After a security scan, the finding was that ASA reveals to much information on TCP/443 port. For example, a simple nmap scan shows:
PORT STATE SERVICE VERSION
443/tcp open ssl/http Cisco ASA SSL VPN
while the scanner (I don't know which one) shows:
The remote host is running CISCO ASA 5500.
So the question is, is it possible to remove or alter this information?
The ASA is running 9.8(4)7 code.
Solved! Go to Solution.