<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ports 2000 and 5060 open to outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057496#M1068640</link>
    <description>&lt;P&gt;Hi Cristian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find attached the output from the trace and the packet-capture commands.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
    <pubDate>Thu, 02 Apr 2020 09:42:43 GMT</pubDate>
    <dc:creator>markus.albisser1</dc:creator>
    <dc:date>2020-04-02T09:42:43Z</dc:date>
    <item>
      <title>ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056468#M1068536</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A pen test shows us that several resources which are published to the Outside via an ASA-5545 (also with a Firepower device attached to the ASA as a module) replies on the ports tcp/2000 and tcp/5060, which is the Skinny and SIP protocol. Even if there is no ACL configured and also explicitly a blocking rule on the top of this outside ACL, the tcp port scan replies. And, I can see on the log that this traffic is blocked by the ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found many articles about this, most of them are telling that the SIP/Skinny inspection needs to be disabled on the inspection_default rule. I took the inspects away for these two protocols, but the situation is still the same.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone has an idea why these two ports still replies on a port scan and what can be done against it? Here is my inspection_default, for you reference.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for your inputs.&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect http&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect xdmcp&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 06:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056468#M1068536</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-01T06:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056503#M1068538</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1. Can you post your "show run nat" and any included objects, "show run access-group" and "show run access-list" for global ACL or the ACL applied inbound on the outside interface? Can you also post the output of a "packet-tracer" for that specific TCP traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp; 2. Are you saying that the if you initiate a session from the outside it is successful, or just that you get a TCP RST, like the port scanner does as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 07:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056503#M1068538</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-01T07:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056608#M1068548</link>
      <description>&lt;P&gt;I've seen some scanning tools report these as false positive. I never did quite figure out why.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 09:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056608#M1068548</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-04-01T09:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056767#M1068573</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;It may depend if the firewall sends or not a TCP RST? When running some extended penetration testing against different FW vendors 2 years ago, the outcome was different even for the same vendor but just different OS version, somehow as expected. For example on the ASA, you can configure "service resetinbound" and will send a TCP RST for any denied packed inbound, if the flow is "low-sec-lvl to high-sec-lvl"; by default this is disabled so that the ASA plays dead. no TCP RST being sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 13:41:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056767#M1068573</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-01T13:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056838#M1068581</link>
      <description>&lt;P&gt;Hi Christian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply. Of course difficult to upload the config here, due to the fact that I cannot share it on a almost public place here and also the fact that it has 18'000 lines, most of them used by objects, object-groups, ACLs and NAT statement. But i will post some traces below a bit later, between a client and the firewall, probably that will help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And yes, I try with the powershell command Test-NetConnection on port 2000 and I see the SYN, SYN/ACK, ACK and then the FIN/ACK and ACK. So a normal behavior, it seems that the session setup is totally ok and the firewall replies as if the port would be open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me provide you some more information a bit further down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 14:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056838#M1068581</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-01T14:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056853#M1068582</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/198172"&gt;@markus.albisser1&lt;/a&gt;&amp;nbsp;There is another reply of mine further down the line. I had similar experiences, and in the end, depending on the vendor, we upgraded or TAC case. It was a software issue. What version are you running? Usually, in high-sec environments, a stable version is chosen, aggressive penetration testing performed, and any flaws get fixed via TAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Post the information you were speaking about.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 15:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056853#M1068582</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-01T15:02:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056875#M1068584</link>
      <description>&lt;P&gt;Hi Christian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This might be that we have a bug here. Our current ASA version is 9.8(4)15.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 15:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056875#M1068584</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-01T15:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056885#M1068585</link>
      <description>&lt;P&gt;Hi Christian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created two print screens here, one from the client -&amp;gt; ASA and one of the log in the ASA ASDM from the blocked traffic. The TCP session is initiated and then closed again in a correct way, tested with the Test-NetConnection and port 2000. At the same time when this test reported a TcpTestSucceeded: True, the ASA firewall gets the deny on the outside ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 15:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4056885#M1068585</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-01T15:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057013#M1068595</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I don't see any matching between the IP's involved in the two captures, those looks to be two different sessions. Can you confirm that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 17:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057013#M1068595</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-01T17:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057365#M1068620</link>
      <description>&lt;P&gt;Hi Christian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for that and the confusion. Let me give you some insights which IP address has a NAT to which:&lt;BR /&gt;-&amp;gt; 192.168.169.134: This is the internal address of the client, the client's public IP address then is 178.83.228.141&lt;BR /&gt;-&amp;gt; 194.116.x.x: This is the public IP address of the destination on the ASA, the internal address of this then is 10.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In fact, over the Internet, the IP address&amp;nbsp;178.83.228.141 communicates with 194.116.x.x. Does this makes sense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 04:56:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057365#M1068620</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-02T04:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057379#M1068621</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; What version are you running on the ASA? From the client where the packet capture has been performed, if you still run Wireshark and try to just telnet on that port of 2000, what happens?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 05:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057379#M1068621</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-02T05:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057410#M1068626</link>
