<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi ,  If i understand your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507361#M919889</link>
    <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;If i understand your requirement correctly , you want to run IPSEC only &amp;amp; you want to disable SSL/anyconnect &amp;nbsp;WebVPN .&lt;/P&gt;&lt;P&gt;on your configuration under webVPN . disable on the interface connecting to internet ,this will disable your existing any connect setup&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname(config)# webvpn&lt;BR /&gt;hostname(config-webvpn)# &lt;STRONG&gt;no enable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Sandy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Jun 2014 12:53:56 GMT</pubDate>
    <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
    <dc:date>2014-06-03T12:53:56Z</dc:date>
    <item>
      <title>How to deny access TO asa https / ssl from outside interface?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507358#M919886</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Hope this is quick win question. I have a Cisco ASA 5510 running 8.4 with ASDM 6.4. I've configured the ASA to terminate IPSec VPN clients successfully using the Cisco VPN client, we also have a couple of users with Anyconnect clients for IPSec. I don't have any SSL VPN clients configured. A recent audit has noticed the ASA is answering on port 443 when accessed from the outside. A cert error is thrown up and when continuing the browser displays a 404 error which is fine. Problem is I don't want the ASA to answer on port 443 for connections made to that interface. Reluctant to start playing around with ACL's as the connections on 443 are to the ASA and not through it, there has to be a better way. Any ideas.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507358#M919886</guid>
      <dc:creator>kevin.woodhouse</dc:creator>
      <dc:date>2020-02-21T13:11:59Z</dc:date>
    </item>
    <item>
      <title>Hi , Answer me few things ,</title>
      <link>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507359#M919887</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Answer me few things , do your asa is configured for both IPSEC VPN Client &amp;amp; Any connect VPN setup ?? or its only for IPSEC VPN client .&lt;/P&gt;&lt;P&gt;Your above statement is&amp;nbsp;contradicting (&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp;we also have a couple of users with Anyconnect clients for IPSec) , for your understanding anyconnect dont use IPSEC as protocol , its uses SSL/443 as protocol .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;HTH&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Sandy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2014 08:55:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507359#M919887</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2014-06-03T08:55:58Z</dc:date>
    </item>
    <item>
      <title>Hi Sandy,We've pre-depolyed</title>
      <link>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507360#M919888</link>
      <description>&lt;P&gt;Hi Sandy,&lt;/P&gt;&lt;P&gt;We've pre-depolyed our 2 anyconnect clients, so we use IPSec to connect, if you follow the anyconnect wizard step 3 (VPN Protocols) you have an option to only use IPSec and turn off SSL. We're not using SSL for deployment of these clients.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2014 09:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507360#M919888</guid>
      <dc:creator>kevin.woodhouse</dc:creator>
      <dc:date>2014-06-03T09:05:07Z</dc:date>
    </item>
    <item>
      <title>Hi ,  If i understand your</title>
      <link>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507361#M919889</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;If i understand your requirement correctly , you want to run IPSEC only &amp;amp; you want to disable SSL/anyconnect &amp;nbsp;WebVPN .&lt;/P&gt;&lt;P&gt;on your configuration under webVPN . disable on the interface connecting to internet ,this will disable your existing any connect setup&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname(config)# webvpn&lt;BR /&gt;hostname(config-webvpn)# &lt;STRONG&gt;no enable outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Sandy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jun 2014 12:53:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507361#M919889</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2014-06-03T12:53:56Z</dc:date>
    </item>
    <item>
      <title>Hi All,Thanks for responses.</title>
      <link>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507362#M919890</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Thanks for responses. Managed to solve the problem by adding a management&amp;nbsp; ACL on the outside. I wanted to deny requests to the ASA not through it, anyway that solved the problem so if anyone connects to the outside interface the ASA doesn't respond with the SSC error anymore it just drops the packet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2014 14:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-deny-access-to-asa-https-ssl-from-outside-interface/m-p/2507362#M919890</guid>
      <dc:creator>kevin.woodhouse</dc:creator>
      <dc:date>2014-06-04T14:00:15Z</dc:date>
    </item>
  </channel>
</rss>

