<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The server is inside the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2500999#M236189</link>
    <description>&lt;P&gt;The server is inside the firewall?&lt;/P&gt;&lt;P&gt;If so, connections initiated from the outside should only be allowed according to the access-list you have on the outside interface.&lt;/P&gt;&lt;P&gt;You can always capture traffic on an ASA firewall to see exactly what's being transmitted and received. From ASDM, use "Wizards &amp;gt; Packet capture wizard' and follow the prompts.&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jul 2014 02:45:29 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-07-25T02:45:29Z</dc:date>
    <item>
      <title>ASA-Port Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2500998#M236188</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I've got internal devices connecting back to one particular server using a strange port. I rebooted the server and now there all connecting to a different port still using a strange protocol.&lt;/P&gt;&lt;P&gt;Is there a way to look on the firewall to see if the server is talking to an outside IP address using that same port? &amp;nbsp;I apologize if I didn't frame the question very good.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2500998#M236188</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2019-03-12T04:32:14Z</dc:date>
    </item>
    <item>
      <title>The server is inside the</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2500999#M236189</link>
      <description>&lt;P&gt;The server is inside the firewall?&lt;/P&gt;&lt;P&gt;If so, connections initiated from the outside should only be allowed according to the access-list you have on the outside interface.&lt;/P&gt;&lt;P&gt;You can always capture traffic on an ASA firewall to see exactly what's being transmitted and received. From ASDM, use "Wizards &amp;gt; Packet capture wizard' and follow the prompts.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 02:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2500999#M236189</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-07-25T02:45:29Z</dc:date>
    </item>
    <item>
      <title>Hi,You can use 'show local</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2501000#M236190</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can use 'show local-host &amp;lt;server-ip&amp;gt; detail' command.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 04:15:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2501000#M236190</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2014-07-25T04:15:14Z</dc:date>
    </item>
    <item>
      <title>Hi, Sh conn | in &lt;Server IP&gt;</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2501001#M236191</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sh conn | in &amp;lt;Server IP&amp;gt; to check if there are any current active connections running for that specific server.... Also this gives you the port information as well.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to capture the traffic for certain timelines then you may use capture.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list capture extended permit ip host &amp;lt;server ip&amp;gt; any&lt;/P&gt;&lt;P&gt;FW# capture test access-list capture buffer 2048 interface &amp;lt;inside&amp;gt; trace detail&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;leave for certain period say 30 mins or something&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;then check&lt;/P&gt;&lt;P&gt;FW#show capture test&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example output:&lt;/P&gt;&lt;P&gt;ASA1# show capture test&lt;/P&gt;&lt;P&gt;15 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 09:59:45.405389 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 09:59:45.529315 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 09:59:45.564179 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 09:59:45.585266 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 09:59:45.628354 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 09:59:45.654140 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 09:59:45.712304 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 09:59:45.756293 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 09:59:45.852418 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 10: 09:59:46.297225 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 11: 09:59:46.335218 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 12: 09:59:46.357205 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 13: 09:59:46.385203 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 14: 09:59:46.419198 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;&amp;nbsp; 15: 09:59:46.455970 192.168.1.10 &amp;gt; 192.168.2.10: icmp: echo reply&lt;BR /&gt;15 packets shown&lt;BR /&gt;ASA1#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 10:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2501001#M236191</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-25T10:03:58Z</dc:date>
    </item>
    <item>
      <title>Thanks  for the tips.  I've</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2501002#M236192</link>
      <description>&lt;P&gt;Thanks &amp;nbsp;for the tips.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've ran this command and it's a big help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Derek&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2014 12:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-question/m-p/2501002#M236192</guid>
      <dc:creator>dcanady55</dc:creator>
      <dc:date>2014-07-25T12:13:01Z</dc:date>
    </item>
  </channel>
</rss>

