<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Port Forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613894#M1025534</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the only listing &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is still not working even after I recreated the commands. It is telling me that a duplicate entry exist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I configure it through PIX device manager by using access rules and translation rules? GUI makes it a little easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Feb 2007 18:09:38 GMT</pubDate>
    <dc:creator>akalender</dc:creator>
    <dc:date>2007-02-20T18:09:38Z</dc:date>
    <item>
      <title>Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613888#M1025526</link>
      <description>&lt;P&gt;I am trying to set up static single (1) and range (2) port forwarding on PIX 506E device using the following commands; however it is not working. What am I missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Single Port Forwarding &lt;/P&gt;&lt;P&gt;1. static (inside,outside) tcp 24.172.x.x  5631 192.168.1.215 5631 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list PCA permit tcp any host 24.172.x.x eq 5631 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group PCA in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port Range Forwarding&lt;/P&gt;&lt;P&gt;2. object-group service pearl_echo_tcp tcp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;port-object range 57345 57370 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list PE permit tcp any host 24.172.x.x object-group pearl_echo_tcp&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:35:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613888#M1025526</guid>
      <dc:creator>akalender</dc:creator>
      <dc:date>2019-03-11T09:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613889#M1025527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks good to me..can you make sure yu do not have any inbound ACL on Inside Interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, try doing a telnet to the 24.x.x.x ip on port 5631 from outside. Does that work ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kanishka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Feb 2007 18:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613889#M1025527</guid>
      <dc:creator>kaachary</dc:creator>
      <dc:date>2007-02-19T18:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613890#M1025528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,outside) tcp 24.172.x.x 5631 192.168.1.215 5631 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static command above looks fine. However, looking at port no. 5631, are you trying to pass PCAnywhere through PIX? If so, you also need to open port 5632 (UDP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 24.172.x.x 5632 192.168.1.215 5632 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the access-list applied to outside interface in inbound direction, you need to have following lines in-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list PE permit tcp any host 24.172.x.x eq 5631&lt;/P&gt;&lt;P&gt;access-list PE permit udp any host 24.172.x.x eq 5632&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;object-group service pearl_echo_tcp tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;port-object range 57345 57370&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list PE permit tcp any host 24.172.x.x object-group pearl_echo_tcp&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the requirement of above commands? If you need to allow inbound access to 24.172.x.x on ports from 57345-57370, we will need to add individual static command for each port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 02:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613890#M1025528</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-20T02:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613891#M1025530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I am trying to pass PC Anywhere traffic through PIX and I have ports 5631, 5632 open for both TCP and UDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 16:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613891#M1025530</guid>
      <dc:creator>akalender</dc:creator>
      <dc:date>2007-02-20T16:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613892#M1025531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How can I see if I have any inbound ACL on inside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 16:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613892#M1025531</guid>
      <dc:creator>akalender</dc:creator>
      <dc:date>2007-02-20T16:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613893#M1025533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check if there is any access-list applied on the inside interface using following command-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see any access-group on inside interface, that access-list is applied on inside interface of PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow pc-anywhere through PIX, as I mentioned earlier, you only need to redirect following ports from public IP to the internal IP-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5631(tcp) &amp;amp; 5632(udp)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that public IP is -- public&lt;/P&gt;&lt;P&gt;and private IP is -- private&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following commands are required-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp public 5631 private 5631&lt;/P&gt;&lt;P&gt;static (inside,outside) udp public 5632 private 5632&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host public eq 5631&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any host public eq 5632&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vibhor.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 17:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613893#M1025533</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-20T17:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613894#M1025534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the only listing &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is still not working even after I recreated the commands. It is telling me that a duplicate entry exist.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I configure it through PIX device manager by using access rules and translation rules? GUI makes it a little easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 18:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613894#M1025534</guid>
      <dc:creator>akalender</dc:creator>
      <dc:date>2007-02-20T18:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613895#M1025536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you provide the output of following commands-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show static&lt;/P&gt;&lt;P&gt;show access-list&lt;/P&gt;&lt;P&gt;show access-group&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Feb 2007 22:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613895#M1025536</guid>
      <dc:creator>vitripat</dc:creator>
      <dc:date>2007-02-20T22:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613896#M1025537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interestingly enough show static and show access-group did not show any entries. I got all my access list displayed when using show access-list command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ended up creating all static entries throgh PIX device manager and now all statics are displayed and working properly; however show access-group displays only the list access-group I created. Any reason why?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Feb 2007 16:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613896#M1025537</guid>
      <dc:creator>akalender</dc:creator>
      <dc:date>2007-02-21T16:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613897#M1025538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"sh access-group" will only show you the access-group and the interfacce its applied to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to check the entries the int haccess-list, you to do a "sh access-list &lt;NAME&gt; "&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sh static should show all the statics, if there's any. I'm not sure, why its not displaying that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kanishka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Feb 2007 17:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613897#M1025538</guid>
      <dc:creator>kaachary</dc:creator>
      <dc:date>2007-02-21T17:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613898#M1025539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Feb 2007 17:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613898#M1025539</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-02-21T17:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613899#M1025540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is the command for 7.X code..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its PIX 506E.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kanishka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Feb 2007 17:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613899#M1025540</guid>
      <dc:creator>kaachary</dc:creator>
      <dc:date>2007-02-21T17:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: Static Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613900#M1025542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Possible to do port forward on PPTP tunnel? As it only accept TCP or UDP, if i have a server that behind the firewall, that need to terminate PPTP sessions, and i only have one public IP..... what should i do?&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Feb 2007 11:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-port-forwarding/m-p/613900#M1025542</guid>
      <dc:creator>leowong</dc:creator>
      <dc:date>2007-02-26T11:01:37Z</dc:date>
    </item>
  </channel>
</rss>

