<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need help with firewall rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-with-firewall-rule/m-p/3868559#M28218</link>
    <description>&lt;P class="rz6fp9-10 himKiy"&gt;Hello&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;We have a couple of servers that need to communicate with each other over a site-to-site VPN connection. We've allowed the port required for the application to work (tcp/8443) but we can also see from Wireshark that they are sending Application Data over TLSv1.2. If we open up the firewall rule to allow all IP traffic then communication between the servers works fin. I also tried adding port 443 in case TLS runs over that instead of 8443 but no luck. Any ideas? We are using Cisco ASAs on both sides of the S2S tunnel.&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jun 2019 01:25:56 GMT</pubDate>
    <dc:creator>aok</dc:creator>
    <dc:date>2019-06-06T01:25:56Z</dc:date>
    <item>
      <title>Need help with firewall rule</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-firewall-rule/m-p/3868559#M28218</link>
      <description>&lt;P class="rz6fp9-10 himKiy"&gt;Hello&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;We have a couple of servers that need to communicate with each other over a site-to-site VPN connection. We've allowed the port required for the application to work (tcp/8443) but we can also see from Wireshark that they are sending Application Data over TLSv1.2. If we open up the firewall rule to allow all IP traffic then communication between the servers works fin. I also tried adding port 443 in case TLS runs over that instead of 8443 but no luck. Any ideas? We are using Cisco ASAs on both sides of the S2S tunnel.&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="rz6fp9-10 himKiy"&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 01:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-firewall-rule/m-p/3868559#M28218</guid>
      <dc:creator>aok</dc:creator>
      <dc:date>2019-06-06T01:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with firewall rule</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-firewall-rule/m-p/3868634#M28219</link>
      <description>&lt;P&gt;Can you post the current configuration, version ASA running on both side.&lt;/P&gt;
&lt;P&gt;when you intiate the connection, what is the logs in ASA on the destination side ? also from Source side ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2019 06:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-firewall-rule/m-p/3868634#M28219</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-06-06T06:55:56Z</dc:date>
    </item>
  </channel>
</rss>

