02-15-2018 12:46 PM - edited 03-08-2019 01:52 PM
Hi Guy's
Please can you assist me with this, I have had to install a Cisco ASA5520 IOS 8.2(1).
At the branch there are no servers so I only needed to route the internal users out for internet access and we have a cloud based PABX for voice. I am concerned about vulnerabilities on this unit as it has an older IOS. I have run a NMAP scan against my public IP with the output below. When I run the same scan against my HO network I get the same result. Can someone please explain this output to me.
Later I will setup a site to site VPN, I read somewhere there is a problem with this IOS 8.2 (1) and it needs to be upgraded Please share your thoughts on this also...
Thank you in advance.
Nmap scan report for
Host is up (0.066s latency).
Not shown: 65532 filtered ports
PORT STATE SERVICE VERSION
80/tcp open http?
443/tcp open ssl/http Cisco ASA SSL VPN
8080/tcp open http-proxy?
Solved! Go to Solution.
02-15-2018 01:30 PM
Hello,
the ASA by default allows nothing. HTTP access is usually for management purposes. Look for an access list in your configuration that allows HTTP. SSL/VPN access needs to be configured as well, so you have full control over who can access through SSL/VPN.
In short, it looks like NMAP has confirmed that everything is closed except HTTP and SSL, which is configured manually.
Does that make sense ?
02-15-2018 01:30 PM
Hello,
the ASA by default allows nothing. HTTP access is usually for management purposes. Look for an access list in your configuration that allows HTTP. SSL/VPN access needs to be configured as well, so you have full control over who can access through SSL/VPN.
In short, it looks like NMAP has confirmed that everything is closed except HTTP and SSL, which is configured manually.
Does that make sense ?
02-15-2018 09:31 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide