<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA port forwarding issue only with https in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042695#M1109997</link>
    <description>&lt;P&gt;now .. i changed from auto nat to manual nat as&amp;nbsp; MHM suggested.. but still has issue&lt;/P&gt;</description>
    <pubDate>Mon, 18 Mar 2024 14:17:25 GMT</pubDate>
    <dc:creator>Chan Thar</dc:creator>
    <dc:date>2024-03-18T14:17:25Z</dc:date>
    <item>
      <title>ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5039868#M1109885</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;&lt;P&gt;I am experiencing a port forwarding issue.We want a internal server's https web page to expose public access.&lt;/P&gt;&lt;P&gt;The thing is - it is still not sucess.&lt;/P&gt;&lt;P&gt;1. Other ports are working perfect except 443.&lt;/P&gt;&lt;P&gt;2. Tested multiple same internal servers .. only 443 is happening .. Local 443 services are running and tested.&lt;/P&gt;&lt;P&gt;3. Sometimes, really sometimes, I got the https webpage access for a while. No one is making changes at that time.&lt;/P&gt;&lt;P&gt;4. The public ip has no other https service port forwarding . checked all.&lt;/P&gt;&lt;P&gt;5. Port testing with telnet and tcping is showing open.&lt;/P&gt;&lt;P&gt;6.Configuration is fine since it's simple.&lt;/P&gt;&lt;P&gt;7. show Conn , show NAT commands&amp;nbsp; are showing logs when accessed.&lt;/P&gt;&lt;P&gt;8. NAT, ACL rules are hitting when accessed&lt;/P&gt;&lt;P&gt;9. Internet&lt;/P&gt;&lt;P&gt;Can you someone share me similar cases or helpful troubleshooting ?&lt;/P&gt;&lt;P&gt;ASA 5525 , version 9.8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 15:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5039868#M1109885</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-14T15:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5039879#M1109886</link>
      <description>&lt;P&gt;Share&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show nat&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And packet-capture&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 16:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5039879#M1109886</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-14T16:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5039888#M1109887</link>
      <description>&lt;P&gt;If the ASA Using 443 Address for any other services - so&amp;nbsp; that may not work, so better test with Different port (to confirm that port-forwarding working)&lt;/P&gt;
&lt;P&gt;example use 8443 to internal Server 443 is that works ?&lt;/P&gt;
&lt;P&gt;or change on ASA&amp;nbsp; 443 IP address to 8443 so that port get free to port-forward your request.&lt;/P&gt;
&lt;P&gt;if this is not the case then we would like to see your config and NAT config ? and show output while translating.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 16:13:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5039888#M1109887</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-03-14T16:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040346#M1109902</link>
      <description>&lt;P&gt;&lt;BR /&gt;DC1-A5K-FW1/sec# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (LAN) to (INTERNET) source static MDC MDC destination static VPNPOOL VPNPOOL no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 1, untranslate_hits = 1&lt;BR /&gt;2 (LAN) to (WAN) source static MDC MDC destination static BRANCH BRANCH&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (DMZ) to (WAN) source static DMZ DMZ destination static BRANCH BRANCH&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (DMZ) to (INTERNET) source static DMZ1 DMZ1 destination static VPNPOOL VPNPOOL no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (DMZ) to (INTERNET) source dynamic DMZ interface&lt;BR /&gt;translate_hits = 8208, untranslate_hits = 20&lt;BR /&gt;6 (LAN) to (INTERNET) source dynamic EX-SVR interface&lt;BR /&gt;translate_hits = 4615, untranslate_hits = 4&lt;BR /&gt;7 (LAN) to (INTERNET) source dynamic MDC interface&lt;BR /&gt;translate_hits = 894987, untranslate_hits = 70994&lt;BR /&gt;8 (LAN) to (INTERNET) source dynamic SVR3 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;9 (INTERNET) to (LAN) source static any any destination static MailIP EX_SERVER service https https no-proxy-arp inactive&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;10 (INTERNET) to (LAN) source static any any destination static MailIP EXCHANGE_SVR service https https unidirectional no-proxy-arp inactive&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (LAN) to (INTERNET) source static EXCHANGE_SVR X.X.164.60 service tcp https https&lt;BR /&gt;translate_hits = 0, untranslate_hits = 17&lt;BR /&gt;2 (LAN) to (WAN) source static SHAREPOINT_SERVER interface service tcp www www&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (LAN) to (INTERNET) source static EX_SVR3_110 X.X.164.60 service tcp pop3 pop3&lt;BR /&gt;translate_hits = 0, untranslate_hits = 7736&lt;BR /&gt;4 (LAN) to (INTERNET) source static EX_SVR3_587 X.X.164.60 service tcp 587 587&lt;BR /&gt;translate_hits = 0, untranslate_hits = 196&lt;BR /&gt;5 (LAN) to (INTERNET) source static HRDB_SERVER X.X.164.61 service tcp 8003 8003&lt;BR /&gt;translate_hits = 0, untranslate_hits = 1133&lt;BR /&gt;6 (LAN) to (INTERNET) source static TEST_SVR X.X.164.60 service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 