We have a Cisco 7206 router with two T1s and two FastEthernet ports. I started thinking the other day that it might be worthwhile to block NetBIOS traffic from getting into or out of our network. It might help cut down on the number of attacks via ports 135, 137 and 139 (and 445, too) by blocking those ports. But I'm not sure if it's possible to block them only on the two T1 lines.
The intention is to allow traffic within our LAN (several subnets) to pass unimpeded while blocking traffic on those ports from going to or from our LAN via the T1 lines. We already have a Cisco Pix 520UR firewall. The blocking I want to do at the router is basically to safeguard a couple of Windows machines that are outside the firewall and can't be moved inside it for one reason or another. (The firewall blocks those ports already for those sitting behind it.)
A simple access list would presumably be this:
access-list 101 deny udp any any eq 135
access-list 101 deny udp any any eq 137
access-list 101 deny tcp any any eq 139
access-list 101 deny udp any any eq 135
access-list 101 deny tcp any any eq 137
access-list 101 deny tcp any any eq 139
access-list 101 deny tcp any any eq 445
access-list 101 deny udp any any eq 445
access-list 101 permit ip any any
Would this be something I could then apply to my serial interfaces (the T1s) only? And would I apply them to the "master" serial interface (i.e. Serial3/0, Serial3/1) or the subinterfaces (i.e. Serial3/0.1, etc.)? And would I have to have more than one access list to apply it to both of those interfaces?
I've looked around and the idea of blocking these ports at a router is simple. However, the multiple subnets on our LAN and the two T1s seem to make it more complicated. I'd love to be able to do this at the router, rather than having to monkey around with individual servers. (Especially since adjusting the allowed/disallowed ports on one NIC does the same on all NICs in a Microsoft machine.)
Thanks!
The intention is to allow traffic within our LAN (several subnets) to pass unimpeded while blocking traffic on those ports from going to or from our LAN via the T1 lines. We already have a Cisco Pix 520UR firewall. The blocking I want to do at the router is basically to safeguard a couple of Windows machines that are outside the firewall and can't be moved inside it for one reason or another. (The firewall blocks those ports already for those sitting behind it.)
A simple access list would presumably be this:
access-list 101 deny udp any any eq 135
access-list 101 deny udp any any eq 137
access-list 101 deny tcp any any eq 139
access-list 101 deny udp any any eq 135
access-list 101 deny tcp any any eq 137
access-list 101 deny tcp any any eq 139
access-list 101 deny tcp any any eq 445
access-list 101 deny udp any any eq 445
access-list 101 permit ip any any
Would this be something I could then apply to my serial interfaces (the T1s) only? And would I apply them to the "master" serial interface (i.e. Serial3/0, Serial3/1) or the subinterfaces (i.e. Serial3/0.1, etc.)? And would I have to have more than one access list to apply it to both of those interfaces?
I've looked around and the idea of blocking these ports at a router is simple. However, the multiple subnets on our LAN and the two T1s seem to make it more complicated. I'd love to be able to do this at the router, rather than having to monkey around with individual servers. (Especially since adjusting the allowed/disallowed ports on one NIC does the same on all NICs in a Microsoft machine.)
Thanks!