<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Open Firewall Ports in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095436#M1070629</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/480998"&gt;@rmathieson7&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have several sites on my web server in IIS. Some I want public and some I need private (internal use only).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The private sites use port 80 and 443. The public sites use 81 and 444. I&amp;nbsp;need to ensure that traffic from WAN to LAN is forwarded from 80 to 81, and 443 to 444.While keeping 80/443 hidden or internal only. Hope this makes sense. Thanks for all the help!!&lt;/P&gt;</description>
    <pubDate>Mon, 01 Jun 2020 12:33:32 GMT</pubDate>
    <dc:creator>wynneitmgr</dc:creator>
    <dc:date>2020-06-01T12:33:32Z</dc:date>
    <item>
      <title>Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094513#M1070574</link>
      <description>&lt;P&gt;I am a firewall newbie so please excuse my ignorance. I need to open some firewall ports to setup a Barracuda web filter. Do I open ports under NAT Rules in ASDM 7.9 or some other place? Thanks for any guidance, I really appreciate it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are the ports I need to open:&lt;/P&gt;&lt;P&gt;Port&amp;nbsp;&amp;nbsp; Direction&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&amp;nbsp;&amp;nbsp;&amp;nbsp; Description&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;22&lt;/TD&gt;&lt;TD&gt;In/Out&lt;/TD&gt;&lt;TD&gt;TCP&lt;/TD&gt;&lt;TD&gt;Remote diagnostics&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;25&lt;/TD&gt;&lt;TD&gt;Out&lt;/TD&gt;&lt;TD&gt;TCP&lt;/TD&gt;&lt;TD&gt;Email and email bounces&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;53&lt;/TD&gt;&lt;TD&gt;Out&lt;/TD&gt;&lt;TD&gt;TCP/UDP&lt;/TD&gt;&lt;TD&gt;DNS (Domain Name Server)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;Out&lt;/TD&gt;&lt;TD&gt;TCP&lt;/TD&gt;&lt;TD&gt;Virus, spyware, category definition updates, and firmware updates&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;123&lt;/TD&gt;&lt;TD&gt;In/Out&lt;/TD&gt;&lt;TD&gt;UDP&lt;/TD&gt;&lt;TD&gt;NTP (Network Time Protocol)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;8000&lt;/TD&gt;&lt;TD&gt;In/Out&lt;/TD&gt;&lt;TD&gt;TCP&lt;/TD&gt;&lt;TD&gt;To access web interface.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;8002&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;In/Out&lt;/TD&gt;&lt;TD&gt;TCP&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Synchronization between linked systems.&amp;nbsp;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;23557&lt;/TD&gt;&lt;TD&gt;In/Out&lt;/TD&gt;&lt;TD&gt;TCP&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Fri, 29 May 2020 16:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094513#M1070574</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-05-29T16:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094518#M1070575</link>
      <description>&lt;P&gt;They are access control rules that will need adding to your access control list, I presume the firewall is already configured and has ACLs you can add those rules to ?&amp;nbsp; See the link below, remember to be specific and only allow the ports required to the source / destinations required.&amp;nbsp; If you don't usually do it it's probably worth doing it with someone or getting someone to peer review if possible ?&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/112925-acl-asdm-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/112925-acl-asdm-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 16:58:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094518#M1070575</guid>
      <dc:creator>rmathieson7</dc:creator>
      <dc:date>2020-05-29T16:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094546#M1070579</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/480998"&gt;@rmathieson7&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help. I will follow your instruction and provided link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 18:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094546#M1070579</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-05-29T18:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094593#M1070583</link>
      <description>&lt;P&gt;I have created both Access and NAT Rules. (see screenshot). I get confused when on the direct; some ports are Out and the other ports are In/Out. Also, for example, when I try to do Port 22, it comes up as SSH instead of TCP.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw1.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75717i74A55D3EA106D227/image-size/large?v=v2&amp;amp;px=999" role="button" title="fw1.png" alt="fw1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw2.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75718i76C5557FE69478D7/image-size/large?v=v2&amp;amp;px=999" role="button" title="fw2.png" alt="fw2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw3.png" style="width: 496px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75716iF664D9DDAE9B45FF/image-size/large?v=v2&amp;amp;px=999" role="button" title="fw3.png" alt="fw3.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 May 2020 18:48:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094593#M1070583</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-05-29T18:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094804#M1070594</link>
      <description>Hi,&lt;BR /&gt;Your ACL from traffic inside to outside is permitting "any" from inside to outside, so you shouldn't explicitly need to permit any outbound traffic.&lt;BR /&gt;&lt;BR /&gt;Why do you need to permit the traffic "in" for NTP, SSH, access to the web interface, sync etc? Is this system being remotely managed from outside the firewall? If not I don't see why you should need these rules. The firewall is stateful, so any traffic you permit outbound will automatically be permitted back in.&lt;BR /&gt;&lt;BR /&gt;SSH uses TCP protocol port 22.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 30 May 2020 07:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4094804#M1070594</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-30T07:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095433#M1070628</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/480998"&gt;@rmathieson7&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe I setup the Access and NAT correctly. How does it know that I want port 80 to go to 81? Do I have to enter 81 somewhere?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw8.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75822iECD1F83BF7851D92/image-size/large?v=v2&amp;amp;px=999" role="button" title="fw8.png" alt="fw8.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw9.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75823i4BF8698BFE136F1F/image-size/large?v=v2&amp;amp;px=999" role="button" title="fw9.png" alt="fw9.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 12:30:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095433#M1070628</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-06-01T12:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095436#M1070629</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/480998"&gt;@rmathieson7&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have several sites on my web server in IIS. Some I want public and some I need private (internal use only).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The private sites use port 80 and 443. The public sites use 81 and 444. I&amp;nbsp;need to ensure that traffic from WAN to LAN is forwarded from 80 to 81, and 443 to 444.While keeping 80/443 hidden or internal only. Hope this makes sense. Thanks for all the help!!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 12:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095436#M1070629</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-06-01T12:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095628#M1070644</link>
      <description>&lt;P&gt;If the sites you want exposed to the public only listen on ports 81 &amp;amp; 444 then you could to this with a static NAT &amp;amp; just allow those ports through the firewall from the WAN to LAN ?&amp;nbsp; Slightly less common ports so will prevent a little bit of sniffing.&amp;nbsp; Is that feasible or do you need to ensure WAN traffic uses an existing connection string that you can't modify ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From a security perspective I'd advise you use a different web server for internal and external sites.&amp;nbsp; I'd also be concerned by the IPv4 any - outside being permitted but that will take some time and effort now a few services will be relying on it.&amp;nbsp; One to resolve over time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the TCP/22 showing as SSH, it's just a known port so the ASA does it automatically as per HTTP/S.&amp;nbsp; You can also create port objects and call them what you like.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 17:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095628#M1070644</guid>
      <dc:creator>rmathieson7</dc:creator>
      <dc:date>2020-06-01T17:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Open Firewall Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095645#M1070645</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/480998"&gt;@rmathieson7&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have all my Private Sites setup separately from Public Sites. See screenshot below.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fw22.png" style="width: 554px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/75840i3492434C0E26CB15/image-size/large?v=v2&amp;amp;px=999" role="button" title="fw22.png" alt="fw22.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jun 2020 17:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-firewall-ports/m-p/4095645#M1070645</guid>
      <dc:creator>wynneitmgr</dc:creator>
      <dc:date>2020-06-01T17:37:02Z</dc:date>
    </item>
  </channel>
</rss>

