<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You are welcome, thank you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472615#M267593</link>
    <description>&lt;P&gt;You are welcome, thank you for the rates.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Apr 2014 15:37:13 GMT</pubDate>
    <dc:creator>Rudy Sanjoko</dc:creator>
    <dc:date>2014-04-16T15:37:13Z</dc:date>
    <item>
      <title>Bridged Modem and ASA with Public IP</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472606#M267584</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;I am using two public IP for my home network via Bridged Modem&lt;/P&gt;&lt;P&gt;Setup&lt;/P&gt;&lt;P&gt;Router Switch Modem&lt;/P&gt;&lt;P&gt;ASA Switch Modem&lt;/P&gt;&lt;P&gt;Both Router and ASA have public IPs and are on separate network.&lt;/P&gt;&lt;P&gt;Outside interface of ASA has no ACL to permit any traffic on port 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i connect from Network behind Router via https//ASA public IP anyconnect works fine&lt;/P&gt;&lt;P&gt;Need to know how connection on port 443 of outside interface of ASA is working without permit ACL?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472606#M267584</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T04:04:13Z</dc:date>
    </item>
    <item>
      <title>From what I understand, ACL</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472607#M267585</link>
      <description>&lt;P&gt;From what I understand, ACL on ASA outside interface is normally used to allow traffic going through the ASA, from lower to higher security level not to the ASA itself. If you try to access port 443 on a device behind the ASA, I believe it will be denied if you don't have the ACL configured.&lt;/P&gt;&lt;P&gt;The reason that you can connect to ASA on port 443 probably is because you have &lt;STRONG&gt;http&lt;/STRONG&gt; and&amp;nbsp;&lt;STRONG&gt;http server enable&lt;/STRONG&gt;&amp;nbsp;commands configured on the ASA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 15:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472607#M267585</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-14T15:14:15Z</dc:date>
    </item>
    <item>
      <title> Hi Rudy, Yes i have http</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472608#M267586</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes i have http server configured so that i can access ir from outside.&lt;/P&gt;&lt;P&gt;Also when i use VPN ipsec client i am able to connect on port TCP 10000 even though ASA outside&lt;/P&gt;&lt;P&gt;interface is not allowing anything?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 00:06:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472608#M267586</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-04-15T00:06:39Z</dc:date>
    </item>
    <item>
      <title>Hi, when you say that you are</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472609#M267587</link>
      <description>&lt;P&gt;Hi, when you say that you are able to connect on port 10000, do you mean you can connect to ASA or to a device behind ASA? And is this after you successfully connected via VPN?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 07:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472609#M267587</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-15T07:49:33Z</dc:date>
    </item>
    <item>
      <title> Hi Rudy, When i say i</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472610#M267588</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i say i connect via VPN IPSEC client i mean i connect to ASA itself not to any device&lt;/P&gt;&lt;P&gt;behind ASA.&lt;/P&gt;&lt;P&gt;Also when i do sh conn on ASA it does not show any ports used by VPN IPSEC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 12:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472610#M267588</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-04-15T12:42:31Z</dc:date>
    </item>
    <item>
      <title>If you connect using AC VPN</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472611#M267589</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;If you connect using AC VPN client, you are connecting to port 443 as AC VPN client is using SSL for connection. Here is an example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;ASA# show asp table socket&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;Protocol &amp;nbsp;Socket &amp;nbsp; &amp;nbsp;Local Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Foreign Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; State&lt;BR /&gt;---- &amp;lt;output omitted&amp;gt; ----&lt;BR /&gt;TCP &amp;nbsp; &amp;nbsp; &amp;nbsp; 00268688 &amp;nbsp;b.b.b.b:22 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;a.a.a.a:62640 &amp;nbsp; &amp;nbsp; ESTAB&lt;BR /&gt;SSL &amp;nbsp; &amp;nbsp; &amp;nbsp; 00278f48 &amp;nbsp;b.b.b.b:443 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a.a.a.a:64909 &amp;nbsp; &amp;nbsp; ESTAB&lt;BR /&gt;SSL &amp;nbsp; &amp;nbsp; &amp;nbsp; 0027e738 &amp;nbsp;b.b.b.b:443 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a.a.a.a:57641 &amp;nbsp; &amp;nbsp; ESTAB&lt;BR /&gt;SSL &amp;nbsp; &amp;nbsp; &amp;nbsp; 00285998 &amp;nbsp;b.b.b.b:443 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a.a.a.a:61188 &amp;nbsp; &amp;nbsp; ESTAB&lt;BR /&gt;SSL &amp;nbsp; &amp;nbsp; &amp;nbsp; 00291168 &amp;nbsp;b.b.b.b:443 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a.a.a.a:27885 &amp;nbsp; &amp;nbsp; ESTAB&lt;BR /&gt;SSL &amp;nbsp; &amp;nbsp; &amp;nbsp; 002a1628 &amp;nbsp;b.b.b.b:443 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; a.a.a.a:62408 &amp;nbsp; &amp;nbsp; ESTAB&lt;BR /&gt;ASA#&amp;nbsp;&lt;BR /&gt;ASA# show conn all &amp;nbsp;&lt;BR /&gt;6 in use, 224 most used&lt;BR /&gt;TCP outside a.a.a.a:64603 NP Identity Ifc b.b.b.b:443, idle 0:00:18, bytes 2958, flags UOB&lt;BR /&gt;TCP outside a.a.a.a:54098 NP Identity Ifc b.b.b.b:443, idle 0:00:30, bytes 9338, flags UOB&lt;BR /&gt;TCP outside a.a.a.a:37676 NP Identity Ifc b.b.b.b:443, idle 0:00:35, bytes 1609, flags UOB&lt;BR /&gt;TCP outside a.a.a.a:57829 NP Identity Ifc b.b.b.b:443, idle 0:00:35, bytes 1257, flags UOB&lt;BR /&gt;UDP outside a.a.a.a:23174 NP Identity Ifc b.b.b.b:4500, idle 0:01:37, bytes 453, flags -&lt;BR /&gt;TCP outside a.a.a.a:62640 NP Identity Ifc b.b.b.b:22, idle 0:00:00, bytes 59676, flags UOB&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;If you connect using old Cisco VPN client, you are connecting to port 500 as Cisco VPN client is using IPSEC for connection. Here is an example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;ASA# show conn all &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;3 in use, 224 most used&lt;BR /&gt;UDP outside a.a.a.a:15388 NP Identity Ifc b.b.b.b:4500, idle 0:00:13, bytes 2594, flags -&lt;BR /&gt;UDP outside a.a.a.a:54950 NP Identity Ifc b.b.b.b:500, idle 0:00:55, bytes 1317, flags -&lt;BR /&gt;TCP outside a.a.a.a:62640 NP Identity Ifc b.b.b.b:22, idle 0:00:00, bytes 106888, flags UOB&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Above are standard default ports for VPN clients. So you shouldn't be connected to port 10000 on ASA unless you changed the default ports value.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;HTH,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 11:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472611#M267589</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T11:13:09Z</dc:date>
    </item>
    <item>
      <title> Hi Rudy, I got the same</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472612#M267590</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got the same output as per your reply.&lt;/P&gt;&lt;P&gt;So does this proves that when we do VPN or Anyconnect to ASA itself then&lt;/P&gt;&lt;P&gt;we do not need to open VPN ports on outside interface of ASA as that traffic&lt;/P&gt;&lt;P&gt;is destined for ASA itself right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 12:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472612#M267590</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-04-16T12:26:39Z</dc:date>
    </item>
    <item>
      <title>That's partially correct. You</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472613#M267591</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;That's not correct. You do need to open the port for 443 and 500 on the ASA, otherwise AC or VPN Client will not be able to establish a connection to the ASA. But you are not opening them using ACL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;By configuring&amp;nbsp;&lt;STRONG&gt;crypto ikev1 enable&lt;/STRONG&gt;&amp;nbsp;command, you enable port 500 on ASA as IKE is using port 500 to communicate. The same as AC, you use the &lt;STRONG&gt;webvpn&amp;nbsp;&lt;/STRONG&gt;command. The different is that you can also enable port 443 using&amp;nbsp;&lt;STRONG&gt;http server enable&lt;/STRONG&gt;&amp;nbsp;command on the ASA.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Please rate helpful comments/answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 14:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472613#M267591</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T14:08:28Z</dc:date>
    </item>
    <item>
      <title> So learn something new today</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472614#M267592</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So learn something new today.&lt;/P&gt;&lt;P&gt;Thanks for answering all the posts.&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 15:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472614#M267592</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-04-16T15:32:11Z</dc:date>
    </item>
    <item>
      <title>You are welcome, thank you</title>
      <link>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472615#M267593</link>
      <description>&lt;P&gt;You are welcome, thank you for the rates.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 15:37:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bridged-modem-and-asa-with-public-ip/m-p/2472615#M267593</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T15:37:13Z</dc:date>
    </item>
  </channel>
</rss>

