<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need help opening up some ports for access to internal servers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781629#M1008323</link>
    <description>&lt;P&gt;I have 3 internal MS Server 2003 that need to be accessible from the the outside. The server IP's are 192.168.0.237 needs ports 21095-21096, 192.168.0.240 needs ports 21093-21094 and 192.168.0.242 needs ports 21097-21098. I need to allow all traffic through to those servers on those ports. Here's my config:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5510&lt;/P&gt;&lt;P&gt;domain-name xxxxxxx.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif External&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 111111111111 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Internal&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 11111111111 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxxx.com&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21093&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21094&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21095 interface External eq 21095&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21096 interface External eq 21096&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21097 interface External eq 21097&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21098 interface External eq 21098&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq smtp&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq ftp&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq www&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq https&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq www&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq https&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit any&lt;/P&gt;&lt;P&gt;access-list xxxxxxxx_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 host 192.168.0.201&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 host 192.168.0.200&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 host 192.168.0.202&lt;/P&gt;&lt;P&gt;access-list dmz_in extended deny ip 192.168.2.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list winter_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.&lt;/P&gt;&lt;P&gt;255.0&lt;/P&gt;&lt;P&gt;access-list yyyyyyyVPN_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list hhhhhhVPN_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list External_cryptomap_65535.40 extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;access-list External_cryptomap_65535.60 extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;access-list Internal_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list Internal_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:55:38 GMT</pubDate>
    <dc:creator>a.grussner</dc:creator>
    <dc:date>2019-03-11T09:55:38Z</dc:date>
    <item>
      <title>Need help opening up some ports for access to internal servers</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781629#M1008323</link>
      <description>&lt;P&gt;I have 3 internal MS Server 2003 that need to be accessible from the the outside. The server IP's are 192.168.0.237 needs ports 21095-21096, 192.168.0.240 needs ports 21093-21094 and 192.168.0.242 needs ports 21097-21098. I need to allow all traffic through to those servers on those ports. Here's my config:&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa5510&lt;/P&gt;&lt;P&gt;domain-name xxxxxxx.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif External&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 111111111111 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Internal&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 11111111111 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 80&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxxxxxxxxxxxxx encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxxxxx.com&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21093&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21094&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21095 interface External eq 21095&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21096 interface External eq 21096&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21097 interface External eq 21097&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any eq 21098 interface External eq 21098&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq smtp&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq ftp&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq www&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq https&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq www&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any host 11111111111 eq https&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit any&lt;/P&gt;&lt;P&gt;access-list xxxxxxxx_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 host 192.168.0.201&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 host 192.168.0.200&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip 192.168.2.0 255.255.255.0 host 192.168.0.202&lt;/P&gt;&lt;P&gt;access-list dmz_in extended deny ip 192.168.2.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list winter_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list Internal_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.&lt;/P&gt;&lt;P&gt;255.0&lt;/P&gt;&lt;P&gt;access-list yyyyyyyVPN_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list hhhhhhVPN_splitTunnelAcl standard permit 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list External_cryptomap_65535.40 extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;access-list External_cryptomap_65535.60 extended permit ip 192.168.2.0 255.255.255.0 192.168.3.0 255&lt;/P&gt;&lt;P&gt;.255.255.0&lt;/P&gt;&lt;P&gt;access-list Internal_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list Internal_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781629#M1008323</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2019-03-11T09:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781630#M1008324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu External 1500&lt;/P&gt;&lt;P&gt;mtu Internal 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN 192.168.3.1-192.168.3.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface External&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface DMZ&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any External&lt;/P&gt;&lt;P&gt;icmp permit any Internal&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (External) 1 interface&lt;/P&gt;&lt;P&gt;nat (Internal) 0 access-list Internal_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Internal) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list dmz_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface smtp 192.168.0.202 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface 21093 192.168.0.240 21093 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface 21094 192.168.0.240 21094 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface 21095 192.168.0.237 21095 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface 21096 192.168.0.237 21096 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface 21097 192.168.0.242 21097 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,External) tcp interface 21098 192.168.0.242 21098 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Internal,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,External) 11111111111 192.168.2.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,External) 11111111111 192.168.2.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,External) 11111111111 192.168.2.