<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerable Ports in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4262182#M1076834</link>
    <description>&lt;P&gt;By default you want to block EVERYTHING inbound other than what you have explicitly allowed. An ASA will do this automatically if you have setup security levels properly (e.g. inside = 100, outside =0). On FTD it is done with a default "BLOCK" rule in the access control policy.&lt;/P&gt;</description>
    <pubDate>Tue, 22 Dec 2020 03:49:35 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-12-22T03:49:35Z</dc:date>
    <item>
      <title>Vulnerable Ports</title>
      <link>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4261931#M1076818</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can anyone please provide a cisco document with the list of vulnerable ports to be blocked in cisco firewall?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 17:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4261931#M1076818</guid>
      <dc:creator>dijeshkeloth</dc:creator>
      <dc:date>2020-12-21T17:45:23Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerable Ports</title>
      <link>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4261996#M1076821</link>
      <description>&lt;P&gt;there is no rule you should open or close it all depends on business requirement, personally by default you should block all ports only open required ports in commonly used for Local LAN to external.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NGFW can take feed from a different vendors and make use of it for other Nexge generation features.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 19:44:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4261996#M1076821</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-12-21T19:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerable Ports</title>
      <link>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4262182#M1076834</link>
      <description>&lt;P&gt;By default you want to block EVERYTHING inbound other than what you have explicitly allowed. An ASA will do this automatically if you have setup security levels properly (e.g. inside = 100, outside =0). On FTD it is done with a default "BLOCK" rule in the access control policy.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 03:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vulnerable-ports/m-p/4262182#M1076834</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-12-22T03:49:35Z</dc:date>
    </item>
  </channel>
</rss>

