<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic As I mentioned in my earlier in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455179#M267705</link>
    <description>&lt;P&gt;As I mentioned in my earlier post NTP by default uses port UDP 123.&amp;nbsp; So my question is, did the external time source instruct you to use port 9933 or is this a port you have personally chosen to use?&lt;/P&gt;&lt;P&gt;Unless the external time source has instructed you to use port 9933 then you will need to either use port 123 or translate port 123 to 9933 using PAT.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
    <pubDate>Thu, 10 Apr 2014 11:22:25 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-04-10T11:22:25Z</dc:date>
    <item>
      <title>Open a port 9933 in ASA 5505 Firewall</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455172#M267690</link>
      <description>&lt;DIV class="blog-body" itemprop="text"&gt;&lt;DIV class="field field-name-body field-type-text-with-summary field-label-hidden"&gt;&lt;DIV class="field-items"&gt;&lt;DIV class="field-item even"&gt;&lt;P&gt;Hi. I have Cisco ASDM 6.1 For an ASA 5505 &amp;nbsp;.&amp;nbsp;&amp;nbsp;I would just like to to open TCP/UDP port 9933 in the ASA 5505 Firewall so that our Primary Domain Controller could use this port to sync time with an external time source. We have already added an access rule for this port under the firewall configuration in ASDM 6.1 and this port was also allowed in the inbound and outbound rule of the Firewall but it seems that it was still blocked. Is there something else we are missing with the configuration?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any help appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Shameem&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:03:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455172#M267690</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2019-03-12T04:03:18Z</dc:date>
    </item>
    <item>
      <title>Do you have a network address</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455173#M267692</link>
      <description>&lt;P&gt;Do you have a network address translation (NAT) rule in place? If you could share your running configuration, it would be easier to look at that.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2014 17:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455173#M267692</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-04-09T17:56:31Z</dc:date>
    </item>
    <item>
      <title> Hi Mavin,Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455174#M267696</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Hi Mavin,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Thank you for the answer . yes i have network address translate(NAT) rules.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;SPAN style="font-size: 14.545454025268555px; background-color: rgb(247, 247, 247);"&gt;The configuration would look something like the following:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;ASA Version 8.0(4)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;terminal width 511&lt;BR /&gt;hostname asa5505&lt;BR /&gt;................&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.0.0.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 208.109.126.196 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone IST 5 30&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;......................&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ftp-data&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ftp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq ssh&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 42&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any any eq nameserver&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq domain&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any any eq domain&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq www&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq pop3&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq https&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 465&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 587&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 995&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 993&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 3389&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 8443&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2006&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 8447&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 9999&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2086&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2087&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2082&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2083&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2096&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 2095&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 8880&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq telnet&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq smtp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny tcp any any eq imap4&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 1433&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny tcp any any eq 3306&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 9080&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny tcp any any eq 9090&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any source-quench&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any unreachable&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any time-exceeded&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 8080&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any any eq 8080&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any any eq www&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any any eq 9933&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any any eq 9933&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any any eq 9933&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit tcp any any eq www&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit udp any any&amp;nbsp;&lt;BR /&gt;no pager&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered warnings&lt;BR /&gt;logging history warnings&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;logging queue 500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-613.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;static (inside,outside) 208.109.123.62 10.0.0.1 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 208.109.123.105 10.0.0.2 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (outside,outside) 10.0.0.2 208.109.123.105 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (outside,inside) 10.0.0.1 208.109.123.62 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 208.109.123.254 1&lt;BR /&gt;route outside 0.0.0.0 255.255.255.0 208.109.123.254 1&lt;BR /&gt;route outside 208.109.96.4 255.255.255.255 208.109.123.254 1&lt;BR /&gt;route outside 208.109.188.4 255.255.255.255 208.109.123.254 1&lt;BR /&gt;route outside 216.69.160.4 255.255.255.255 208.109.123.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.0.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access outside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username trueformgames password gQaHEpCaaJ92JBB1 encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;.................&lt;BR /&gt;: end&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;Shameem&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 05:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455174#M267696</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2014-04-10T05:46:02Z</dc:date>
    </item>
    <item>
      <title>Which IP represents you</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455175#M267699</link>
      <description>&lt;P&gt;Which IP represents you domain controller in your configuration?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 08:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455175#M267699</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-10T08:11:33Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455176#M267702</link>
