07-15-2024 05:08 AM
Hello I want help on a case that our ASA firewall is being scanned on a management interface and it shows that port 3306 is open and our QSA told us to verify it or close. Normally we use only ssh to access the firewall. So, please assist us why this port is open and also how we can disable it.
Solved! Go to Solution.
07-15-2024 10:26 AM
So, if FTD allows requests to this port from external devices and responds, this looks very much like a security hole and at least undocumented behavior. Documentation only mentions that FMC listens on this port and not FTD.
07-15-2024 10:43 AM - edited 07-15-2024 10:47 AM
QSAs and other so-called auditors are known to often give advice to security administrators based on incomplete or inaccurate understanding of how the devices actually work.
If you perform an nmap scan of an FTD device's management port against tcp/3309, you will see that it reports as "filtered" - meaning there may be a listener but an actual connection could not be established. Packet capture during such a scan confirms that no TCP 3-way handshake completes, meaning the FTD does not actually accept the external connection. My screenshot below confirms this.
A non-technical auditor will however just take the output of a Nessus or similar scan and see the filtered ports and "cry wolf". For me, I say "pcap or it didn't happen".
07-15-2024 11:16 PM
Hello Marvin,
Thank you for the invaluable support.
Sorry @MHM Cisco World for misleading you actualy we are using ftd
07-15-2024 11:55 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide