<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port 3306 shows open on a ASA 5525X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145073#M1114290</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; your advice is incorrect in this case.&lt;/P&gt;
&lt;P&gt;"sh asp table socket" on an ASA (or from FTD LINA cli) will show listening sockets in the data plane. It will NOT show internal FTD process listeners on the management plane/ interface.&lt;/P&gt;
&lt;P&gt;Verification from a live device:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; system support diagnostic-cli 
Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach.
Type help or '?' for a list of available commands.

FTDv-1&amp;gt; en
Password: 

FTDv-1# sh asp table socket | i LISTEN
SSL        29dee3b8  LISTEN     192.168.0.204:443                            0.0.0.0:*                                    
DTLS       29df0728  LISTEN     192.168.0.204:443                            0.0.0.0:*                                    
FTDv-1#
root@FTDv-1:~# exit
logout
admin@FTDv-1:~$ exit
logout
&amp;gt;
&amp;gt; expert
admin@FTDv-1:~$ sudo su -
Password: 
root@FTDv-1:~# netstat -a | grep sql
tcp        0      0 localhost:mysql         0.0.0.0:*               LISTEN     
tcp        0      0 localhost:mysql         localhost:49606         ESTABLISHED
tcp6       0      0 localhost:49606         localhost:mysql         ESTABLISHED
unix  2      [ ACC ]     STREAM     LISTENING     37658    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     67770    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     128958   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     106270   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     102627   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     37772    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     41926    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     128969   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     41845    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     400976853 /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     43220    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     661598941 /var/run/mysql/mysql.sock
root@FTDv-1:~#&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jul 2024 16:52:40 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2024-07-15T16:52:40Z</dc:date>
    <item>
      <title>Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144922#M1114274</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello I want help on a case that our ASA firewall is being scanned on a management interface and it shows that port 3306 is open and our QSA told us to verify it or close. Normally we use only ssh to access the firewall. So, please assist us why this port is open and also how we can disable it.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 12:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144922#M1114274</guid>
      <dc:creator>TsadikuBahiru78025</dc:creator>
      <dc:date>2024-07-15T12:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144924#M1114275</link>
      <description>&lt;P&gt;Show conn port&amp;nbsp;&lt;SPAN&gt;3306 long&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try this see which device use this port' I check this port for SQL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Share output if you can&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 12:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144924#M1114275</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T12:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144929#M1114276</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello this is the output&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TsadikuBahiru78025_0-1721046290621.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/223443i3D5987CACF00A849/image-size/medium?v=v2&amp;amp;px=400" role="button" title="TsadikuBahiru78025_0-1721046290621.png" alt="TsadikuBahiru78025_0-1721046290621.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 12:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144929#M1114276</guid>
      <dc:creator>TsadikuBahiru78025</dc:creator>
      <dc:date>2024-07-15T12:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144933#M1114278</link>
      <description>&lt;P&gt;Sorry&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show conn long port 3306&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Share this&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 12:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144933#M1114278</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T12:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144937#M1114279</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TsadikuBahiru78025_0-1721046742084.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/223445iC5CF9C1C2BBF7004/image-size/medium?v=v2&amp;amp;px=400" role="button" title="TsadikuBahiru78025_0-1721046742084.png" alt="TsadikuBahiru78025_0-1721046742084.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 12:30:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144937#M1114279</guid>
      <dc:creator>TsadikuBahiru78025</dc:creator>
      <dc:date>2024-07-15T12:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144952#M1114280</link>
      <description>&lt;P&gt;The traffic is not bypass ASA I think it to box (to ASA)&lt;/P&gt;
&lt;P&gt;So the only solution is using ACL control plane&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access-list mysql deny &lt;STRONG&gt;tcp&lt;/STRONG&gt; any any port eq 3306&lt;/P&gt;
&lt;P&gt;Access-group mysql in interface outside control-plane&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 12:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144952#M1114280</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T12:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144973#M1114281</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the port is open when its scanned on the management interface so how can I filter the traffic to that.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 13:16:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144973#M1114281</guid>
      <dc:creator>TsadikuBahiru78025</dc:creator>
      <dc:date>2024-07-15T13:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144977#M1114282</link>
      <description>&lt;P&gt;Scan done from device connect to outside?&lt;/P&gt;
&lt;P&gt;If yes then we need &lt;STRONG&gt;control&lt;/STRONG&gt; &lt;STRONG&gt;plane&lt;/STRONG&gt; ACL which drop any traffic to port 3306 and traffic it direct to your asa not bypass it.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 13:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144977#M1114282</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T13:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144994#M1114283</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes MHM,&lt;/P&gt;&lt;P&gt;Thanks I will do that.&lt;/P&gt;&lt;P&gt;I was thinking if there is any unnecessary service running on the ftd itself so that we have to stop that.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 14:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5144994#M1114283</guid>
      <dc:creator>TsadikuBahiru78025</dc:creator>
      <dc:date>2024-07-15T14:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145055#M1114287</link>
      <description>&lt;P&gt;It appears your ASA is running FTD image. FMC uses tcp 3306 (mysql) to exchange information with AD User Agent. I know FTD has a listener, but it should only be used for internal communications between processes that use mysql internally. That is not configurable, either via control plane ACL or via service configuration.&lt;/P&gt;
&lt;P&gt;You can see this via expert mode root user as shown below:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;admin@firepower:~$ netstat -a | grep sql
tcp6       0      0 [::]:mysql              [::]:*                  LISTEN     
tcp6       0      0 localhost:49792         localhost:mysql         ESTABLISHED
tcp6       0      0 localhost:mysql         localhost:49792         ESTABLISHED
unix  2      [ ACC ]     STREAM     LISTENING     82633    /var/run/mysql/mysql.sock
&amp;lt;snip&amp;gt;&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 15 Jul 2024 16:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145055#M1114287</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-07-15T16:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145060#M1114288</link>
      <description>&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 16:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145060#M1114288</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T16:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145062#M1114289</link>
      <description>&lt;P&gt;ASA dont use FMC (my bad)&lt;/P&gt;
&lt;P&gt;So ASA direct connect to AD and use port 3306.&lt;/P&gt;
&lt;P&gt;If you add control-pland then it can effect your concentration to AD.&lt;/P&gt;
&lt;P&gt;So the answer to your team is I need this port open for AD user download.&lt;/P&gt;
&lt;P&gt;Use&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="code"&gt;
&lt;PRE&gt;&lt;CODE class=""&gt;&lt;SPAN class="line"&gt;ASA5506# sh asp table socket&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;See which what IP asa open this port if it with AD then it normal this port open.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 16:37:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145062#M1114289</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T16:37:28Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145073#M1114290</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; your advice is incorrect in this case.&lt;/P&gt;
&lt;P&gt;"sh asp table socket" on an ASA (or from FTD LINA cli) will show listening sockets in the data plane. It will NOT show internal FTD process listeners on the management plane/ interface.&lt;/P&gt;
&lt;P&gt;Verification from a live device:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; system support diagnostic-cli 
Attaching to Diagnostic CLI ... Press 'Ctrl+a then d' to detach.
Type help or '?' for a list of available commands.

