<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: blocking inbound traffic on FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-inbound-traffic-on-fwsm/m-p/901494#M973150</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should put the access list on the interface of fwsm which is connected to the server in the inbound direction. This will block all conection attempts to the server from the outside. However the server will still be listening to port 80 if web server or HTTP server is running on it. Disable HTTP server or block port 80 manually on the server to disable server from listening to port 80.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Oct 2007 21:25:15 GMT</pubDate>
    <dc:creator>amritpatek</dc:creator>
    <dc:date>2007-10-30T21:25:15Z</dc:date>
    <item>
      <title>blocking inbound traffic on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/blocking-inbound-traffic-on-fwsm/m-p/901493#M973149</link>
      <description>&lt;P&gt;We have a server which should not listen on port 80 on FWSM. Tried blocking traffic using access-list WEBSERVERS_access_out extended deny tcp host 10.80.201.95 eq www any but didnt work. Need a solution with out using explicit deny statements towards this server/port on other interfaces.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-inbound-traffic-on-fwsm/m-p/901493#M973149</guid>
      <dc:creator>aksher</dc:creator>
      <dc:date>2019-03-11T11:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: blocking inbound traffic on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/blocking-inbound-traffic-on-fwsm/m-p/901494#M973150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should put the access list on the interface of fwsm which is connected to the server in the inbound direction. This will block all conection attempts to the server from the outside. However the server will still be listening to port 80 if web server or HTTP server is running on it. Disable HTTP server or block port 80 manually on the server to disable server from listening to port 80.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2007 21:25:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-inbound-traffic-on-fwsm/m-p/901494#M973150</guid>
      <dc:creator>amritpatek</dc:creator>
      <dc:date>2007-10-30T21:25:15Z</dc:date>
    </item>
  </channel>
</rss>

