<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking certain port on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336537#M343789</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only have one ACL per INTERNET per DIRECTION&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you already have an ACL configured/attached with an &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command and attached to the &lt;STRONG&gt;"in"&lt;/STRONG&gt; direction then you are probably already blocking this port to any hosts that have Static NAT configured since the WAN interface ACLs are usually configured so that you only allow the services that you need and rest of the traffic is blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; That is, unless you have permitted all TCP ports with either &lt;STRONG&gt;"permit tcp"&lt;/STRONG&gt; or &lt;STRONG&gt;"permit ip"&lt;/STRONG&gt; commands. In this case you should add the mentioned &lt;STRONG&gt;"deny tcp"&lt;/STRONG&gt; statement to the top of the ACL currently attached to your ASA WAN interface with the&lt;STRONG&gt; "line"&lt;/STRONG&gt; parameter in the ACL command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;OUTSIDE acl="" name=""&gt; line 1 remark Block destination port TCP/60595&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;OUTSIDE acl="" name=""&gt; line 2 deny tcp any any eq 60595&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also confirm if its being blocked with &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;OUTSIDE interface="" name=""&gt; tcp 1.1.1.1 12345 &lt;STATIC nat="" public="" ip=""&gt; 60595&lt;/STATIC&gt;&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Aug 2013 09:44:28 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-08-29T09:44:28Z</dc:date>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336536#M343786</link>
      <description>&lt;P&gt;Good day everybody!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ASA 5510 v8.3. Now I am under attack by botnet on port 60595. I ordered ASA Botnet Traffic Filter Feature, but it comes in 2 weeks only. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment, I need to block certain port (60595) on outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which commands should I apply to external (outside) interface of my ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it something like...:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list antibotnet deny tcp any any eq 60595&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list antibotnet allow TCP any any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group antibotnet in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it seems to me, that applying this rules will allow all traffic except port 60595... =((((&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be, I should add this rule "&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;access-list **** deny tcp any any eq 60595&lt;/STRONG&gt;" to any of existing ACLs, applied to ouside?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Please, help me!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Many thanks in advance!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336536#M343786</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2019-03-12T02:32:06Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336537#M343789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only have one ACL per INTERNET per DIRECTION&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you already have an ACL configured/attached with an &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command and attached to the &lt;STRONG&gt;"in"&lt;/STRONG&gt; direction then you are probably already blocking this port to any hosts that have Static NAT configured since the WAN interface ACLs are usually configured so that you only allow the services that you need and rest of the traffic is blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; That is, unless you have permitted all TCP ports with either &lt;STRONG&gt;"permit tcp"&lt;/STRONG&gt; or &lt;STRONG&gt;"permit ip"&lt;/STRONG&gt; commands. In this case you should add the mentioned &lt;STRONG&gt;"deny tcp"&lt;/STRONG&gt; statement to the top of the ACL currently attached to your ASA WAN interface with the&lt;STRONG&gt; "line"&lt;/STRONG&gt; parameter in the ACL command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;OUTSIDE acl="" name=""&gt; line 1 remark Block destination port TCP/60595&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;OUTSIDE acl="" name=""&gt; line 2 deny tcp any any eq 60595&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also confirm if its being blocked with &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;OUTSIDE interface="" name=""&gt; tcp 1.1.1.1 12345 &lt;STATIC nat="" public="" ip=""&gt; 60595&lt;/STATIC&gt;&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 09:44:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336537#M343789</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T09:44:28Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336538#M343792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, many thanks to you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will these commands &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list &lt;OUTSIDE acl="" name=""&gt; line 1 remark Block destination port TCP/60595&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list &lt;OUTSIDE acl="" name=""&gt; line 2 deny tcp any any eq 60595&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;replace my existing two lines? Or it will be saved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it be also accomplished with web-interface of ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If something goes wrong, may I manually reset ASA or execute a &lt;STRONG&gt;reload&lt;/STRONG&gt; command? Without doing &lt;STRONG&gt;write mem&lt;/STRONG&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 10:58:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336538#M343792</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2013-08-29T10:58:52Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336539#M343795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember ofcourse that you need to replace the &lt;OUTSIDE acl="" name=""&gt; with the ACLs name you have configured on your firewall.&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above will enter those lines to the existing ACL. The ACL lines currently in those lines will not be removed. They will just be moved down in the order of ACL rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you dont save the configuration a reboot would result in returning the last saved startup configuration. Easier way would be just to remove those lines that were configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 11:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336539#M343795</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T11:12:53Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336540#M343798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do you think, in my ASA 5510 ver 8.3 if I simply execute &lt;/P&gt;&lt;PRE style="color: #790029; font-family: 'Andale Mono', 'Courier New', Courier, monospace; background-color: #ffffff;"&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip audit attack action reset&lt;/SPAN&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;command - wouldn't it prevent current botnet attack?