<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956091#M155838</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You can open the ports though just take in count the security measures such as creating granular and specific rules matching only the necessary source and destinations &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Aug 2016 18:48:19 GMT</pubDate>
    <dc:creator>kvaldelo</dc:creator>
    <dc:date>2016-08-10T18:48:19Z</dc:date>
    <item>
      <title>Opening UDP Ports on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956090#M155837</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is it secure to opening the UDP ports range (50,000 - 65,000) for VOIP on the firewall from the outside for video conferencing?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Saeed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956090#M155837</guid>
      <dc:creator>Saeedullah Khan</dc:creator>
      <dc:date>2019-03-12T08:06:32Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956091#M155838</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You can open the ports though just take in count the security measures such as creating granular and specific rules matching only the necessary source and destinations &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 18:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956091#M155838</guid>
      <dc:creator>kvaldelo</dc:creator>
      <dc:date>2016-08-10T18:48:19Z</dc:date>
    </item>
    <item>
      <title>Hello Saeedullah. I have a</title>
      <link>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956092#M155839</link>
      <description>&lt;P&gt;Hello Saeedullah. I have a couple of questions for you:&lt;/P&gt;
&lt;P&gt;1. Do you have a set of outside IPs that you are looking to open this to?&lt;/P&gt;
&lt;P&gt;2. Are you looking to open these ports to an individual internal IP? Like a VCS or MCU type device&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Aug 2016 20:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956092#M155839</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-08-16T20:00:12Z</dc:date>
    </item>
    <item>
      <title>Hi Bro</title>
      <link>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956093#M155840</link>
      <description>&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;Hi Bro&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;If it's required that those wide range of UDP ports be opened, then you’ve no choice but to do it. I personally don’t like this, but I’ve been in your shoes before.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;However, I wouldn’t worry much because by default, you’ve these settings enabled in your Cisco FW;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;timeout xlate 3:00:00&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;However, it’s best that you harden your Cisco ASA FW with the other features available such as threat detection as shown below;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;threat-detection basic-threat&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;threat-detection scanning-threat shun except ip-address 10.10.173.0 255.255.255.252&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;threat-detection statistics&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;Lastly, there are other features you can enable as well such as Reverse-Path Forwarding, Multi Framework Policy i.e. class-map / policy-map for your UDP traffic etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;Good luck sir!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;&lt;SPAN style="font-family: 'Segoe UI',sans-serif;"&gt;&lt;/SPAN&gt;Please do check-out some configuration notes below;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;1. https://www.petenetlive.com/KB/Article/0001111&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 0pt; text-align: justify;"&gt;2. https://supportforums.cisco.com/discussion/11208446/port-range-forwarding-post-83-asa&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2016 06:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/opening-udp-ports-on-firewall/m-p/2956093#M155840</guid>
      <dc:creator>shunmubala</dc:creator>
      <dc:date>2016-08-17T06:17:20Z</dc:date>
    </item>
  </channel>
</rss>

