<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic UDP 2000 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/udp-2000/m-p/1590730#M591205</link>
    <description>&lt;P&gt;I have an interesting issue. The server guys use IBM's RSA card to remotely manage servers, install OS, etc. The interesting part is that the port requires UDP/TCP 2000, but it does not work and I don't see any drops in the logs. If they are on the same subnet that the servers are on, it works fine. If they change the port from 2000 to 5090 on the server everything works fine. One of the server guys told me that the port 2000 is sending some kind of telephony traffic, he could not explain it any better and it is being dropped by the firewalls because of the type of traffic. I thought that if the firewall drops any traffic and the logging is enabled it will show up in the log. We have a few ASA5550/5580 pairs and a PIX535 pair. Did anyone see this before?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:53:46 GMT</pubDate>
    <dc:creator>balla-zoltan</dc:creator>
    <dc:date>2019-03-11T19:53:46Z</dc:date>
    <item>
      <title>UDP 2000</title>
      <link>https://community.cisco.com/t5/network-security/udp-2000/m-p/1590730#M591205</link>
      <description>&lt;P&gt;I have an interesting issue. The server guys use IBM's RSA card to remotely manage servers, install OS, etc. The interesting part is that the port requires UDP/TCP 2000, but it does not work and I don't see any drops in the logs. If they are on the same subnet that the servers are on, it works fine. If they change the port from 2000 to 5090 on the server everything works fine. One of the server guys told me that the port 2000 is sending some kind of telephony traffic, he could not explain it any better and it is being dropped by the firewalls because of the type of traffic. I thought that if the firewall drops any traffic and the logging is enabled it will show up in the log. We have a few ASA5550/5580 pairs and a PIX535 pair. Did anyone see this before?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-2000/m-p/1590730#M591205</guid>
      <dc:creator>balla-zoltan</dc:creator>
      <dc:date>2019-03-11T19:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: UDP 2000</title>
      <link>https://community.cisco.com/t5/network-security/udp-2000/m-p/1590731#M591206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;UDP 2000&amp;nbsp; is used for &lt;A class="mw-redirect active_link" href="http://en.wikipedia.org/wiki/Skinny_Client_Control_Protocol" title="Skinny Client Control Protocol"&gt;Cisco SCCP (Skinny)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check if your policy-map if there is an inspect skinny, for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect mgcp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have and you are not using Skinny then remove the inspect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That might solve your problem&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Feb 2011 17:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-2000/m-p/1590731#M591206</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-21T17:29:17Z</dc:date>
    </item>
  </channel>
</rss>

