xx_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list xx_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list outside_cryptomap_20 permit ip x.x.x.x 255.255.255.0 aeg 255.255.255.0
pager lines 21
logging on
logging timestamp
logging monitor debugging
logging buffered debugging
logging trap debugging
logging facility 16
logging host inside x.x.x.x
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.x 255.255.255.224
ip address inside x.x.x.x 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool x x.x.x.x-x.x.x.x
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp interface smtp x.x.x.x smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface https x.x.x.x https netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 255.255.255.255 0 0
static (inside,outside) tcp interface pop3 x.x.x.x pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3389 x.x.x.x 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 35865 x.x.x.x 35865 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface imap4 x.x.x.x imap4 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface ftp x.x.x.x ftp netmask 255.255.255.255 0 0
access-group emailt1 in interface outside
access-group inside in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.x 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
ssh timeout 5
console timeout 25
dhcpd address x.x.x.x-x.x.x.x inside
dhcpd dns x.x.x.x x.x.x.x
dhcpd wins x.x.x.x x.x.x.x
I watched the computer send smtp requests like crazy using TCPView and the remote port was always smtp. The local port was a random port, so maybe that's the problem. Perhaps I need to get rid of access-list inside permit ip any any and allow only specific ports?
Any insite would be most appreciated!
THanks,
Mike
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list inside_outbound_nat0_acl permit ip any x.x.x.x 255.255.255.0
access-list inside_outbound_nat0_acl permit ip interface inside x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip any x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.224
access-list inside_outbound_nat0_acl permit ip x.x.x.x 255.255.255.0 x 255.255.255.0
access-list outside_cryptomap_dyn_20 permit ip any x.x.x.x 255.255.255.0
access-list e3_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list e3_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list outside_cryptomap_dyn_40 permit ip any x.x.x.x 255.255.255.224
access-list inside permit ip x.x.x.x 255.255.255.0 any
access-list inside permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0
access-list inside permit ip any any
access-list inside permit tcp host x.x.x.x any eq smtp
access-list inside deny tcp any any eq smtp
access-list outside_cryptomap_dyn_60 permit ip any x.x.x.x 255.255.255.224
access-list x_splitTunnelAcl_1 permit ip x.x.x.x 255.255.255.0 any
access-list x_splitTunnelAcl_1 permit ip x.x.x.x 255.255.255.0 any
access-list outside_cryptomap_dyn_80 permit ip any x.x.x.x 255.255.255.224
access-list emailt1 permit tcp any host x.x.x.x eq smtp
access-list emailt1 permit tcp any host x.x.x.x eq www
access-list emailt1 permit tcp any host x.x.x.x eq https
access-list emailt1 permit tcp any host x.x.x.x eq 3389
access-list emailt1 permit tcp any host x.x.x.x eq pop3
access-list emailt1 permit tcp any host x.x.x.x eq 8101
access-list emailt1 permit tcp any host x.x.x.x eq 8301
access-list emailt1 permit tcp any host x.x.x.x eq ftp
access-list emailt1 permit icmp any any echo-reply
access-list emailt1 permit icmp any any time-exceeded
access-list emailt1 permit icmp any any unreachable
access-list emailt1 permit ip x.x.x.x 255.255.255.0 any
access-list emailt1 permit tcp any host x.x.x.x eq imap4
access-list xx_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list xx_splitTunnelAcl permit ip x.x.x.x 255.255.255.0 any
access-list outside_cryptomap_20 permit ip x.x.x.x 255.255.255.0 aeg 255.255.255.0
pager lines 21
logging on
logging timestamp
logging monitor debugging
logging buffered debugging
logging trap debugging
logging facility 16
logging host inside x.x.x.x
mtu outside 1500
mtu inside 1500
ip address outside x.x.x.x 255.255.255.224
ip address inside x.x.x.x 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool x x.x.x.x-x.x.x.x
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside,outside) tcp interface smtp x.x.x.x smtp netmask 255.255.255.255 0 0
static (inside,outside) tcp interface https x.x.x.x https netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 255.255.255.255 0 0
static (inside,outside) tcp interface pop3 x.x.x.x pop3 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 3389 x.x.x.x 3389 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface 35865 x.x.x.x 35865 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface imap4 x.x.x.x imap4 netmask 255.255.255.255 0 0
static (inside,outside) tcp interface ftp x.x.x.x ftp netmask 255.255.255.255 0 0
access-group emailt1 in interface outside
access-group inside in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.x 1
timeout xlate 1:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 0.0.0.0 0.0.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
ssh timeout 5
console timeout 25
dhcpd address x.x.x.x-x.x.x.x inside
dhcpd dns x.x.x.x x.x.x.x
dhcpd wins x.x.x.x x.x.x.x
I watched the computer send smtp requests like crazy using TCPView and the remote port was always smtp. The local port was a random port, so maybe that's the problem. Perhaps I need to get rid of access-list inside permit ip any any and allow only specific ports?
Any insite would be most appreciated!
THanks,
Mike