6551&lt;BR /&gt;7 (DMZ) to (WAN) source static FTP_SERVER 10.1.255.131&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (DMZ) to (INTERNET) source static FORTIMAIL_8889 X.X.164.60 service udp 8889 8889&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;9 (DMZ) to (INTERNET) source static FORTIMAIL_9443 X.X.164.60 service udp 9443 9443&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;10 (DMZ) to (INTERNET) source static FORTI_MAIL X.X.164.60 service tcp smtp smtp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 78928&lt;BR /&gt;11 (DMZ) to (INTERNET) source static HRWEB_HTTPS X.X.164.61 service tcp https 8443&lt;BR /&gt;translate_hits = 0, untranslate_hits = 371&lt;BR /&gt;12 (DMZ) to (INTERNET) source static HRWEB_SERVER interface service tcp telnet telnet&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;13 (DMZ) to (INTERNET) source static AMSWeb X.X.164.61 service tcp 3389 8339&lt;BR /&gt;translate_hits = 0, untranslate_hits = 6189&lt;BR /&gt;14 (DMZ) to (INTERNET) source static MACWEB X.X.164.61 service tcp https https&lt;BR /&gt;translate_hits = 0, untranslate_hits = 1155&lt;BR /&gt;15 (DMZ) to (INTERNET) source static MACWeb X.X.164.61 service tcp 3389 8340&lt;BR /&gt;translate_hits = 0, untranslate_hits = 5705&lt;BR /&gt;16 (LAN) to (INTERNET) source static EX_SVR_110 MailIP service tcp pop3 pop3&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;17 (LAN) to (INTERNET) source static EX_SVR_143 MailIP service tcp imap4 imap4&lt;BR /&gt;translate_hits = 0, untranslate_hits = 25&lt;BR /&gt;18 (LAN) to (INTERNET) source static EX_SVR_587 MailIP service tcp 587 587&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;19 (LAN) to (INTERNET) source dynamic VLAN67-MPT interface&lt;BR /&gt;translate_hits = 222, untranslate_hits = 10&lt;BR /&gt;20 (LAN) to (TML) source dynamic VLAN67-TML interface&lt;BR /&gt;translate_hits = 266486, untranslate_hits = 2211&lt;BR /&gt;21 (LAN) to (INTERNET) source dynamic VLAN68-MPT interface&lt;BR /&gt;translate_hits = 34, untranslate_hits = 0&lt;BR /&gt;22 (LAN) to (TML) source dynamic VLAN68-TML interface&lt;BR /&gt;translate_hits = 56345, untranslate_hits = 176&lt;BR /&gt;23 (LAN) to (INTERNET) source dynamic VLAN69-MPT interface&lt;BR /&gt;translate_hits = 2103, untranslate_hits = 1480&lt;BR /&gt;24 (LAN) to (TML) source dynamic VLAN69-TML interface&lt;BR /&gt;translate_hits = 833532, untranslate_hits = 7278&lt;BR /&gt;25 (LAN) to (INTERNET) source dynamic VLAN200-MPT interface&lt;BR /&gt;translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;26 (LAN) to (TML) source dynamic VLAN200-TML interface&lt;BR /&gt;translate_hits = 18855, untranslate_hits = 16&lt;BR /&gt;27 (LAN) to (INTERNET) source dynamic VLAN201-MPT interface&lt;BR /&gt;translate_hits = 1660, untranslate_hits = 12&lt;BR /&gt;28 (LAN) to (TML) source dynamic VLAN201-TML interface&lt;BR /&gt;translate_hits = 503079, untranslate_hits = 2714&lt;BR /&gt;29 (LAN) to (INTERNET) source dynamic VLAN202-MPT interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;30 (LAN) to (TML) source dynamic VLAN202-TML interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;31 (LAN) to (INTERNET) source dynamic VLAN203-MPT interface&lt;BR /&gt;translate_hits = 96, untranslate_hits = 0&lt;BR /&gt;32 (LAN) to (TML) source dynamic VLAN203-TML interface&lt;BR /&gt;translate_hits = 43753, untranslate_hits = 46&lt;BR /&gt;33 (LAN) to (INTERNET) source dynamic VLAN204-MPT interface&lt;BR /&gt;translate_hits = 7, untranslate_hits = 0&lt;BR /&gt;34 (LAN) to (TML) source dynamic VLAN204-TML interface&lt;BR /&gt;translate_hits = 25981, untranslate_hits = 9&lt;BR /&gt;35 (LAN) to (INTERNET) source dynamic VLAN205-MPT interface&lt;BR /&gt;translate_hits = 43, untranslate_hits = 0&lt;BR /&gt;36 (LAN) to (TML) source dynamic VLAN205-TML interface&lt;BR /&gt;translate_hits = 60004, untranslate_hits = 0&lt;BR /&gt;37 (LAN) to (INTERNET) source dynamic VLAN206-MPT interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;38 (LAN) to (TML) source dynamic VLAN206-TML interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (LAN) to (WAN) source dynamic MDC interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (LAN) to (TML) source dynamic MDC interface&lt;BR /&gt;translate_hits =&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;DC1-A5K-FW1/sec# packet-tracer input INTERNET tcp 103.101.16.102 https 136.228$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network EXCHANGE_SVR&lt;BR /&gt;nat (LAN,INTERNET) static 136.228.164.60 service tcp https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface LAN&lt;BR /&gt;Untranslate 136.228.164.60/443 to 10.1.103.21/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group INTERNET_IN in interface INTERNET&lt;BR /&gt;access-list INTERNET_IN extended permit tcp any host 10.1.103.21 eq https&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map firePOWER-class&lt;BR /&gt;description class to send all traffic to the Firepower module&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class firePOWER-class&lt;BR /&gt;sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map firePOWER-class&lt;BR /&gt;description class to send all traffic to the Firepower module&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class firePOWER-class&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (LAN,INTERNET) source dynamic EX-SVR interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 8052151, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INTERNET&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LAN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;DC1-A5K-FW1/sec#&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:00:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040346#M1109902</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-15T07:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040368#M1109904</link>
      <description>&lt;P&gt;DC1-A5K-FW1/sec# packet-tracer input INTERNET tcp 103.101.16.102 https 136.228$ &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&amp;lt;&amp;lt;- can I see full packet-tracer you use&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;the NAT is not correct the Inbound is use NAT different than Outbound,&amp;nbsp;&lt;BR /&gt;Use &lt;FONT color="#00FF00"&gt;Manual NAT &lt;FONT color="#000000"&gt;instead Auto NAT&amp;nbsp;&lt;/FONT&gt;&lt;/FONT&gt;&lt;BR /&gt;Phase: 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: UN-NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: static&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;object network EXCHANGE_SVR&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (LAN,INTERNET) static 136.228.164.60 service tcp https https &lt;FONT color="#00FF00"&gt;&amp;lt;&amp;lt;- Auto NAT, change it to Manual NAT&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;NAT divert to egress interface LAN&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Untranslate 136.228.164.60/443 to 10.1.103.21/443&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (LAN,INTERNET) source dynamic EX-SVR interface&lt;BR /&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040368#M1109904</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-15T07:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040374#M1109905</link>
      <description>&lt;P&gt;packet-tracer input outside tcp 103.101.16.102 443 136.228.164.60 443&lt;/P&gt;&lt;P&gt;this is full command line&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:16:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040374#M1109905</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-15T07:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040400#M1109906</link>
      <description>&lt;P&gt;OK, change the NAT you use as I mention above&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040400#M1109906</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-15T07:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040422#M1109907</link>
      <description>&lt;P&gt;nat (LAN,INTERNET) source static EXCHANGE_SVR WEB-SERVER_PUBLIC service https https&lt;/P&gt;&lt;P&gt;i configured manual nat and port is not even opening.&lt;/P&gt;&lt;P&gt;DC1-A5K-FW1/sec# packet-tracer input INTERNET tcp 103.101.16.102 443 136.228$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (LAN,INTERNET) source static EXCHANGE_SVR WEB-SERVER_PUBLIC service https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface LAN&lt;BR /&gt;Untranslate 136.228.164.60/443 to 10.1.103.21/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group INTERNET_IN in interface INTERNET&lt;BR /&gt;access-list INTERNET_IN extended permit tcp any host 10.1.103.21 eq https&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (LAN,INTERNET) source static EXCHANGE_SVR WEB-SERVER_PUBLIC service https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 103.101.16.102/443 to 103.101.16.102/443&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map firePOWER-class&lt;BR /&gt;description class to send all traffic to the Firepower module&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class firePOWER-class&lt;BR /&gt;sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map firePOWER-class&lt;BR /&gt;description class to send all traffic to the Firepower module&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class firePOWER-class&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (LAN,INTERNET) source dynamic EX-SVR interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 8237271, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INTERNET&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LAN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;DC1-A5K-FW1/sec#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040422#M1109907</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-15T07:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040425#M1109908</link>
      <description>&lt;P&gt;i am just wondering if it may be ASA version bug or something like that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 07:56:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040425#M1109908</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-15T07:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040541#M1109910</link>
      <description>&lt;P&gt;&lt;SPAN&gt;this phase meaning the flow add to conn&amp;nbsp;&lt;BR /&gt;Phase: 12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Type: FLOW-CREATION&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;New flow created with id 8237271, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;can you share the&amp;nbsp;&lt;BR /&gt;show conn address &amp;lt;server&amp;gt;\&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;if there is no entry try&amp;nbsp;&lt;BR /&gt;show conn protocol&amp;nbsp;443&lt;BR /&gt;&lt;BR /&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 09:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5040541#M1109910</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-15T09:21:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042690#M1109995</link>
