<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port Forwarding on Cisco ASA problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4921593#M1104162</link>
    <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;I have two Cisco ASA 5585 in failover, Software Version 9.8(3)18.&lt;BR /&gt;I need to make Port Forwarding with NAT for access from outside host through ASA's interface to inside host. I made settings as always, but the access doesn't work.&lt;BR /&gt;There are parts of configuration for this access:&lt;/P&gt;&lt;LI-SPOILER&gt;interface GigabitEthernet0/0.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 50.50.50.50 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;interface GigabitEthernet0/2.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.20.80 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;interface GigabitEthernet0/2.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif inside2&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.30.80 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;object network H_10.10.20.116&lt;BR /&gt;host 10.10.10.116&lt;BR /&gt;...&lt;BR /&gt;object network H_10.10.30.59&lt;BR /&gt;host 10.10.30.59&lt;BR /&gt;...&lt;BR /&gt;object network H_77.77.77.77&lt;BR /&gt;host 77.77.77.77&lt;BR /&gt;...&lt;BR /&gt;object service tcp-8553-port&lt;BR /&gt;service tcp destination eq 8553&lt;BR /&gt;...&lt;BR /&gt;object service outside-40389-port&lt;BR /&gt;service tcp destination eq 40389&lt;BR /&gt;...&lt;BR /&gt;object service inside-3389-port&lt;BR /&gt;service tcp destination eq 3389&lt;BR /&gt;...&lt;BR /&gt;access-list from-outside extended permit tcp any object H_10.10.10.116 eq 8553&lt;BR /&gt;access-list from-outside extended permit tcp host 77.77.77.77 object H_10.10.30.59 eq 3389&lt;BR /&gt;...&lt;BR /&gt;nat (outside,inside) source static any interface destination static interface H_10.10.10.116 service tcp-8553-port tcp-8553-port&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;/LI-SPOILER&gt;&lt;P&gt;There is packet-tracer output for faulty access:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;asa-5585/sec/act(config)# packet-tracer input outside tcp 66.66.66.66 12345 50.50.50.50 8553&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 50.50.50.50 using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group from-outside in interface outside control-plane&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: CLUSTER-REDIRECT&lt;BR /&gt;Subtype: cluster-redirect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4191741927, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;There is packet-tracer output for working access:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;asa-5585/sec/act(config)# packet-tracer input outside tcp 77.77.77.77 12345 50.50.50.50 40389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside2&lt;BR /&gt;Untranslate 50.50.50.50/40389 to 10.10.30.59/3389&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group from-outside in interface outside control-plane&lt;BR /&gt;access-list from-outside extended permit tcp host 77.77.77.77 object H_10.10.30.59 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 77.77.77.77/12345 to 10.10.30.80/12345&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group to-inside2 out interface inside2&lt;BR /&gt;access-list to-inside2 extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4168707154, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;BR /&gt;What did I make wrong? How can I check the issue and renew normal work?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Sep 2023 19:00:56 GMT</pubDate>
    <dc:creator>nEkToSAN</dc:creator>
    <dc:date>2023-09-11T19:00:56Z</dc:date>
    <item>
      <title>Port Forwarding on Cisco ASA problem</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4921593#M1104162</link>
      <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;I have two Cisco ASA 5585 in failover, Software Version 9.8(3)18.&lt;BR /&gt;I need to make Port Forwarding with NAT for access from outside host through ASA's interface to inside host. I made settings as always, but the access doesn't work.&lt;BR /&gt;There are parts of configuration for this access:&lt;/P&gt;&lt;LI-SPOILER&gt;interface GigabitEthernet0/0.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 50.50.50.50 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;interface GigabitEthernet0/2.20&lt;BR /&gt;vlan 20&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.20.80 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;interface GigabitEthernet0/2.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif inside2&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.30.80 255.255.255.0&lt;BR /&gt;...&lt;BR /&gt;object network H_10.10.20.116&lt;BR /&gt;host 10.10.10.116&lt;BR /&gt;...&lt;BR /&gt;object network H_10.10.30.59&lt;BR /&gt;host 10.10.30.59&lt;BR /&gt;...