<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Open port in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-port/m-p/2140827#M358158</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Jouni said, you don't have to open anything if we're talking about traffic, going through vpn-connection, as long as your configuration doesn't include &lt;EM&gt;&lt;STRONG&gt;no&lt;/STRONG&gt; sysopt connection permit-vpn&lt;/EM&gt;. By default, all vpn-traffic is allowed throug and not matched against interfaces ACLs. &lt;/P&gt;&lt;P&gt;To controll traffic through the vpn-tunnel you've got two options:&lt;/P&gt;&lt;P&gt;-enter &lt;EM&gt;no sysopt connection permit-vpn&lt;/EM&gt; - interface acl will be used to filter vpn-traffic;&lt;/P&gt;&lt;P&gt;-apply &lt;EM&gt;vpn-filter&lt;/EM&gt; to the group-policy, used for connecting endpoints.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Apr 2013 21:18:23 GMT</pubDate>
    <dc:creator>Andrew Phirsov</dc:creator>
    <dc:date>2013-04-15T21:18:23Z</dc:date>
    <item>
      <title>Open port</title>
      <link>https://community.cisco.com/t5/network-security/open-port/m-p/2140824#M358153</link>
      <description>&lt;P&gt;I need to open a specified port on an ASA 5520 8.2 which will allow 2 ip addresses&amp;nbsp; access to databases over a vpn?...pleae advise, thx!!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port/m-p/2140824#M358153</guid>
      <dc:creator>cortney dash</dc:creator>
      <dc:date>2019-03-12T01:28:42Z</dc:date>
    </item>
    <item>
      <title>Open port</title>
      <link>https://community.cisco.com/t5/network-security/open-port/m-p/2140825#M358154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At its default setting ASA allows all traffic to bypass interface ACLs / Access Lists for connections that are coming through VPN connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though in your case its really hard to say with such little information to go by.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 20:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port/m-p/2140825#M358154</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-15T20:22:53Z</dc:date>
    </item>
    <item>
      <title>Open port</title>
      <link>https://community.cisco.com/t5/network-security/open-port/m-p/2140826#M358155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; how can this be done manually?....I don't have a lot of information but what could I add that would assist i nthe prognosis?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 21:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port/m-p/2140826#M358155</guid>
      <dc:creator>cortney dash</dc:creator>
      <dc:date>2013-04-15T21:07:09Z</dc:date>
    </item>
    <item>
      <title>Open port</title>
      <link>https://community.cisco.com/t5/network-security/open-port/m-p/2140827#M358158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As Jouni said, you don't have to open anything if we're talking about traffic, going through vpn-connection, as long as your configuration doesn't include &lt;EM&gt;&lt;STRONG&gt;no&lt;/STRONG&gt; sysopt connection permit-vpn&lt;/EM&gt;. By default, all vpn-traffic is allowed throug and not matched against interfaces ACLs. &lt;/P&gt;&lt;P&gt;To controll traffic through the vpn-tunnel you've got two options:&lt;/P&gt;&lt;P&gt;-enter &lt;EM&gt;no sysopt connection permit-vpn&lt;/EM&gt; - interface acl will be used to filter vpn-traffic;&lt;/P&gt;&lt;P&gt;-apply &lt;EM&gt;vpn-filter&lt;/EM&gt; to the group-policy, used for connecting endpoints.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 21:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port/m-p/2140827#M358158</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-04-15T21:18:23Z</dc:date>
    </item>
    <item>
      <title>Open port</title>
      <link>https://community.cisco.com/t5/network-security/open-port/m-p/2140828#M358160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I think I am just explaining it incorrectly which is my fault and I apologize!!....&lt;/P&gt;&lt;P&gt;the instructions given to me are as follows: &lt;/P&gt;&lt;P&gt;request port 7799 be opened for 192.X.X.X and 172.X.X.X used to access databases on tblshp3 over the VPN for JLG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 21:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-port/m-p/2140828#M358160</guid>
      <dc:creator>cortney dash</dc:creator>
      <dc:date>2013-04-15T21:46:37Z</dc:date>
    </item>
  </channel>
</rss>

