<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port forward and ZBF in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4054584#M1068378</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have a number of ports to be forwarded to an internal server. All works fine until I apply my ZBF config.&lt;/P&gt;&lt;P&gt;Anyone able to cast an eye over my config to suggest how I forward a single port from the internet (dialer 0) to a device on vlan 20?&lt;BR /&gt;i.e. 10.10.20.100:55555&lt;/P&gt;&lt;P&gt;Any suggestions are welcomed as I hit a wall,&lt;BR /&gt;John&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Current configuration : 4176 bytes&lt;BR /&gt;!&lt;BR /&gt;! No configuration change since last restart&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname RouterBusiness&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 XXXXX&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;memory-size iomem 10&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 10.10.20.1 10.10.20.50&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool BUS_LAN&lt;BR /&gt;network 10.10.20.0 255.255.255.0&lt;BR /&gt;default-router 10.10.20.1&lt;BR /&gt;dns-server 10.10.20.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip domain name cisco887business.lcoal&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO887VA-K9 sn FCZXXXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username RouterB privilege 15 secret 5 XXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all LAN-TO-WAN-CLASS&lt;BR /&gt;match access-group name LAN-TO-WAN&lt;BR /&gt;class-map type inspect match-all WAN-TO-LAN-CLASS&lt;BR /&gt;match access-group name WAN-TO-LAN&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect LAN-TO-WAN-POLICY&lt;BR /&gt;class type inspect LAN-TO-WAN-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect WAN-TO-LAN-POLICY&lt;BR /&gt;class type inspect WAN-TO-LAN-CLASS&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;!&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone security OUTSIDE&lt;BR /&gt;zone-pair security LAN-TO-WAN source INSIDE destination OUTSIDE&lt;BR /&gt;service-policy type inspect LAN-TO-WAN-POLICY&lt;BR /&gt;zone-pair security WAN-TO-LAN source OUTSIDE destination INSIDE&lt;BR /&gt;service-policy type inspect WAN-TO-LAN-POLICY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;no ip address&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.101&lt;BR /&gt;description Tagging for PPPoE (VDSL0)&lt;BR /&gt;encapsulation dot1Q 101&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;switchport access vlan 55&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;description Routing to Res&lt;BR /&gt;ip address 192.168.10.20 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;description Business LAN&lt;BR /&gt;ip address 10.10.20.1 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan55&lt;BR /&gt;description Mgt&lt;BR /&gt;ip address 192.168.55.20 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt;description BT Bus VDSL dialer&lt;BR /&gt;ip address negotiated&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip mtu 1492&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security OUTSIDE&lt;BR /&gt;encapsulation ppp&lt;BR /&gt;ip tcp adjust-mss 1452&lt;BR /&gt;dialer pool 1&lt;BR /&gt;dialer-group 1&lt;BR /&gt;ppp authentication chap ms-chap callin&lt;BR /&gt;ppp chap hostname ISP USERNAME&lt;BR /&gt;ppp chap password 7 ISP USERNAME&lt;BR /&gt;ppp ipcp dns request accept&lt;BR /&gt;ppp ipcp address accept&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 1 interface Dialer0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.10.20.5 3389 interface Dialer0 3389&lt;BR /&gt;ip nat inside source static tcp 10.10.20.5 32400 interface Dialer0 32400&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended LAN-TO-WAN&lt;BR /&gt;permit ip 10.10.20.0 0.0.0.255 any&lt;BR /&gt;permit ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;ip access-list extended WAN-TO-LAN&lt;BR /&gt;permit icmp any 10.10.20.0 0.0.0.255&lt;BR /&gt;permit tcp any host 10.10.20.5 eq 3389&lt;BR /&gt;permit tcp any host 10.10.20.5 eq 32400&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;access-list 1 remark Access to Dialer interface&lt;BR /&gt;access-list 1 permit 10.10.20.0 0.0.0.255&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2020 15:01:57 GMT</pubDate>
    <dc:creator>Darkglasses</dc:creator>
    <dc:date>2020-03-31T15:01:57Z</dc:date>
    <item>
