<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynamic ports in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432452#M270363</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for writing.&amp;nbsp; Sorry for leaving out details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server team originally asked for ten ports: 50000 50010.&amp;nbsp; The tcp rule specifying any host to &lt;SERVER ip=""&gt; over that range never incremented the hit count.&lt;/SERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that 16 thousand ports are open to any host, the traffic is flowing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The senior network guys (i'm a junior net admin) don't seem to have a problem with the rule.&amp;nbsp; I think you and I see it similarly: anyone can connect and that doesn't make security sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I think you've answered my question: I need to push for a single ip.&amp;nbsp; Heck, maybe we just narrow it to the ISP range of our user!&amp;nbsp; Even THAT's better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Feb 2014 15:41:35 GMT</pubDate>
    <dc:creator>Bob Greer</dc:creator>
    <dc:date>2014-02-04T15:41:35Z</dc:date>
    <item>
      <title>Dynamic ports</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432450#M270361</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reading!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an outside user who's been impacted by an improper deploy of SFTP.&amp;nbsp; The workaround allowing them to connect is this rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;access-list outside_access_in_1 extended permit tcp any host &amp;lt;my server's outside ip&amp;gt; range 49000 65535&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I entered an FTP rule opening ports 50000 50010 (according to documentation) but no success.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a "dynamic ports" type of rule which would allow me to open fewer than the 16535 ports?&amp;nbsp; The incoming FTP connection has generates a dynamic port &amp;lt;50000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd like to furhter close the hole by naming the protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for reading!&lt;BR /&gt;Bob&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432450#M270361</guid>
      <dc:creator>Bob Greer</dc:creator>
      <dc:date>2019-03-12T03:39:55Z</dc:date>
    </item>
    <item>
      <title>Dynamic ports</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432451#M270362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the ACE&amp;nbsp; you defined, the range is from 49000 - 65535, but later in your question you mention less than 50,000.&amp;nbsp; I'm a little confused by what you are asking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if you are hosting the server, then the client should be connecting to your server's IP on port 22, and sourced from some dynamic port.&amp;nbsp; Therefore, the ACL should be something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list outside permit tcp any host &lt;SERVER_IP&gt; eq 22&lt;/SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, what your ACL says, is that anyone can connect to your server on ports from 49000 to 65535.&amp;nbsp; Which doesn't make sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, if the client used source ports &amp;lt;50000, and your server was hosting SFTP on port 22, then you could write an ACL such as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list outside permit tcp host &lt;CLIENT_IP&gt; lt 50000 host &lt;SERVER_IP&gt; eq 22&lt;/SERVER_IP&gt;&lt;/CLIENT_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which would be about as locked down as you could get it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 02:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432451#M270362</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-04T02:18:12Z</dc:date>
    </item>
    <item>
      <title>Dynamic ports</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432452#M270363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for writing.&amp;nbsp; Sorry for leaving out details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server team originally asked for ten ports: 50000 50010.&amp;nbsp; The tcp rule specifying any host to &lt;SERVER ip=""&gt; over that range never incremented the hit count.&lt;/SERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that 16 thousand ports are open to any host, the traffic is flowing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The senior network guys (i'm a junior net admin) don't seem to have a problem with the rule.&amp;nbsp; I think you and I see it similarly: anyone can connect and that doesn't make security sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I think you've answered my question: I need to push for a single ip.&amp;nbsp; Heck, maybe we just narrow it to the ISP range of our user!&amp;nbsp; Even THAT's better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 15:41:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432452#M270363</guid>
      <dc:creator>Bob Greer</dc:creator>
      <dc:date>2014-02-04T15:41:35Z</dc:date>
    </item>
    <item>
      <title>Dynamic ports</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432453#M270366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bob,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I find it highly odd that the clients would need to *connect* to a possible 16k ports!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The narrower you can make the hole, the more secure you are.&amp;nbsp; So, if you can reduce the number of ports open and reduce the client IPs which can access the server, both improve the security of the policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can look at your syslogs to see who is connecting to the server, and on what IPs/ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 18:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-ports/m-p/2432453#M270366</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-04T18:28:23Z</dc:date>
    </item>
  </channel>
</rss>

