<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: block tcp ports 21/5060/2000 FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-tcp-ports-21-5060-2000-fmc/m-p/5257133#M1119353</link>
    <description>&lt;P&gt;This can be caused by the device's default ALG inspections for ftp, sccp and sip (which use the three respective ports you noted).&lt;/P&gt;
&lt;P&gt;It is not actually open ports that potentially allow traffic through the device but rather the inspection process completing the handshake in order to further inspect payload (which in this case doesn't exist).&lt;/P&gt;</description>
    <pubDate>Wed, 05 Feb 2025 13:38:02 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2025-02-05T13:38:02Z</dc:date>
    <item>
      <title>block tcp ports 21/5060/2000 FMC</title>
      <link>https://community.cisco.com/t5/network-security/block-tcp-ports-21-5060-2000-fmc/m-p/5257109#M1119349</link>
      <description>&lt;P&gt;Hi Dears,&lt;/P&gt;
&lt;P&gt;I’ve encountered an issue with &lt;STRONG&gt;FTD&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;managed via &lt;STRONG&gt;Firepower Management Center (FMC)&lt;/STRONG&gt;, running the &lt;STRONG&gt;recommended version 7.4.2&lt;/STRONG&gt;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Issue Details:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;After performing an &lt;STRONG&gt;Nmap scan&lt;/STRONG&gt; on the &lt;STRONG&gt;outside interface&lt;/STRONG&gt;, we discovered that &lt;STRONG&gt;TCP ports 21, 2000, and 5060&lt;/STRONG&gt; are showing as &lt;STRONG&gt;open&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;This behavior persists even though:
&lt;UL&gt;
&lt;LI&gt;There are &lt;STRONG&gt;no specific ACLs or NAT rules&lt;/STRONG&gt; configured to allow these ports.&lt;/LI&gt;
&lt;LI&gt;We have explicitly created rules to &lt;STRONG&gt;deny&lt;/STRONG&gt; these ports, but they still appear open in the scan.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;Additional Observations:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;This issue is &lt;STRONG&gt;only present&lt;/STRONG&gt; on FTD &amp;nbsp;managed via &lt;STRONG&gt;FMC&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;On FTD devices managed via &lt;STRONG&gt;FDM (Firepower Device Manager)&lt;/STRONG&gt;, the same Nmap scan shows these ports as &lt;STRONG&gt;closed&lt;/STRONG&gt; as expected.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 05 Feb 2025 12:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-tcp-ports-21-5060-2000-fmc/m-p/5257109#M1119349</guid>
      <dc:creator>GHOZLANE Haroun</dc:creator>
      <dc:date>2025-02-05T12:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: block tcp ports 21/5060/2000 FMC</title>
      <link>https://community.cisco.com/t5/network-security/block-tcp-ports-21-5060-2000-fmc/m-p/5257133#M1119353</link>
      <description>&lt;P&gt;This can be caused by the device's default ALG inspections for ftp, sccp and sip (which use the three respective ports you noted).&lt;/P&gt;
&lt;P&gt;It is not actually open ports that potentially allow traffic through the device but rather the inspection process completing the handshake in order to further inspect payload (which in this case doesn't exist).&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 13:38:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-tcp-ports-21-5060-2000-fmc/m-p/5257133#M1119353</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-02-05T13:38:02Z</dc:date>
    </item>
  </channel>
</rss>