      <title>Port forward and ZBF</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4054584#M1068378</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have a number of ports to be forwarded to an internal server. All works fine until I apply my ZBF config.&lt;/P&gt;&lt;P&gt;Anyone able to cast an eye over my config to suggest how I forward a single port from the internet (dialer 0) to a device on vlan 20?&lt;BR /&gt;i.e. 10.10.20.100:55555&lt;/P&gt;&lt;P&gt;Any suggestions are welcomed as I hit a wall,&lt;BR /&gt;John&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Current configuration : 4176 bytes&lt;BR /&gt;!&lt;BR /&gt;! No configuration change since last restart&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname RouterBusiness&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 XXXXX&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;memory-size iomem 10&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 10.10.20.1 10.10.20.50&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool BUS_LAN&lt;BR /&gt;network 10.10.20.0 255.255.255.0&lt;BR /&gt;default-router 10.10.20.1&lt;BR /&gt;dns-server 10.10.20.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip domain name cisco887business.lcoal&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO887VA-K9 sn FCZXXXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username RouterB privilege 15 secret 5 XXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all LAN-TO-WAN-CLASS&lt;BR /&gt;match access-group name LAN-TO-WAN&lt;BR /&gt;class-map type inspect match-all WAN-TO-LAN-CLASS&lt;BR /&gt;match access-group name WAN-TO-LAN&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect LAN-TO-WAN-POLICY&lt;BR /&gt;class type inspect LAN-TO-WAN-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect WAN-TO-LAN-POLICY&lt;BR /&gt;class type inspect WAN-TO-LAN-CLASS&lt;BR /&gt;pass&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;!&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone security OUTSIDE&lt;BR /&gt;zone-pair security LAN-TO-WAN source INSIDE destination OUTSIDE&lt;BR /&gt;service-policy type inspect LAN-TO-WAN-POLICY&lt;BR /&gt;zone-pair security WAN-TO-LAN source OUTSIDE destination INSIDE&lt;BR /&gt;service-policy type inspect WAN-TO-LAN-POLICY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;no ip address&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.101&lt;BR /&gt;description Tagging for PPPoE (VDSL0)&lt;BR /&gt;encapsulation dot1Q 101&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;switchport access vlan 55&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;description Routing to Res&lt;BR /&gt;ip address 192.168.10.20 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;description Business LAN&lt;BR /&gt;ip address 10.10.20.1 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan55&lt;BR /&gt;description Mgt&lt;BR /&gt;ip address 192.168.55.20 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt;description BT Bus VDSL dialer&lt;BR /&gt;ip address negotiated&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip mtu 1492&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security OUTSIDE&lt;BR /&gt;encapsulation ppp&lt;BR /&gt;ip tcp adjust-mss 1452&lt;BR /&gt;dialer pool 1&lt;BR /&gt;dialer-group 1&lt;BR /&gt;ppp authentication chap ms-chap callin&lt;BR /&gt;ppp chap hostname ISP USERNAME&lt;BR /&gt;ppp chap password 7 ISP USERNAME&lt;BR /&gt;ppp ipcp dns request accept&lt;BR /&gt;ppp ipcp address accept&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 1 interface Dialer0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.10.20.5 3389 interface Dialer0 3389&lt;BR /&gt;ip nat inside source static tcp 10.10.20.5 32400 interface Dialer0 32400&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended LAN-TO-WAN&lt;BR /&gt;permit ip 10.10.20.0 0.0.0.255 any&lt;BR /&gt;permit ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;ip access-list extended WAN-TO-LAN&lt;BR /&gt;permit icmp any 10.10.20.0 0.0.0.255&lt;BR /&gt;permit tcp any host 10.10.20.5 eq 3389&lt;BR /&gt;permit tcp any host 10.10.20.5 eq 32400&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;access-list 1 remark Access to Dialer interface&lt;BR /&gt;access-list 1 permit 10.10.20.0 0.0.0.255&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 15:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4054584#M1068378</guid>
      <dc:creator>Darkglasses</dc:creator>
      <dc:date>2020-03-31T15:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Port forward and ZBF</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4054599#M1068380</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You should double check your ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;ip access-list extended WAN-TO-LAN&lt;BR /&gt;permit icmp any 10.10.20.0 0.0.0.255&lt;BR /&gt;permit tcp any eq 55555 host 10.10.20.5 eq &lt;STRONG&gt;5555&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;The destination port in your NAT rule is 55555, so you are missing a 5 in your ACL. Also your source port may not be 55555, I leave that out and just define the correct destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sun, 29 Mar 2020 19:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4054599#M1068380</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-29T19:21:30Z</dc:date>
    </item>
    <item>
      <title>Re: Port forward and ZBF</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4055002#M1068413</link>
