<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA V9.2(2)4 port 80 redirect to https in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146842#M1073630</link>
    <description>&lt;P&gt;Packet is being dropped by implicit rule.&lt;/P&gt;
&lt;P&gt;Take a packet capture &lt;STRONG&gt;capture ASP-DROP type asp-drop acl-drop&lt;/STRONG&gt; test and then view the output &lt;STRONG&gt;show capture ASP-DROP&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 05 Sep 2020 19:32:57 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-09-05T19:32:57Z</dc:date>
    <item>
      <title>ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146773#M1073613</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Windows IIS server configured behind a Cisco ASA 5512&amp;nbsp; listening on port 80 and 443 currently. Access-list and static translation configured. I have been ask to redirect all port 80 calls to port 443 for this web site only at the firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;inside and outside&amp;nbsp;interface&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ASA outside interface ip 80.80.100.100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ASA inside interface&amp;nbsp;ip 192.168.100.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;local server ip 192.168.100.100 (webserver)&amp;nbsp;outside nated ip 80.80.100.101&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks you&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 12:31:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146773#M1073613</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-05T12:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146789#M1073614</link>
      <description>&lt;P&gt;here is the config which PAT 80 to 443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;static (inside,outside) tcp 80.80.100.100 80 192.168.100.1 443&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list out_in permit tcp any host 80.80.100.100 eq 80&lt;BR /&gt;access-group out_in in interface outside&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 14:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146789#M1073614</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-09-05T14:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146793#M1073615</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this nat option not available in ASA&amp;nbsp;&lt;SPAN&gt;V9.2(2)4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;static (inside,outside) tcp 80.80.100.100 80&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;192.168.100.1 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;only available&lt;/P&gt;&lt;P&gt;+++++++++++++++&lt;/P&gt;&lt;P&gt;object network webser&lt;BR /&gt;nat (inside,outside) static 80.80.100.100&amp;nbsp; ?&lt;/P&gt;&lt;P&gt;dns Use the created xlate to rewrite DNS record&lt;BR /&gt;net-to-net Use Net to net mapping of IPv4 to IPv6 address(es)&lt;BR /&gt;no-proxy-arp Disable proxy ARP on the egress interface&lt;BR /&gt;route-lookup Perform route lookup for this rule&lt;BR /&gt;service Define port mapping&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nat (inside,outside) source static 80.80.100.100 80 ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;description Specify NAT rule description&lt;BR /&gt;destination Destination NAT parameters&lt;BR /&gt;dns Use the created xlate to rewrite DNS record&lt;BR /&gt;inactive Disable a NAT rule&lt;BR /&gt;no-proxy-arp Disable proxy ARP on egress interface&lt;BR /&gt;route-lookup Perform route lookup for this rule&lt;BR /&gt;service NAT service parameters&lt;BR /&gt;unidirectional Enable per-session NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise me&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 14:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146793#M1073615</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-05T14:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146798#M1073616</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Try this:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 192.168.100.1&lt;BR /&gt;&amp;nbsp;nat (INSIDE,OUTSIDE) static 80.80.100.101 service tcp https www&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 15:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146798#M1073616</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-09-05T15:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146817#M1073618</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for the replay&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i can apply the config but . when i brows the website its not&amp;nbsp;&lt;SPAN&gt;redirect to https and the web page&amp;nbsp;not responding&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 17:24:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146817#M1073618</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-05T17:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146820#M1073620</link>
      <description>&lt;P&gt;Please provide the output of "show nat detail"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Run packet-tracer and provide the output, e.g&lt;/P&gt;
&lt;PRE&gt;packet-tracer input outside tcp 8.8.8.8 3000 80.80.100.101 80&lt;/PRE&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 17:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146820#M1073620</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-09-05T17:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146829#M1073624</link>
      <description>&lt;P&gt;I was not looked at the version, Object NAT should work as expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if not working can you please post complete ASA configuration to look. (sometimes your outgoing&amp;nbsp; NAT Policy also need to consider).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try simple Object NAT see if that worsk before you to PAT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;STRONG class="cBold"&gt;object network MyServer&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;STRONG class="cBold"&gt;host&amp;nbsp;192.168.100.1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;STRONG class="cBold"&gt;nat (inside,outside) static 80.80.100.100&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;SPAN&gt;&lt;STRONG class="cBold"&gt;Make sure you also have ACL&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;STRONG class="cBold"&gt;access-list SERVER&amp;nbsp; extended permit tcp any host 192.168.100.1 eq https&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SECTION&gt;
&lt;SECTION class="pEx1_Example1"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;STRONG class="cBold"&gt;access-group SERVER in interface outside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SECTION&gt;
&lt;/SECTION&gt;</description>
      <pubDate>Sat, 05 Sep 2020 18:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146829#M1073624</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-09-05T18:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146836#M1073627</link>
