<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need Help on Port Blocking in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275987#M345983</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have not given any configurations to reference or mentioned at all the ports that were open in the scanner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would need a bit more information to go on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Jul 2013 12:11:55 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-23T12:11:55Z</dc:date>
    <item>
      <title>Need Help on Port Blocking in ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275986#M345979</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured firewall and allow only &lt;STRONG&gt;port 443&lt;/STRONG&gt; and deny all tcp ports for destination, but when i am scanning from port scanner it shows several tcp ports are enabled.. need your seuggestion and help on it.. how to block these tcp ports..&lt;/P&gt;&lt;P&gt;Early response is required..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275986#M345979</guid>
      <dc:creator>engrhaiderabbas</dc:creator>
      <dc:date>2019-03-12T02:15:48Z</dc:date>
    </item>
    <item>
      <title>Need Help on Port Blocking in ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275987#M345983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have not given any configurations to reference or mentioned at all the ports that were open in the scanner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would need a bit more information to go on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 12:11:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275987#M345983</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-23T12:11:55Z</dc:date>
    </item>
    <item>
      <title>Need Help on Port Blocking in ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275988#M345986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below is the configuration..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list extended permit tcp any host ip eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list extended deny ip any any&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 12:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275988#M345986</guid>
      <dc:creator>engrhaiderabbas</dc:creator>
      <dc:date>2013-07-23T12:25:26Z</dc:date>
    </item>
    <item>
      <title>Need Help on Port Blocking in ASA</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275989#M345988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still don't know the ports that were supposedly open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though if that is the ACL you have bound to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface on the ASA then it should be blocking the connections through the ASA for everything else other than the TCP/443 for a single destination IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then there is naturally the ASAs own services and ports on which its listening on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check that with the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show asp table socket&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most likely the ports that are open on the ASA are the ones used for management purposes perhaps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those set with the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;telnet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also have the option to create an ACL that blocks all traffic to the ASA &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address. You can then attach it with &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group &lt;ACL name=""&gt; in interface outside control-plane&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would limit the "To the Box" traffic. Though the above mentioned management commands &lt;STRONG&gt;"telnet", "ssh"&lt;/STRONG&gt; and &lt;STRONG&gt;"http"&lt;/STRONG&gt; would still override this ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jul 2013 12:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-port-blocking-in-asa/m-p/2275989#M345988</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-23T12:33:17Z</dc:date>
    </item>
  </channel>
</rss>