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 11:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336540#M343798</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2013-08-29T11:38:00Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336541#M343801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the ACL is blocking all the traffic needed then the connection attempts will either dropped or dropped and resetted by the firewall depending on the settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine your current settings could be determined with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run all service&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to the possible configuration settings you will see with the above&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/command-reference/s1.html#wp1452931"&gt;http://www.cisco.com/en/US/docs/security/asa/command-reference/s1.html#wp1452931&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the command you mention, here is the Configuration Guide section for it&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_tools.html#wp1056358"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/protect_tools.html#wp1056358&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine that if something matches the ASA signatures it would take the action specified in your above command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We handle IPS/IDS with different equipment which I dont personally manage so I have very little expirience with them (though I will have to eventually learn them &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336541#M343801</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T12:04:56Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336542#M343803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ip audit probably won't have any positive effect in your situation. The build-in signatures mainly match on outdated threats and some basic atacks. Even in official Cisco trainings they are mot mentioned any more.&lt;/P&gt;&lt;P&gt;And I assume that also the Botnet-traffic-filter won't work in your situation. That system is not ment to protect you from a botnet that is attacking you. The purpose is to limit the communication with the botnet for clients that are infected and with this to make sure that you are not participating in a botnet yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A dedicated (Cisco)-IPS could help based on the reputation system. If the hosts attacking you have a bad score the IPS could drop the traffic immediately. But for that you would need a dedicated appliance or an AIP-SSM in your ASA together with the proper licensing and subscription.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336542#M343803</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-08-29T12:18:04Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336543#M343804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry, but output from this command is very large - what exactly should tell me whether port 60595 is open?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inet-gw# packet-tracer input internet tcp 1.1.1.1 12456 37.77.133.242 60595&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;in&amp;nbsp;&amp;nbsp; 37.77.133.242&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: input&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ACCESS-LIST&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implicit Rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;input-interface: Internet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;output-interface: NP Identity Ifc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My output from access-list command is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inet-gw# show access-list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list default; 1 elements; name hash: 0xab7c92cd&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list default line 1 extended permit ip any any (hitcnt=78823019) 0xa4b61d1a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access; 9 elements; name hash: 0xee117655&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 1 extended permit tcp any host 192.168.115.129 eq echo (hitcnt=0) 0x8dd39078&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 2 extended permit ip host 93.189.150.162 host 192.168.100.5 (hitcnt=2545) 0xda5702de&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 3 extended deny tcp any host 192.168.100.5 eq 8080 (hitcnt=121) 0xb7157de9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 4 extended deny tcp any host 192.168.100.5 eq 3306 (hitcnt=24) 0xe3523179&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 5 extended deny tcp any host 192.168.100.5 eq www (hitcnt=2039) 0x853ba124&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 6 extended deny tcp any host 192.168.100.5 eq ssh (hitcnt=61) 0xb5c2764a&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 7 extended permit ip any host 192.168.100.22 (hitcnt=1760) 0x9528e39f&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 8 extended permit ip any object NAT-EMTS 0x11873501&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 8 extended permit ip any 192.168.96.0 255.255.224.0 (hitcnt=21785204) 0x11873501&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 9 extended permit ip any object NAT-Internet 0x8275f9b1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access line 9 extended permit ip any 192.168.96.0 255.255.224.0 (hitcnt=0) 0x8275f9b1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VPN-remote; 1 elements; name hash: 0xdf750072&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VPN-remote line 1 standard permit 192.168.96.0 255.255.224.0 (hitcnt=0) 0x30c28b82&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inet-gw#&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336543#M343804</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2013-08-29T12:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336544#M343806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only have the public IP address of your ASAs &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface and you dont have any Static PAT configuration for the port TCP/60595 then the traffic is already dropped because there is no matching NAT configuration on the firewall and the ACL doesnt even come to the picture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had a NAT configuration that would match the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands destination IP address and port then you would be seeing a &lt;STRONG&gt;"UN-NAT"&lt;/STRONG&gt; Phase in the output. Since we dont see it you dont have any NAT configuration that would even enabled this connection to cross the firewall from &lt;STRONG&gt;"outside" &lt;/STRONG&gt;to &lt;STRONG&gt;"inside"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally we have not yet seen your configurations or the actual information that you have used to determine what to block on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336544#M343806</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T12:29:07Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336545#M343809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it enough to execute &lt;STRONG&gt;show nat &lt;/STRONG&gt;to get the configuration?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336545#M343809</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2013-08-29T12:37:01Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336546#M343810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output already seems to show that there is no NAT configuration on your firewall which would enable a external host to connect to some device behind the firewall with the destination IP of your "outside" interface and with the destination port TCP/60595&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command &lt;STRONG&gt;"show nat detail"&lt;/STRONG&gt; would give detailed information of the NAT configurations on the firewall BUT as I said, the above already seems to indicate that there are no NAT configurations matching the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I am not sure if we are even looking at the right thing as I am not sure how you have defined that the port TCP/60595 should be blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you perhaps seeing some Syslog messages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336546#M343810</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T12:43:14Z</dc:date>
    </item>
    <item>
      <title>Blocking certain port on ASA</title>
      <link>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336547#M343811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your help!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that it is my inside traffic to external hosts on port 60565... =(( So, infested PCs are inside my LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i try to identify them...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!!! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 12:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-certain-port-on-asa/m-p/2336547#M343811</guid>
      <dc:creator>Ilya Semenov</dc:creator>
      <dc:date>2013-08-29T12:50:13Z</dc:date>
    </item>
  </channel>
</rss>

