<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Open Ports in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-ports/m-p/947541#M939361</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your techs are inside your LAN behind asa5505 firewall and are trying to connect to and outside server out in another location over internet you don't need to open up these ports for outbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, if you are hosting a Stentor server behind asa5505 firewall and want to provide access for outsiders to access the hosting server on ports mentioned in your post this can be done as follows in firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Piblic IP for a one-to-one NAT for local server so that can be accessible over internet.&lt;/P&gt;&lt;P&gt;2- Configure firewall tcp service ports &lt;/P&gt;&lt;P&gt;3- Configure firewall access rules &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.i  assume &lt;/P&gt;&lt;P&gt;1- Public IP is 20.20.20.20, Local Stentor IP 10.10.10.10, server seating inside LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 20.20.20.20 10.10.10.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- Configure TCP service group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service Stent_server tcp&lt;/P&gt;&lt;P&gt;port-object eq 6464&lt;/P&gt;&lt;P&gt;port-object eq 7575&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- Configure access list and apply to outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 20.20.20.20 object-group Stent_serve&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Apr 2008 02:02:12 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-04-14T02:02:12Z</dc:date>
    <item>
      <title>Open Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-ports/m-p/947540#M939360</link>
      <description>&lt;P&gt;I need to open ports 6464, 7575 and 443 in my Cisco ASA 5505 so that techs in our office can access a hospitals Stentor Isight...Please help with abc steps.  &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-ports/m-p/947540#M939360</guid>
      <dc:creator>L02731619z</dc:creator>
      <dc:date>2019-03-11T12:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Open Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-ports/m-p/947541#M939361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your techs are inside your LAN behind asa5505 firewall and are trying to connect to and outside server out in another location over internet you don't need to open up these ports for outbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, if you are hosting a Stentor server behind asa5505 firewall and want to provide access for outsiders to access the hosting server on ports mentioned in your post this can be done as follows in firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Piblic IP for a one-to-one NAT for local server so that can be accessible over internet.&lt;/P&gt;&lt;P&gt;2- Configure firewall tcp service ports &lt;/P&gt;&lt;P&gt;3- Configure firewall access rules &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.i  assume &lt;/P&gt;&lt;P&gt;1- Public IP is 20.20.20.20, Local Stentor IP 10.10.10.10, server seating inside LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 20.20.20.20 10.10.10.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- Configure TCP service group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service Stent_server tcp&lt;/P&gt;&lt;P&gt;port-object eq 6464&lt;/P&gt;&lt;P&gt;port-object eq 7575&lt;/P&gt;&lt;P&gt;port-object eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- Configure access list and apply to outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 20.20.20.20 object-group Stent_serve&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 02:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-ports/m-p/947541#M939361</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-04-14T02:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: Open Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-ports/m-p/947542#M939362</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.  This was very informative However, I wonder why the IT guy at the hospital's radiology department was so definative about needing to open those outlined ports.  I plan to speak with him in the morning.  I believe he mentioned something about needing to have both outbound and inbound connections...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 05:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-ports/m-p/947542#M939362</guid>
      <dc:creator>L02731619z</dc:creator>
      <dc:date>2008-04-14T05:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Open Ports</title>
      <link>https://community.cisco.com/t5/network-security/open-ports/m-p/947543#M939363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Like I said,  outbound does not need to be permitted, unless you explicetly block outbound traffic in your firewall,  once a source atempts a connection  to a destination hosts outside fw tcp three way handchake is stablished and comminication between source and destination host flows. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In any case, post your findings/update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge     &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 19:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-ports/m-p/947543#M939363</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-04-14T19:31:28Z</dc:date>
    </item>
  </channel>
</rss>