      <description>&lt;P&gt;DC1-A5K-FW1/sec# show conn address 10.1.103.21&lt;BR /&gt;191 in use, 16507 most used&lt;/P&gt;&lt;P&gt;TCP INTERNET 74.125.200.95:443 LAN 10.1.103.21:49510, idle 0:00:00, bytes 10727, flags UxIO&lt;/P&gt;&lt;P&gt;sorry for my late data ..thanks for help&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 14:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042690#M1109995</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-18T14:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042695#M1109997</link>
      <description>&lt;P&gt;now .. i changed from auto nat to manual nat as&amp;nbsp; MHM suggested.. but still has issue&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 14:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042695#M1109997</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-18T14:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042799#M1110002</link>
      <description>&lt;P&gt;Did you check the suggestion made by &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt; ?&lt;/P&gt;
&lt;P&gt;For instance, if you have remote access SSL VPN enabled that will bind tcp/443 for that purpose and it will not be usable for other services.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 15:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042799#M1110002</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2024-03-18T15:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042830#M1110005</link>
      <description>&lt;P&gt;yes. i already tried disabling ssl webvpn config interface level "no enable INTERFACE" .. But still same issue.&lt;/P&gt;&lt;P&gt;Strange behavior for me this issue is sometimes expected webpage can be accessed. as per my testing, this is not browser,ip, public ip , isp not related.. it just pop up when continuously refreshed.. any other ports are working.. just 443 is issue. since internal server is not easy to change port for web service.. i still finding solution.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 16:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5042830#M1110005</guid>
      <dc:creator>Chan Thar</dc:creator>
      <dc:date>2024-03-18T16:10:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5043080#M1110008</link>
      <description>&lt;P&gt;Setup a capture on the LAN interface an see if the traffic is actually leaving the ASA interface&lt;/P&gt;
&lt;P&gt;cap capLAN interface LAN tcp any&amp;nbsp;&lt;SPAN&gt;host&amp;nbsp;10.1.103.21 eq 443&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;show cap&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;show cap capLAN&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you know the IP of the source you can change any to host aaa.bbb.ccc.ddd&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you do not see any packets being captured change the the capture from tcp to ip (remove eq 443 also) and then test again.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Post the results here&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 19:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5043080#M1110008</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-03-18T19:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA port forwarding issue only with https</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5043108#M1110010</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;packet-tracer input outside tcp 103.101.16.102 443 136.228.164.60 443&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Phase: 1&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Type: UN-NAT&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Subtype: static&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;nat (LAN,INTERNET) source static EXCHANGE_SVR WEB-SERVER_PUBLIC service https https&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;NAT divert to egress interface LAN&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Untranslate 136.228.164.60/443 to 10.1.103.21/443&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;DC1-A5K-FW1/sec# show conn address 10.1.103.21&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;191 in use, 16507 most used&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;TCP INTERNET 74.125.200.95:&lt;FONT color="#FF0000"&gt;&lt;U&gt;443&lt;/U&gt; &lt;/FONT&gt;LAN 10.1.103.21:49510,&lt;U&gt;&lt;FONT color="#00FF00"&gt; idle 0:00:00&lt;/FONT&gt;&lt;/U&gt;, &lt;FONT color="#3366FF"&gt;&lt;U&gt;bytes 10727&lt;/U&gt;&lt;/FONT&gt;, flags &lt;FONT color="#993366"&gt;&lt;U&gt;UxIO &amp;lt;&amp;lt;- this Outbound not Inbound&lt;BR /&gt;&lt;BR /&gt;&lt;/U&gt;&lt;/FONT&gt;from all above it seem to me that there is Host have IP&amp;nbsp;10.1.103.21 connect to internet via HTTP&lt;BR /&gt;and not server access from outside&lt;BR /&gt;&lt;BR /&gt;i.e. there is IP conflict&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;MHM&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 19:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue-only-with-https/m-p/5043108#M1110010</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-18T19:49:14Z</dc:date>
    </item>
  </channel>
</rss>