      <description>&lt;P style="font-size: 14.545454025268555px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Hi Marius,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.545454025268555px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Thank you for the answer. I am using 208.109.123.62 for the configuration .&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.545454025268555px;"&gt;&lt;FONT face="courier new, courier, monospace"&gt;Regards,&lt;/FONT&gt;&lt;/P&gt;&lt;P style="font-size: 14.545454025268555px;"&gt;&lt;FONT face="courier new, courier, monospace"&gt;Shameem&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 08:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455176#M267702</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2014-04-10T08:18:42Z</dc:date>
    </item>
    <item>
      <title>"static (inside,outside) 208</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455177#M267703</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace"&gt;"static (inside,outside) 208.109.123.62 10.0.0.1 netmask 255.255.255.255&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;Well you are NATing all ports to 10.0.0.1 as per the above statement.&lt;/P&gt;&lt;P&gt;Now, is 9933 a port you have chosen to use on your internal network or is that what the external time source has instructed you to use?&amp;nbsp; I ask this because normally NTP uses port UDP 123 to communicate over.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 08:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455177#M267703</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-10T08:27:40Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Thank you for the</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455178#M267704</link>
      <description>&lt;P style="font-size: 14.545454025268555px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Hi Marius,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new, courier, monospace"&gt;&lt;SPAN style="font-size: 14.545454025268555px;"&gt;Thank you for the answer.I am access&amp;nbsp;outside&amp;nbsp;this Ip and Its working and every Ports are working But 9933 is not working.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new, courier, monospace"&gt;&lt;SPAN style="font-size: 14.545454025268555px;"&gt;Regards,&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new, courier, monospace"&gt;&lt;SPAN style="font-size: 14.545454025268555px;"&gt;Shameem&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 11:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455178#M267704</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2014-04-10T11:11:25Z</dc:date>
    </item>
    <item>
      <title>As I mentioned in my earlier</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455179#M267705</link>
      <description>&lt;P&gt;As I mentioned in my earlier post NTP by default uses port UDP 123.&amp;nbsp; So my question is, did the external time source instruct you to use port 9933 or is this a port you have personally chosen to use?&lt;/P&gt;&lt;P&gt;Unless the external time source has instructed you to use port 9933 then you will need to either use port 123 or translate port 123 to 9933 using PAT.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 11:22:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455179#M267705</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-10T11:22:25Z</dc:date>
    </item>
    <item>
      <title> Hi Marius,Thank you for</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455180#M267706</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Thank you for response. I am not using port 9933 from outside. Its not working via telnet(208.x.x.x 9933) . i have required this Port 9933 for establish a TCP/UDP connection to a remote host.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Shameem&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 12:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455180#M267706</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2014-04-10T12:34:13Z</dc:date>
    </item>
    <item>
      <title>If you do a packet trace on</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455181#M267710</link>
      <description>&lt;P&gt;If you do a packet trace on the ASA is the packet allowed?&amp;nbsp; Could you post the output here please.&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 9933 208.109.123.62 9933&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to rate and select a correct answer&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2014 15:59:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455181#M267710</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-10T15:59:47Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Thank you for</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455182#M267712</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Thank you for response. I am sending Packet - tracer input outside TCP 4.2.2.2 9933 208.109.123.62 9933 and 10.0.0.1 9933 208.109.123.62 9933.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Shameem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 05:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455182#M267712</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2014-04-11T05:16:33Z</dc:date>
    </item>
    <item>
      <title>Please issue the following</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455183#M267713</link>
      <description>&lt;P&gt;Please issue the following packet tracer:&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 9933 10.0.0.1 9933&lt;/P&gt;&lt;P&gt;as well as&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.0.0.1 9933 4.2.2.2 9933&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 05:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455183#M267713</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-11T05:44:50Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Thank you for</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455184#M267714</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Thank you for response . i am sending packet- tracer input inside tcp 10.0.0.1 9933 4.2.2.2 9933.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Shameem&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 11:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455184#M267714</guid>
      <dc:creator>shameem05</dc:creator>
      <dc:date>2014-04-11T11:14:10Z</dc:date>
    </item>
    <item>
      <title>Hi,The reason I asked you to</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455185#M267715</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The reason I asked you to run the following trace again with different destination IP:&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 9933 10.0.0.1 9933&lt;/P&gt;&lt;P&gt;is because the first trace you posted showed the input and output interface to be the outside interface.&amp;nbsp; I wanted to see what the result of that command would show.&lt;/P&gt;&lt;P&gt;But as for the inside to outside, the traffic is permitted.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 14:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455185#M267715</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-11T14:49:54Z</dc:date>
    </item>
    <item>
      <title>Hi Shameem,Hope you are doing</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455186#M267716</link>
      <description>&lt;P&gt;Hi Shameem,&lt;/P&gt;&lt;P&gt;Hope you are doing great.&lt;/P&gt;&lt;P&gt;Please check if you have access list in place on Windows Server Firewall to allow Inbound connection for TCP port 9933 check both directions Inbound and Outbound rules.&lt;/P&gt;&lt;P&gt;Also, if you are using some application which is using non standard ports like TCP 9933 and if you already have running application on Server which is using port TCP 9933 and if option bind with 10.0.0.1 as ARP on ASA will be for IP 10.0.0.1.&lt;/P&gt;&lt;P&gt;For tshoot on Server run netstat -ap tcp to take print for list of system TCP port listening. Confirm if you have socket like: TCP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.1:9933&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Listening&lt;/P&gt;&lt;P&gt;Then try to telnet on &lt;SPAN style="font-family:'courier new', courier, monospace"&gt;208.109.123.62 9933 from internet to test and share how it goes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sahil Seth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Apr 2014 14:49:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-9933-in-asa-5505-firewall/m-p/2455186#M267716</guid>
      <dc:creator>sahilseth88</dc:creator>
      <dc:date>2014-04-18T14:49:17Z</dc:date>
    </item>
  </channel>
</rss>