      <description>&lt;P&gt;RJI, your are right.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The correct port is 32400 and I have copied the ACL below / updated my original config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies for misleading your as I was blanking out my ports in use and made an error. Lesson learned for the future. I did this because when I applied Firewall debugging, I got an endless stream of detail via the console and lost internet connection because my laptop had moved to an unknown network - 192.168.58.0. A reboot brought everything back up but was nervous I was posting too much details about my connection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While my ZBF knowledge is limited, I have not seen anything to suggest that a single port cannot be forwarded. A number of policies, NAT configs and ACL's have not enabled me getting this port to show open. Unless I remove interfaces from ZBF zones. So it must be the ZBF config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip access-list extended WAN-TO-LAN&lt;BR /&gt;permit icmp any 10.10.20.0 0.0.0.255&lt;BR /&gt;permit tcp any eq 3389 host 10.10.20.5 eq 3389&lt;BR /&gt;permit tcp any eq 32400 host 10.10.20.5 eq 32400&lt;BR /&gt;deny ip any any&lt;/P&gt;</description>
      <pubDate>Mon, 30 Mar 2020 12:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4055002#M1068413</guid>
      <dc:creator>Darkglasses</dc:creator>
      <dc:date>2020-03-30T12:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Port forward and ZBF</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4055010#M1068415</link>
      <description>The source port(s) is going to be random, so don't define it in the ACL - just define the destination port(s).&lt;BR /&gt;&lt;BR /&gt;permit tcp any host 10.10.20.5 eq 32400&lt;BR /&gt;&lt;BR /&gt;The IP address 10.10.20.5 also does not match the same IP address used in the NAT rule (10.10.20.100), you should ensure they are correct.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;</description>
      <pubDate>Mon, 30 Mar 2020 12:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4055010#M1068415</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-30T12:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: Port forward and ZBF</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4056010#M1068470</link>
      <description>&lt;P&gt;Thanks RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have updated the config on my original post to show my NAT rule is correct - ports route to host 10.10.20.5. Apologies I missed correcting that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The progress is that I now see the counters increase when using port checkers on port 32400. For some reason the counter does not increase for port 3389. Both ports remain closed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read a blog with examples of using ip nat outside source for ZBF. That didn't work either on either of my FTTC connections, one obtains an IP dynamically and the other is static.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Extended IP access list WAN-TO-LAN&lt;BR /&gt;20 permit icmp any 10.10.20.0 0.0.0.255 (507 matches)&lt;BR /&gt;30 permit tcp any host 10.10.20.5 eq 3389&lt;BR /&gt;40 permit tcp any host 10.10.20.5 eq 32400 (20 matches)&lt;BR /&gt;50 deny ip any any (3783 matches)&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 15:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4056010#M1068470</guid>
      <dc:creator>Darkglasses</dc:creator>
      <dc:date>2020-03-31T15:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Port forward and ZBF</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4059031#M1068742</link>
      <description>&lt;P&gt;Folks, Success!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have solved the problem and posted my working config below in case anyone is spinning their wheels. Essentially the problem was that I was inspecting outbound traffic and passing inbound traffic without inspection. This miss match was causing issues - see Julio's solution at&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/td-p/2417742" target="_blank"&gt;https://community.cisco.com/t5/network-security/port-forwarding-in-zone-based-firewall/td-p/2417742&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks to those having a look and offering advice.&lt;/P&gt;&lt;P&gt;Next is to sort my ChromeCast.&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current configuration : 4649 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 14:06:02 UTC Sat Apr 4 2020 by Admin&lt;BR /&gt;! NVRAM config last updated at 13:45:37 UTC Sat Apr 4 2020 by Admin&lt;BR /&gt;! NVRAM config last updated at 13:45:37 UTC Sat Apr 4 2020 by Admin&lt;BR /&gt;version 15.1&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug uptime&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Cisco_Business&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 5 XXXXXXXXXXXXXXXXXXXXXXXXXXX.