<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disabling ASA SSL but Keep Ipsec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5167249#M1115463</link>
    <description>&lt;P&gt;&lt;SPAN&gt;outside:xxxx/60362 &amp;lt;&amp;lt;- this xxxx is public IP of client if Yes then client use http directly not inside IPSec tunnel.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And hence you can not disable it&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Aug 2024 17:02:05 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-08-28T17:02:05Z</dc:date>
    <item>
      <title>Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166667#M1115422</link>
      <description>&lt;P&gt;I am seeing what appears to be a botnet (mainly Brazil IPs)&amp;nbsp; trying to brute force connect to my ASA on port 443. Hundreds of thousands of attempts per day, but slow enough not to trip threat detection. Ive created a acl group to block control plane connections and added a bunch of ip ranges, but they appear to be using thousands of different ranges so this is not going to work very well.&lt;/P&gt;&lt;P&gt;What I think we could do is turn off SSL VPN to stop 443 from listening, but Im not sure if it would affect our Secure Client users (or site to site?). We use IPSEC entirely with MFA through azure. Im also primarly a ASDM user, not a firewall expert by any means.&lt;/P&gt;&lt;P&gt;Is this as simple as unchecking the SSL box for outside access on the connection profile setup page?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sysad43_0-1724778180575.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227154iF40E621E2684D6DA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="sysad43_0-1724778180575.png" alt="sysad43_0-1724778180575.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166667#M1115422</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2024-08-27T17:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166675#M1115424</link>
      <description>&lt;P&gt;Your secure client users must be using SSL/TLS as SAML requires it.&lt;/P&gt;
&lt;P&gt;While you can use IPsec for remote access VPN, it is not possible when using SAML for authentication since SAML (both client to server (ASA) and server to IDP (Azure)) runs over SSL/TLS.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166675#M1115424</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-08-27T17:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166685#M1115428</link>
      <description>&lt;P&gt;Ok thats what I was worried about. I do see users initiate a SSL handshake first before moving to IPSec. I suppose I have to get ISP to block this botnet upstream of the ASA then.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166685#M1115428</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2024-08-27T17:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166689#M1115430</link>
      <description>&lt;P&gt;Yes SAML run over ssl/tls but not through asa.&lt;/P&gt;
&lt;P&gt;The SAML will done between client and Gw over ssl/tls&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/212266"&gt;@sysad43&lt;/a&gt;&amp;nbsp;I think you can disbale it.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166689#M1115430</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-27T17:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166694#M1115433</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; please see the flow in the following diagram. The redirect from the SP (ASA or FTD) and HTTP POST back from the IDP (Entra ID running in Azure in this case) both run over SSL/TLS. Disabling SSL will break that flow.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MarvinRhoads_0-1724780308931.png" style="width: 919px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/227164i249B00C70CC5471A/image-dimensions/919x442?v=v2" width="919" height="442" role="button" title="MarvinRhoads_0-1724780308931.png" alt="MarvinRhoads_0-1724780308931.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166694#M1115433</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-08-27T17:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166697#M1115436</link>
      <description>&lt;P&gt;Redirect if he use ssl anyconnect then he need http (ssl/tls) but if he use ipsec then the redirect will be encapsulate inside IPsec ikev2 tunnel&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166697#M1115436</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-27T17:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166701#M1115437</link>
      <description>&lt;P&gt;If it helps, here is our config&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;http-headers&lt;BR /&gt;hsts-server&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;hsts-client&lt;BR /&gt;enable&lt;BR /&gt;x-content-type-options&lt;BR /&gt;x-xss-protection&lt;BR /&gt;content-security-policy&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.10.01075-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect enable&lt;BR /&gt;saml idp &lt;A href="https://sts.windows.net/OURSAMLID" target="_blank"&gt;https://sts.windows.net/OURSAMLID&lt;/A&gt;&lt;BR /&gt;url sign-in &lt;A href="https://login.microsoftonline.com/OURSAMLID/saml2" target="_blank"&gt;https://login.microsoftonline.com/OURSAMLID/saml2&lt;/A&gt;&lt;BR /&gt;url sign-out &lt;A href="https://login.microsoftonline.com/OURSAMLID/saml2" target="_blank"&gt;https://login.microsoftonline.com/OURSAMLID/saml2&lt;/A&gt;&lt;BR /&gt;base-url &lt;A href="https://OURASA" target="_blank"&gt;https://OURASA&lt;/A&gt;&lt;BR /&gt;trustpoint idp AzureAD-AC-SAML2&lt;BR /&gt;no signature&lt;BR /&gt;no force re-authentication&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;keepout "Service out temporarily."&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2024 17:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166701#M1115437</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2024-08-27T17:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166960#M1115450</link>
      <description>&lt;P&gt;can you capture traffic in outside and specify&lt;BR /&gt;1- match ip host &amp;lt;public ip of clinet&amp;gt; host &amp;lt;public ip of ASA outside interface&amp;gt;&lt;BR /&gt;2- tcp port 443&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;if you detect any traffic between client and ASA then both need SSL/TLS and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; is correct it not then you can disable it.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 08:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5166960#M1115450</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-28T08:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5167248#M1115462</link>
      <description>&lt;P&gt;I will try that, but at least in syslog I do see 443 traffic initially from VPN clients. XXXX are client IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2024-08-28 11:35:03.018 Aug&lt;BR /&gt;Aug 28 2024 11:35:03: %ASA-6-302013: Built inbound TCP connection 19566647 for outside:xxxx/60362 (xxxx/60362) to identity:ASA/443 (ASA/443)2024-08-28 11:35:03.378 Aug&lt;/P&gt;&lt;P&gt;Aug 28 2024 11:35:03: %ASA-6-725001: Starting SSL handshake with client outside:xxxx/60362 to ASA/443 for TLS session&lt;BR /&gt;2024-08-28 11:35:03.378 Aug&lt;/P&gt;&lt;P&gt;Aug 28 2024 11:35:03: %ASA-6-725016: Device selects trust-point ASDM_TrustPoint7 for client outside:xxxx/60362 to ASA/443&lt;BR /&gt;2024-08-28 11:35:03.792 Aug&lt;/P&gt;&lt;P&gt;Aug 28 2024 11:35:03: %ASA-6-725002: Device completed SSL handshake with client outside:xxxx/60362 to ASA/443 for TLSv1.2 session&lt;BR /&gt;2024-08-28 11:35:03.822 Aug&lt;/P&gt;&lt;P&gt;Aug 28 2024 11:35:03: %ASA-6-725007: SSL session with client outside:xxxx/60362 to ASA/443 terminated&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 16:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5167248#M1115462</guid>
      <dc:creator>sysad43</dc:creator>
      <dc:date>2024-08-28T16:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Disabling ASA SSL but Keep Ipsec</title>
      <link>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5167249#M1115463</link>
      <description>&lt;P&gt;&lt;SPAN&gt;outside:xxxx/60362 &amp;lt;&amp;lt;- this xxxx is public IP of client if Yes then client use http directly not inside IPSec tunnel.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And hence you can not disable it&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2024 17:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-asa-ssl-but-keep-ipsec/m-p/5167249#M1115463</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-28T17:02:05Z</dc:date>
    </item>
  </channel>
</rss>

