<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable 443 Service on Outside Interface with RAVPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321128#M1079981</link>
    <description>&lt;P&gt;Can you check the connection profile, access interfaces tab? You need to change the web access port number and DTLS port number there to make sure the FTD is not listening on those. It will try to use 443 there for the client downloads and profile update even for an IKEv2 remote access VPN.&lt;/P&gt;</description>
    <pubDate>Fri, 09 Apr 2021 16:55:24 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2021-04-09T16:55:24Z</dc:date>
    <item>
      <title>Disable 443 Service on Outside Interface with RAVPN</title>
      <link>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4319679#M1079898</link>
      <description>&lt;P&gt;I am trying to forward port 443 to a local on prem proxy so I can host webservers. I also need remote access vpn enabled which as far as I can tell automatically enables the 443 service on the outside interface. This is happening even when I disable SSL and change the ports in the VPN config within FMC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I go to deploy the NAT rule to forward 443 while the VPN is enabled I get the following error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[ManualNatRule 6] Interface used in translated source and port used in translated source port are also being used in VPN. Please re-configure the interface and/or port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way I have gotten the port to forward is if I disable the VPN which is not an option. I've tried everything I can think of and have found on google including flexconfig commands like:&lt;/P&gt;&lt;P&gt;"group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt;no webvpn"&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;"webvpn&lt;/P&gt;&lt;P&gt;keepout "503 Service Unavailable"&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;"webvpn&lt;BR /&gt;portal-access-rule 1 deny any"&lt;/P&gt;&lt;P&gt;Which was found in the below bug report.&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp81746/?rfs=iqvred" target="_blank" rel="noopener"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvp81746/?rfs=iqvred&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However none of these stop the FTD from binding the 443 service to the crypto ipsec config on the outside interface. Is there any way to stop that from happening?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 03:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4319679#M1079898</guid>
      <dc:creator>SamDominguez6839</dc:creator>
      <dc:date>2021-04-07T03:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Disable 443 Service on Outside Interface with RAVPN</title>
      <link>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321128#M1079981</link>
      <description>&lt;P&gt;Can you check the connection profile, access interfaces tab? You need to change the web access port number and DTLS port number there to make sure the FTD is not listening on those. It will try to use 443 there for the client downloads and profile update even for an IKEv2 remote access VPN.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 16:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321128#M1079981</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-04-09T16:55:24Z</dc:date>
    </item>
    <item>
      <title>Re: Disable 443 Service on Outside Interface with RAVPN</title>
      <link>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321251#M1079987</link>
      <description>&lt;P&gt;Hey Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. I've tried changing the port on the access interface tab to several different ports to no avail. In my initial post I attached a screenshot (vpnAI.png) showing it changed to port 8000 with dtls and ssl disabled. I've tried changing it to other ports as well like 8443, 8080, and random ephemeral ports but still no go. Even with these settings changed within FMC when I do a show run | i 443 I still get whats showing In the "showrun443.png" attached screenshot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll give it another shot by trying to create a brand new policy from scratch. I am currently working with TAC on this issue as well and will update this post with further findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 22:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321251#M1079987</guid>
      <dc:creator>SamDominguez6839</dc:creator>
      <dc:date>2021-04-09T22:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Disable 443 Service on Outside Interface with RAVPN</title>
      <link>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321261#M1079988</link>
      <description>&lt;P&gt;It seems to be the ipsec proposal that is using port 443. Is there a way to change that?&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 23:39:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321261#M1079988</guid>
      <dc:creator>SamDominguez6839</dc:creator>
      <dc:date>2021-04-09T23:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Disable 443 Service on Outside Interface with RAVPN</title>
      <link>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321280#M1079990</link>
      <description>&lt;P&gt;This was solved by disabling ipsec on the access interface, and changing the ports on DTLS/SSL. Where can I put in a feature request to change the ipsec proposal port?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Apr 2021 01:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disable-443-service-on-outside-interface-with-ravpn/m-p/4321280#M1079990</guid>
      <dc:creator>SamDominguez6839</dc:creator>
      <dc:date>2021-04-10T01:51:44Z</dc:date>
    </item>
  </channel>
</rss>