&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;memory-size iomem 10&lt;BR /&gt;crypto pki token default removal timeout 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 10.10.20.1 10.10.20.50&lt;BR /&gt;ip dhcp excluded-address 10.10.40.1 10.10.40.50&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool BUS_LAN&lt;BR /&gt;network 10.10.20.0 255.255.255.0&lt;BR /&gt;default-router 10.10.20.1&lt;BR /&gt;dns-server 10.10.20.1&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool BUS_LAN_ALT&lt;BR /&gt;network 10.10.40.0 255.255.255.0&lt;BR /&gt;dns-server 10.10.40.1&lt;BR /&gt;default-router 10.10.40.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;ip domain name cisco.lcoal&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO887VA-K9 sn FCZXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username Admin privilege 15 secret 5 XXXXXXXXXXXXXXXXXXXXXXXXXX&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all LAN-TO-WAN-CLASS&lt;BR /&gt;match access-group name LAN-TO-WAN&lt;BR /&gt;class-map type inspect match-all WAN-TO-LAN-CLASS&lt;BR /&gt;match access-group name WAN-TO-LAN&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect LAN-TO-WAN-POLICY&lt;BR /&gt;class type inspect LAN-TO-WAN-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;policy-map type inspect WAN-TO-LAN-POLICY&lt;BR /&gt;class type inspect WAN-TO-LAN-CLASS&lt;BR /&gt;inspect&lt;BR /&gt;class class-default&lt;BR /&gt;drop log&lt;BR /&gt;!&lt;BR /&gt;zone security INSIDE&lt;BR /&gt;zone security OUTSIDE&lt;BR /&gt;zone-pair security LAN-TO-WAN source INSIDE destination OUTSIDE&lt;BR /&gt;service-policy type inspect LAN-TO-WAN-POLICY&lt;BR /&gt;zone-pair security WAN-TO-LAN source OUTSIDE destination INSIDE&lt;BR /&gt;service-policy type inspect WAN-TO-LAN-POLICY&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;no ip address&lt;BR /&gt;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0.101&lt;BR /&gt;description Tagging for PPPoE (VDSL0)&lt;BR /&gt;encapsulation dot1Q 101&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;pppoe-client dial-pool-number 1&lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;switchport access vlan 55&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;switchport access vlan 10&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;switchport access vlan 40&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;description Routing to Main_Res&lt;BR /&gt;ip address 192.168.10.20 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan20&lt;BR /&gt;description Main_Bus&lt;BR /&gt;ip address 10.10.20.1 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan40&lt;BR /&gt;description BUS_LAN_ALT&lt;BR /&gt;ip address 10.10.40.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security INSIDE&lt;BR /&gt;!&lt;BR /&gt;interface Vlan55&lt;BR /&gt;description Mgt&lt;BR /&gt;ip address 192.168.55.20 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Dialer0&lt;BR /&gt;description BT Bus VDSL dialer&lt;BR /&gt;ip address negotiated&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip mtu 1492&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;zone-member security OUTSIDE&lt;BR /&gt;encapsulation ppp&lt;BR /&gt;ip tcp adjust-mss 1452&lt;BR /&gt;dialer pool 1&lt;BR /&gt;dialer-group 1&lt;BR /&gt;ppp authentication chap ms-chap callin&lt;BR /&gt;ppp chap hostname ISP USERNAM&lt;BR /&gt;ppp chap password 7 ISP PASSWORD&lt;BR /&gt;ppp ipcp dns request accept&lt;BR /&gt;ppp ipcp address accept&lt;BR /&gt;no cdp enable&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 1 interface Dialer0 overload&lt;BR /&gt;ip nat inside source static tcp 10.10.40.5 3389 interface Dialer0 3389&lt;BR /&gt;ip nat inside source static tcp 10.10.40.5 32400 interface Dialer0 32400&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 Dialer0&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended LAN-TO-WAN&lt;BR /&gt;permit ip 10.10.20.0 0.0.0.255 any&lt;BR /&gt;permit ip 10.10.40.0 0.0.0.255 any&lt;BR /&gt;permit ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;ip access-list extended WAN-TO-LAN&lt;BR /&gt;permit icmp any 10.10.20.0 0.0.0.255&lt;BR /&gt;permit tcp any host 10.10.40.5 eq 32400&lt;BR /&gt;permit tcp any host 10.10.40.5 eq 3389&lt;BR /&gt;deny ip any any&lt;BR /&gt;!&lt;BR /&gt;access-list 1 remark Access to Dialer interface&lt;BR /&gt;access-list 1 permit 10.10.20.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 10.10.40.0 0.0.0.255&lt;BR /&gt;dialer-list 1 protocol ip permit&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;access-class 5 in&lt;BR /&gt;exec-timeout 15 0&lt;BR /&gt;password 7 XXXXXXXXXXXXXX&lt;BR /&gt;logging synchronous&lt;BR /&gt;transport input all&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2020 15:27:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-and-zbf/m-p/4059031#M1068742</guid>
      <dc:creator>Darkglasses</dc:creator>
      <dc:date>2020-04-04T15:27:13Z</dc:date>
    </item>
  </channel>
</rss>

