<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Based ACLs vs Protocol Enforcement in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4126841#M1072382</link>
    <description>&lt;P&gt;The answer really depends on the deployment.&amp;nbsp;But, you are both correct.&lt;/P&gt;
&lt;P&gt;The issue here is that TLS/SSL is an encryption that runs ontop of HTTP.&amp;nbsp; The two combined become HTTPS which then runs over port TCP/443.&amp;nbsp; If you block HTTPS in a port based ACL you would effectively also be blocking TLS/SSL traffic.&lt;/P&gt;
&lt;P&gt;Now, if you use an inspection policy, yes, you can block all encrypted traffic that uses TLS/SSL based on the protocol.&amp;nbsp; However, the reason for using an inspection policy isn't just to drop all traffic that uses TLS/SSL but to provide inspection for known traffic SSL traffic.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Jul 2020 18:06:15 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2020-07-28T18:06:15Z</dc:date>
    <item>
      <title>Port Based ACLs vs Protocol Enforcement</title>
      <link>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4125480#M1072305</link>
      <description>&lt;P&gt;I recently was discussing network security with some experienced network guys (and I am not a networking guy!).This was in the context of connectivity to cloud systems.&amp;nbsp; I was arguing that port based ACL did not really enforce protocols that could traverse that ACL and that it only literally enforces the dst/src TCP/UDP port. For example, a rule allowing port 443 &lt;EM&gt;&lt;STRONG&gt;only&lt;/STRONG&gt; &lt;/EM&gt;is often presented at architecture meetings as allowing TLS/SSl but to my eye it does nothing of the sort. Only protocol inspection/enforcement would do that. They argued the opposite.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Who's correct?! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 14:07:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4125480#M1072305</guid>
      <dc:creator>shockocisco</dc:creator>
      <dc:date>2020-08-28T14:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based ACLs vs Protocol Enforcement</title>
      <link>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4126782#M1072381</link>
      <description>&lt;P&gt;Anyone?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 17:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4126782#M1072381</guid>
      <dc:creator>shockocisco</dc:creator>
      <dc:date>2020-07-28T17:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based ACLs vs Protocol Enforcement</title>
      <link>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4126841#M1072382</link>
      <description>&lt;P&gt;The answer really depends on the deployment.&amp;nbsp;But, you are both correct.&lt;/P&gt;
&lt;P&gt;The issue here is that TLS/SSL is an encryption that runs ontop of HTTP.&amp;nbsp; The two combined become HTTPS which then runs over port TCP/443.&amp;nbsp; If you block HTTPS in a port based ACL you would effectively also be blocking TLS/SSL traffic.&lt;/P&gt;
&lt;P&gt;Now, if you use an inspection policy, yes, you can block all encrypted traffic that uses TLS/SSL based on the protocol.&amp;nbsp; However, the reason for using an inspection policy isn't just to drop all traffic that uses TLS/SSL but to provide inspection for known traffic SSL traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 18:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4126841#M1072382</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-07-28T18:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based ACLs vs Protocol Enforcement</title>
      <link>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4143039#M1073449</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;Thanks for the reply. So it's fair to say that is I have an ACL that allows TCP port 443&lt;/FONT&gt; &lt;FONT color="#339966"&gt;&lt;EM&gt;&lt;STRONG&gt;only&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/FONT&gt;but with &lt;FONT color="#FF0000"&gt;&lt;EM&gt;&lt;STRONG&gt;no inspection &lt;/STRONG&gt;&lt;/EM&gt;&lt;FONT color="#000000"&gt;enabled on it then I can pass any protocol over port 443?&lt;/FONT&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 14:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4143039#M1073449</guid>
      <dc:creator>shockocisco</dc:creator>
      <dc:date>2020-08-28T14:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Port Based ACLs vs Protocol Enforcement</title>
      <link>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4145712#M1073550</link>
      <description>&lt;P&gt;Yes, if you only have an ACL that allows TCP/443 then you could, theoretically, tunnel protocols over the connection.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 11:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-based-acls-vs-protocol-enforcement/m-p/4145712#M1073550</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-09-03T11:18:43Z</dc:date>
    </item>
  </channel>
</rss>