&lt;BR /&gt;object network H_77.77.77.77&lt;BR /&gt;host 77.77.77.77&lt;BR /&gt;...&lt;BR /&gt;object service tcp-8553-port&lt;BR /&gt;service tcp destination eq 8553&lt;BR /&gt;...&lt;BR /&gt;object service outside-40389-port&lt;BR /&gt;service tcp destination eq 40389&lt;BR /&gt;...&lt;BR /&gt;object service inside-3389-port&lt;BR /&gt;service tcp destination eq 3389&lt;BR /&gt;...&lt;BR /&gt;access-list from-outside extended permit tcp any object H_10.10.10.116 eq 8553&lt;BR /&gt;access-list from-outside extended permit tcp host 77.77.77.77 object H_10.10.30.59 eq 3389&lt;BR /&gt;...&lt;BR /&gt;nat (outside,inside) source static any interface destination static interface H_10.10.10.116 service tcp-8553-port tcp-8553-port&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;/LI-SPOILER&gt;&lt;P&gt;There is packet-tracer output for faulty access:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;asa-5585/sec/act(config)# packet-tracer input outside tcp 66.66.66.66 12345 50.50.50.50 8553&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 50.50.50.50 using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group from-outside in interface outside control-plane&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: CLUSTER-REDIRECT&lt;BR /&gt;Subtype: cluster-redirect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4191741927, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;There is packet-tracer output for working access:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;asa-5585/sec/act(config)# packet-tracer input outside tcp 77.77.77.77 12345 50.50.50.50 40389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside2&lt;BR /&gt;Untranslate 50.50.50.50/40389 to 10.10.30.59/3389&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group from-outside in interface outside control-plane&lt;BR /&gt;access-list from-outside extended permit tcp host 77.77.77.77 object H_10.10.30.59 eq 3389&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 77.77.77.77/12345 to 10.10.30.80/12345&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group to-inside2 out interface inside2&lt;BR /&gt;access-list to-inside2 extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,inside2) source static any interface destination static interface H_10.10.30.59 service outside-40389-port inside-3389-port&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 4168707154, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside2&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;&lt;BR /&gt;What did I make wrong? How can I check the issue and renew normal work?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 19:00:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4921593#M1104162</guid>
      <dc:creator>nEkToSAN</dc:creator>
      <dc:date>2023-09-11T19:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding on Cisco ASA problem</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4921619#M1104167</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1168693"&gt;@nEkToSAN&lt;/a&gt; remove your existing rule and add the following:&lt;/P&gt;
&lt;PRE&gt;object network H_10.10.10.116&lt;BR /&gt;&amp;nbsp;host 10.10.10.116&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp-8553-port tcp-8553-port&lt;/PRE&gt;
&lt;P&gt;then try again and provide packet-tracer if it does not work. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Sep 2023 19:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4921619#M1104167</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-11T19:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding on Cisco ASA problem</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4922052#M1104185</link>
      <description>&lt;P&gt;I tried that. And the result is:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;asa-5585/sec/act# packet-tracer input outside tcp 66.66.66.66 12345 50.50.50.50 8553&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 50.50.50.50 using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group from-outside in interface outside control-plane&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: CLUSTER-REDIRECT&lt;BR /&gt;Subtype: cluster-redirect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-EXPORT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 26626876, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;... the same(.&lt;BR /&gt;&lt;BR /&gt;Maybe there are any additional settings in the configuration, which can affect&amp;nbsp;the settings I need? But I cheched several times the config, and, in my opinion, the settings for "inside" and "inside2" are the same.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 12:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-on-cisco-asa-problem/m-p/4922052#M1104185</guid>
      <dc:creator>nEkToSAN</dc:creator>
      <dc:date>2023-09-12T12:56:00Z</dc:date>
    </item>
  </channel>
</rss>

