<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Insurance Scan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718813#M1094956</link>
    <description>&lt;P&gt;I had customer contact me on a Corvus Insurance company scan where they scanned the customers firewall and detected the Cisco VPN. The stated that I should hide the VPN name? WTF does that mean??? All VPN's that I know of usually associate to a name.&lt;/P&gt;&lt;P&gt;Also I am trying to search events by scans from them within Firepower Management center and I am not sure what my search criteria should be. I'd like to see logs of the scan that they did . Any ideas?&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2022 17:18:44 GMT</pubDate>
    <dc:creator>keithcclark71</dc:creator>
    <dc:date>2022-11-09T17:18:44Z</dc:date>
    <item>
      <title>Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718813#M1094956</link>
      <description>&lt;P&gt;I had customer contact me on a Corvus Insurance company scan where they scanned the customers firewall and detected the Cisco VPN. The stated that I should hide the VPN name? WTF does that mean??? All VPN's that I know of usually associate to a name.&lt;/P&gt;&lt;P&gt;Also I am trying to search events by scans from them within Firepower Management center and I am not sure what my search criteria should be. I'd like to see logs of the scan that they did . Any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 17:18:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718813#M1094956</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2022-11-09T17:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718817#M1094957</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/262657"&gt;@keithcclark71&lt;/a&gt; what type of VPN are you running on your hardware, Site-to-Site VPN or RAVPN?&lt;/P&gt;
&lt;P&gt;If you are running an RAVPN on SSL/TLS (TCP/443), it's likely the web UI is available to anyone to open in a web browser, which will clearly state Cisco - they'd be unable to login obviously, without credentials.&lt;/P&gt;
&lt;P&gt;An nmap scan such as "nmap -sV --script ssl-enum-ciphers -p 443 &amp;lt;ip/fdqn&amp;gt; - would return the following.&lt;/P&gt;
&lt;P&gt;PORT STATE SERVICE VERSION&lt;BR /&gt;443/tcp open ssl/http &lt;STRONG&gt;Cisco ASA SSL VPN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Generally the VPN is open to the world to connect on the VPN ports, it's the authentication method(s) and the configured encryption ciphers that make it secure.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 17:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718817#M1094957</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-09T17:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718850#M1094958</link>
      <description>&lt;P&gt;Exactly. I am only using the web for client download. The Anyconnect VPN itself I locked down to authenticate using yubikey hardware keys with certificate. Without the hardware key the VPN connection can never be initially established. I get irritated when someone scans my customers and then tells my customer they should hide the VPN name associated with the customers public IP address EX: vpn.customer.net 98.76.98.87 (Why would hiding then name here make any difference) I'll just move the Web off to diff port and be done with this but my customer reads their stupid report and thinks their wide open to attack and I gotta deal with it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 18:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718850#M1094958</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2022-11-09T18:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718854#M1094959</link>
      <description>&lt;P&gt;Oh another thing they did based off the scan was recommend to my customer "zero trust network access (ztna) solution" as opposed to using VPN. So my customer is now supposed to change from hardware keys to this zero trust deal and spend 100 grand to do so and eat all the money they spent with putting in security keys. Sorry more of a rant I suppose but WTF lol&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 18:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718854#M1094959</guid>
      <dc:creator>keithcclark71</dc:creator>
      <dc:date>2022-11-09T18:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718859#M1094960</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/262657"&gt;@keithcclark71&lt;/a&gt; if that's all the report is complaining about, thats not too bad. Most reports would complain about TLS 1.0/1.1 and weak ciphers.&lt;/P&gt;
&lt;P&gt;I don't think changing the port is going to make much difference, a port scan would still find it.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 18:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718859#M1094960</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-09T18:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718861#M1094961</link>
      <description>&lt;P&gt;I expect the scan report was completed by a Salesman.......££££££££££&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 18:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/4718861#M1094961</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-09T18:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Insurance Scan</title>
      <link>https://community.cisco.com/t5/network-security/insurance-scan/m-p/5127459#M1113423</link>
      <description>&lt;P&gt;It sounds like Corvus &lt;A href="https://uifcalculator.co.za/" target="_self"&gt;Insurance&lt;/A&gt; detected your Cisco VPN during a scan. They likely meant to obfuscate or hide the fact that you're using a VPN for security reasons. To search for scan logs in Firepower Management Center, try using the search criteria "Corvus scan events."&lt;/P&gt;</description>
      <pubDate>Mon, 10 Jun 2024 10:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/insurance-scan/m-p/5127459#M1113423</guid>
      <dc:creator>adamzampa029394</dc:creator>
      <dc:date>2024-06-10T10:14:39Z</dc:date>
    </item>
  </channel>
</rss>