      <description>&lt;P&gt;&lt;SPAN&gt;please see the up comments&amp;nbsp;packet traced and ip&amp;nbsp;192.168.100.1 is ASA inside lan ip and web server local ip is&amp;nbsp;192.168.100.100&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 19:04:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146836#M1073627</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-05T19:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146837#M1073628</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see the logs after the ACL&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3 (inside) to (outside) source static Serdotnet 80.80.100.101 service tcp https www&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 192.168.100.1/32, Translated: 80.80.100.101/32&lt;BR /&gt;Service - Protocol: tcp Real: https Mapped: www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++++++++++++++++++&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Serdotnet&lt;BR /&gt;nat (inside,outside) static 80.80.100.101 service tcp https www&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 80.80.100.101 /80 to 192.168.100.1/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group 101 in interface outside&lt;BR /&gt;access-list 101 extended permit tcp any host 192.168.100.1 eq https&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Serdotnet&lt;BR /&gt;nat (inside,outside) static 80.80.100.101 service tcp https www&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 19:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146837#M1073628</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-05T19:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146838#M1073629</link>
      <description>&lt;P&gt;How is your ACL configured? You need to permit traffic to the real IP address and the real port (443).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 19:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146838#M1073629</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-09-05T19:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146842#M1073630</link>
      <description>&lt;P&gt;Packet is being dropped by implicit rule.&lt;/P&gt;
&lt;P&gt;Take a packet capture &lt;STRONG&gt;capture ASP-DROP type asp-drop acl-drop&lt;/STRONG&gt; test and then view the output &lt;STRONG&gt;show capture ASP-DROP&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Sep 2020 19:32:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146842#M1073630</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-09-05T19:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146914#M1073635</link>
      <description>&lt;P&gt;Good Day&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see the attached logs&amp;nbsp;&lt;/P&gt;&lt;P&gt;i really appreciate your help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;12: 23:01:47.416284 8.8.8.8.3000 &amp;gt; 80.80.100.101.80: S 1459339227:1459339227(0) win 8192&lt;BR /&gt;13: 23:01:47.486592 94.102.49.104.53039 &amp;gt; 80.80.100.101.1738: S 3876038810:3876038810(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;14: 23:01:47.625700 94.102.49.104.53039 &amp;gt; 80.80.100.100.1727: S 140318138:140318138(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;15: 23:01:47.704950 94.102.49.104.53039 &amp;gt; 80.80.100.100.1899: S 2701418419:2701418419(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;16: 23:01:48.061230 94.102.49.104.53039 &amp;gt; 80.80.100.100.1762: S 4098711941:4098711941(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;17: 23:01:48.459494 94.102.49.104.53039 &amp;gt; 80.80.100.101.1763: S 3680801243:3680801243(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;18: 23:01:48.614561 94.102.49.104.53039 &amp;gt; 80.80.100.100.1776: S 3278502262:3278502262(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;19: 23:01:48.854386 94.102.49.104.53039 &amp;gt; 80.80.100.100.1804: S 1204234612:1204234612(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;20: 23:01:48.883697 94.102.49.104.53039 &amp;gt; 80.80.100.101.1803: S 3142025169:3142025169(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;21: 23:01:49.093333 94.102.49.104.53039 &amp;gt; 80.80.100.101.1782: S 2171879152:2171879152(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;22: 23:01:49.798924 94.102.49.104.53039 &amp;gt; 80.80.100.101.1745: S 2114722560:2114722560(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;23: 23:01:49.804661 94.102.49.104.53039 &amp;gt; 80.80.100.101.1839: S 4008870214:4008870214(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;24: 23:01:50.541903 94.102.49.104.53039 &amp;gt; 80.80.100.101.1774: S 3065770109:3065770109(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;25: 23:01:50.581909 94.102.49.104.53039 &amp;gt; 80.80.100.101.1773: S 336971329:336971329(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;26: 23:01:50.999795 94.102.49.104.53039 &amp;gt; 80.80.100.100.1773: S 1569369436:1569369436(0) win 1024 Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 06:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146914#M1073635</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-06T06:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146915#M1073636</link>
      <description>&lt;P&gt;From the output it looks like the connection is not using just tcp/443, you will need to permit the other ports.&lt;/P&gt;
&lt;P&gt;Is this an application or just a website?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 06:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146915#M1073636</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-09-06T06:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146957#M1073642</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes this web site and some other ports also already permitted as per the clients and when the outside hit port&amp;nbsp; 80 shout be&amp;nbsp;&lt;SPAN&gt;redirect to https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i have already&amp;nbsp;redirect URL inside server but i want do it in the firewall also&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;if you can help me i&amp;nbsp; really appreciate &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 11:50:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146957#M1073642</guid>
      <dc:creator>katheer4u</dc:creator>
      <dc:date>2020-09-06T11:50:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA V9.2(2)4 port 80 redirect to https</title>
      <link>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146989#M1073647</link>
      <description>&lt;P&gt;An ASA firewall cannot on its own send an http redirect&amp;nbsp;(e.g., an "http 302" code) to the client that is connecting to an internal server from an external address.&lt;/P&gt;
&lt;P&gt;While PAT can be used to change the destination port in the incoming traffic, that has nothing to do with application layer port redirection.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 14:49:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-v9-2-2-4-port-80-redirect-to-https/m-p/4146989#M1073647</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-09-06T14:49:12Z</dc:date>
    </item>
  </channel>
</rss>