FTDv-1&amp;gt; en
Password: 

FTDv-1# sh asp table socket | i LISTEN
SSL        29dee3b8  LISTEN     192.168.0.204:443                            0.0.0.0:*                                    
DTLS       29df0728  LISTEN     192.168.0.204:443                            0.0.0.0:*                                    
FTDv-1#
root@FTDv-1:~# exit
logout
admin@FTDv-1:~$ exit
logout
&amp;gt;
&amp;gt; expert
admin@FTDv-1:~$ sudo su -
Password: 
root@FTDv-1:~# netstat -a | grep sql
tcp        0      0 localhost:mysql         0.0.0.0:*               LISTEN     
tcp        0      0 localhost:mysql         localhost:49606         ESTABLISHED
tcp6       0      0 localhost:49606         localhost:mysql         ESTABLISHED
unix  2      [ ACC ]     STREAM     LISTENING     37658    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     67770    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     128958   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     106270   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     102627   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     37772    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     41926    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     128969   /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     41845    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     400976853 /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     43220    /var/run/mysql/mysql.sock
unix  3      [ ]         STREAM     CONNECTED     661598941 /var/run/mysql/mysql.sock
root@FTDv-1:~#&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 16:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145073#M1114290</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-07-15T16:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145075#M1114291</link>
      <description>&lt;P&gt;Check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.tunnelsup.com/cisco-asa-command-to-show-listening-ports/" target="_blank"&gt;https://www.tunnelsup.com/cisco-asa-command-to-show-listening-ports/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;And he use ASA not ftd&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 16:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145075#M1114291</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-15T16:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145080#M1114292</link>
      <description>&lt;P&gt;The original post did indeed mention "ASA firewall", but the screen shots included later by the OP show the clish command prompt ("&amp;gt;") which is unique to FTD image - which can run on ASA hardware.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 17:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145080#M1114292</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-07-15T17:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145096#M1114296</link>
      <description>&lt;P&gt;So, if FTD allows requests to this port from external devices and responds, this looks very much like a security hole and at least undocumented behavior. Documentation only mentions that FMC listens on this port and not FTD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 17:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145096#M1114296</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-07-15T17:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145120#M1114297</link>
      <description>&lt;P&gt;QSAs and other so-called auditors are known to often give advice to security administrators based on incomplete or inaccurate understanding of how the devices actually work.&lt;/P&gt;
&lt;P&gt;If you perform an nmap scan of an FTD device's management port against tcp/3309, you will see that it reports as "filtered" - meaning there may be a listener but an actual connection could not be established. Packet capture during such a scan confirms that &lt;STRONG&gt;no&lt;/STRONG&gt; TCP 3-way handshake completes, meaning the FTD does not actually accept the external connection. My screenshot below confirms this.&lt;/P&gt;
&lt;P&gt;A non-technical auditor will however just take the output of a Nessus or similar scan and see the filtered ports and "cry wolf". For me, I say "pcap or it didn't happen".&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1721065338228.png" style="width: 941px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/223481i51D87E1E90F81AFE/image-dimensions/941x454?v=v2" width="941" height="454" role="button" title="MarvinRhoads_0-1721065338228.png" alt="MarvinRhoads_0-1721065338228.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jul 2024 17:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145120#M1114297</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-07-15T17:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145336#M1114309</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;Thank you for the invaluable support.&lt;/P&gt;&lt;P&gt;Sorry&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;for misleading you actualy we are using ftd&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 06:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145336#M1114309</guid>
      <dc:creator>TsadikuBahiru78025</dc:creator>
      <dc:date>2024-07-16T06:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: Port 3306 shows open on a ASA 5525X</title>
      <link>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145367#M1114310</link>
      <description>&lt;P&gt;Dont worry'&lt;/P&gt;
&lt;P&gt;You get answer from the best &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a nice summer for all&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 06:55:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-3306-shows-open-on-a-asa-5525x/m-p/5145367#M1114310</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-16T06:55:16Z</dc:date>
    </item>
  </channel>
</rss>

