Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

telnet to 443 of particular IP passing no matter what - I don't want that

Hello Sophos friends,

I have trivial problem but I can't figure why is that happening. On our UTM SG330 box, I want to block all the possible communication to particular IP (in the internet)

Let's say we have bunch of users (in internal network) potentially communicating with that IP. The users are using the UTM as proxy. I have added the IP address to unwanted websites and I have set up that this IP address is malicious from proxy's point of view (category - Illegal software, characteristics - malicious web).

I have also created a firewall rule dropping any protocol going to that destination IP adderss from all the IPv4 and IPv6 addresses.

How come I can still do -> C:\telnet.exe a.b.c.d 443 and it goes through? a.b.c.d is the destination address I don't want to communicate with under any circumnstances.

Many thanks in advance.

ZS



This thread was automatically locked due to age.
Parents
  • Blackhole definition?  Here's an example.  I noticed many attempts on daily bases from 216.218.206.102 performing various port scans.  This rule took care of it.  It works in both directions.  No traffic in, and cannot be reached from the local lan. 

    Chances are firewall block is not working because web filtering is letting it through.  Web filtering rules are processed before firewall rules.  For a particular packet, rules are only processed once.  If it's done in web filtering then firewall block has no effect.

Reply
  • Blackhole definition?  Here's an example.  I noticed many attempts on daily bases from 216.218.206.102 performing various port scans.  This rule took care of it.  It works in both directions.  No traffic in, and cannot be reached from the local lan. 

    Chances are firewall block is not working because web filtering is letting it through.  Web filtering rules are processed before firewall rules.  For a particular packet, rules are only processed once.  If it's done in web filtering then firewall block has no effect.

Children
No Data