      <description>&lt;P&gt;Hi Christian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our current ASA version is 9.8(4)15. The print screen above shows the Wireshark output with the Test-NetConnection command in Powershell. I doublechecked with Telnet, it is exactly the same (SYN Client -&amp;gt; ASA / SYN ACK ASA -&amp;gt; Client / ACK Client -&amp;gt; ASA), with the difference that the FIN/ACK will not come immediately as the Telnet session is still established (connected Telnet screen. This is also confirmed with the netstat -an, which shows the connection as established:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;TCP 192.168.169.134:2194 194.116.x.x:2000 ESTABLISHED&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Markus&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 06:50:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057410#M1068626</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-02T06:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057423#M1068629</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Can you post the output of a packet-tracer, by simulating the exact same traffic, with the source being the public IP you're using for your Test-NetConnection? Could you also perform a packet capture on your outside interface to catch this traffic, ensure to use the "trace" keyword and afterwards perform a "show cap xyz 1 trace detail"? Here's a guide to help you with the packet-tracer if you're not really familiar:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/asa-using-packet-capture-to-troubleshoot-asa-firewall/ta-p/3129889" target="_blank"&gt;https://community.cisco.com/t5/security-documents/asa-using-packet-capture-to-troubleshoot-asa-firewall/ta-p/3129889&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 07:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057423#M1068629</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-02T07:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057496#M1068640</link>
      <description>&lt;P&gt;Hi Cristian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find attached the output from the trace and the packet-capture commands.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 09:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057496#M1068640</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-02T09:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057510#M1068642</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Couple of observations:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 1. Both the capture and packet-tracer confirm a DROP.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 2. Capture and packet-tracer are not for the same traffic, the destination is different, so it's either 10.6x.x.x, either 194.116.x.x. At the same time it looks that 10.6x.xx.xx is NAT'ed into 194.116.x.x. With the capture there was no reply, and there was no request for 10.6x.x.x. So what re you trying to simulate exactly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 10:14:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057510#M1068642</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-02T10:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057620#M1068643</link>
      <description>&lt;P&gt;Hi Cristian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added here a little drawing with the situation. You are correct, 194.116.x.x is the public IP address on the ASA outside Interface, 10.65.x.x the DMZ IP address on the ASA encrypted Interface.&lt;/P&gt;&lt;P&gt;Therefore the IPs should be correct and the same. And you are right, based on the trace and capture, this is blocked. But based on the Wireshark on the client 192.168.169.134, there is a SYN/ACK coming back from the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Thu, 02 Apr 2020 13:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4057620#M1068643</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-02T13:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4059060#M1068745</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Wireshark on client show the connection being successful, while capture on the ASA shows only 3 SYN packets coming in; so who's lying/faulty? The packet capture on the ASA happens ingress immediately after the RX ring, so there is nothing that can block the ASA from capturing any received packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 17:24:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4059060#M1068745</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-04T17:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4059573#M1068808</link>
      <description>&lt;P&gt;Hi Cristian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course I don't understand your point. The ASA blocks these SYN connections, but Wireshark gets a SYN/ACK back. When the ASA would reply to a SYN with a SYN/ACK and reports a "deny tcp src outside...", there will not be a blocked message, rather than a permit log entry which is "Built inbound TCP connectionfor outside..." (which then is based on a permit statement in the ACL).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you have any other ideas, otherwise I will go via Cisco TAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 04:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4059573#M1068808</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-06T04:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4059672#M1068822</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;Open a TAC case, and in case you don't forget, also post here what as actually happening. What i was trying to say is that, per the Wireshark capture, the client sends SYN and ACK (as it somehow receives a SYN-ACK back from the ASA. If you look at the packet capture on the ASA, which is done before any kind of policy being applied by the ASA (so it's not a capture of allowed packets but a capture of received packets), the ASA was only showing received SYN packets, no ACK or FIN as the client looked to be sending per the Wireshark capture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2020 08:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4059672#M1068822</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-04-06T08:00:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ports 2000 and 5060 open to outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4060616#M1068912</link>
      <description>&lt;P&gt;Hi Cristian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For sure I will post it here when it comes to a TAC case.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had a chat with a colleague, he told me that this behavior can come from the Firepower module on the ASA, that as soon Application inspection is enabled, the Firepower needs to have the first packets to identify what the traffic is. Means the 3-way handshaking needs to be established for this check. And that the result I can see on the ASA log (denied traffic based on the ACL) is then the result on this, that the previous actions cannot be logged from the ASA directly as this is a Firepower task.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This could exlain why I can see a fully established connection on the client but not on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could that makes sense for you?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2020 06:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ports-2000-and-5060-open-to-outside/m-p/4060616#M1068912</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-04-07T06:59:20Z</dc:date>
    </item>
  </channel>
</rss>