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group External_access_in in interface External&lt;/P&gt;&lt;P&gt;access-group Internal_access_in in interface Internal&lt;/P&gt;&lt;P&gt;access-group dmz_in in interface DMZ&lt;/P&gt;&lt;P&gt;route External 0.0.0.0 0.0.0.0 1111111111111 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; banner none&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server none&lt;/P&gt;&lt;P&gt; dhcp-network-scope none&lt;/P&gt;&lt;P&gt; vpn-access-hours none&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter none&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp disable&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; group-lock none&lt;/P&gt;&lt;P&gt; pfs disable&lt;/P&gt;&lt;P&gt; ipsec-udp disable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt; split-dns none&lt;/P&gt;&lt;P&gt; intercept-dhcp 255.255.255.255 disable&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout 30&lt;/P&gt;&lt;P&gt; ip-phone-bypass disable&lt;/P&gt;&lt;P&gt; leap-bypass disable&lt;/P&gt;&lt;P&gt; nem disable&lt;/P&gt;&lt;P&gt; backup-servers keep-client-config&lt;/P&gt;&lt;P&gt; msie-proxy server none&lt;/P&gt;&lt;P&gt; msie-proxy method no-modify&lt;/P&gt;&lt;P&gt; msie-proxy except-list none&lt;/P&gt;&lt;P&gt; msie-proxy local-bypass disable&lt;/P&gt;&lt;P&gt; nac disable&lt;/P&gt;&lt;P&gt; nac-sq-period 300&lt;/P&gt;&lt;P&gt; nac-reval-period 36000&lt;/P&gt;&lt;P&gt; nac-default-acl none&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt; client-access-rule none&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;  functions url-entry&lt;/P&gt;&lt;P&gt;  html-content-filter none&lt;/P&gt;&lt;P&gt;  homepage none&lt;/P&gt;&lt;P&gt;  keep-alive-ignore 4&lt;/P&gt;&lt;P&gt;  http-comp gzip&lt;/P&gt;&lt;P&gt;  filter none&lt;/P&gt;&lt;P&gt;  url-list none&lt;/P&gt;&lt;P&gt;  customization value DfltCustomization&lt;/P&gt;&lt;P&gt;  port-forward none&lt;/P&gt;&lt;P&gt;  port-forward-name value Application Access&lt;/P&gt;&lt;P&gt;  sso-server none&lt;/P&gt;&lt;P&gt;  deny-message value Login was successful, but because certain criteria have not been met or due to&lt;/P&gt;&lt;P&gt;some specific group policy, you do not have permission to use any of the VPN features. Contact your&lt;/P&gt;&lt;P&gt;IT administrator for more information&lt;/P&gt;&lt;P&gt;  svc none&lt;/P&gt;&lt;P&gt;  svc keep-installer installed&lt;/P&gt;&lt;P&gt;  svc keepalive none&lt;/P&gt;&lt;P&gt;  svc rekey time none&lt;/P&gt;&lt;P&gt;  svc rekey method none&lt;/P&gt;&lt;P&gt;  svc dpd-interval client none&lt;/P&gt;&lt;P&gt;  svc dpd-interval gateway none&lt;/P&gt;&lt;P&gt;  svc compression deflate&lt;/P&gt;&lt;P&gt;group-policy radical internal&lt;/P&gt;&lt;P&gt;group-policy radical attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.15&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2007 17:15:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781630#M1008324</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-04-03T17:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781631#M1008328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;default-domain value xxxxxxxxx&lt;/P&gt;&lt;P&gt;group-policy yyyyyyyVPN internal&lt;/P&gt;&lt;P&gt;group-policy yyyyyyyVPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.201&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value xxxxxxxxx.com&lt;/P&gt;&lt;P&gt;username user1 password sv.wwwwwwwwwww encrypted privilege 15&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy yyyyyyyyVPN&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 50&lt;/P&gt;&lt;P&gt;username user2 password sv.xxxxxxxxxxxx encrypted privilege 15&lt;/P&gt;&lt;P&gt;username user2 attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy yyyyyyyVPN&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 Internal&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;http 192.168.3.0 255.255.255.0 Internal&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 20 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 40 match address External_cryptomap_65535.40&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 40 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 60 match address External_cryptomap_65535.60&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 60 set pfs&lt;/P&gt;&lt;P&gt;crypto dynamic-map External_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map External_map 65535 ipsec-isakmp dynamic External_dyn_map&lt;/P&gt;&lt;P&gt;crypto map External_map interface External&lt;/P&gt;&lt;P&gt;crypto isakmp enable External&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal  20&lt;/P&gt;&lt;P&gt;crypto isakmp ipsec-over-tcp port 10000&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; no authentication chap&lt;/P&gt;&lt;P&gt; no authentication ms-chap-v1&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;tunnel-group radical type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group radical general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt; default-group-policy radical&lt;/P&gt;&lt;P&gt;tunnel-group radical ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group new type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group new general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt;tunnel-group new ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group yyyyyyyVPN type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group yyyyyyyVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt; default-group-policy yyyyyyyVPN&lt;/P&gt;&lt;P&gt;tunnel-group yyyyyyyVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;telnet 192.168.3.0 255.255.255.0 Internal&lt;/P&gt;&lt;P&gt;telnet 192.168.2.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 30&lt;/P&gt;&lt;P&gt;management-access Internal&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 2048&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect icmp&lt;/P&gt;&lt;P&gt;  inspect icmp error&lt;/P&gt;&lt;P&gt;  inspect ipsec-pass-thru&lt;/P&gt;&lt;P&gt;  inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;ntp server 192.5.41.41 source External&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I missing? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2007 17:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781631#M1008328</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-04-03T17:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781632#M1008336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you mean to specify source ports in your acl? Without source ports would look like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21093 &lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21094 &lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21095 &lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21096 &lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21097 &lt;/P&gt;&lt;P&gt;access-list External_access_in extended permit tcp any interface External eq 21098 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2007 17:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781632#M1008336</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-04-03T17:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781633#M1008338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess I'm not totally clear on what I need to do so I allow all traffic in from the External interface on those ports to the specified server IP's. I guess I'm confused on exactly what source ports is referring too. Could you give me a little schooling on it? Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2007 18:11:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781633#M1008338</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-04-03T18:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781634#M1008344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would I need to make any other changes since this is a Windows mobile device that is accessing these servers? They had this working with an old Firebox firewall by just opening those ports to those server IP's. I screwed up the setting and put those source ports in on some settings so I removed them now. Anything else that might prevent the connection? Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2007 19:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781634#M1008344</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-04-03T19:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781635#M1008348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Once I removed the ports from the ACL it fixed my problem. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 15:56:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781635#M1008348</guid>
      <dc:creator>a.grussner</dc:creator>
      <dc:date>2007-04-04T15:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Need help opening up some ports for access to internal serve</title>
      <link>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781636#M1008353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Source ports are typically random ports &amp;gt; 1023 and you would rarely specify those.  For example, to permit Internet users to reach your web server, you'd allow tcp/any (all source ports) to host ip eq 80.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 05:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-opening-up-some-ports-for-access-to-internal-servers/m-p/781636#M1008353</guid>
      <dc:creator>r.bell</dc:creator>
      <dc:date>2007-04-05T05:45:36Z</dc:date>
    </item>
  </channel>
</rss>

