<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT with port translation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3693584#M12778</link>
    <description>&lt;P&gt;Thank you for your reply. I would like to explain further of my problem. I did apply a acl but there had an unexpected situation.&amp;nbsp; I want any IP address from outside2 with prot80 translated to 10.0.0.1:81 only. But for my NAT setting, IP address with any port number (443, 22, 23....) will translate to port 81 too. Here is my NAT configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network cisco &lt;BR /&gt;host 10.0.0.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service TCP_81&lt;BR /&gt; service tcp destination eq 81&lt;BR /&gt; &lt;BR /&gt;object service TCP_80&lt;BR /&gt; service tcp destination eq 80&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service TCP_2010&lt;BR /&gt; service tcp destination eq 2010&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object service TCP_2020&lt;BR /&gt; service tcp destination eq 2020&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object-group service NAT_ACL&lt;BR /&gt; service-object object TCP_2010 &lt;BR /&gt; service-object object TCP_2020 &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object tcp destination eq 81&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list Outside2_access_in extended permit object-group NAT_ACL any4 object cisco log &lt;BR /&gt; &lt;BR /&gt;access-group Outside2_access_in in interface Outside2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (Outside2,DMZ) source static any any destination static cisco cisco service TCP_80 TCP_81&lt;/P&gt;</description>
    <pubDate>Thu, 23 Aug 2018 09:20:29 GMT</pubDate>
    <dc:creator>raymand.hau</dc:creator>
    <dc:date>2018-08-23T09:20:29Z</dc:date>
    <item>
      <title>ASA NAT with port translation</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3691853#M12770</link>
      <description>&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Helvetica','sans-serif'; color: #58585b;"&gt;Hi all, I have tried to created a NAT that any ip address from outside2&amp;nbsp;with port number 80 translate to DMZ 10.0.0.1:81. This is a part of my configuration. I would like to know the behaviour of NAT with port translation. If a ip address x.x.x.x:443 come from outside 2 then it will not translate to 10.0.0.1:81 and drop the traffic, right? Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Helvetica','sans-serif'; color: #58585b;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;STRONG style="box-sizing: border-box;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Helvetica','sans-serif'; color: #58585b;"&gt;object network cisco&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Helvetica','sans-serif'; color: #58585b;"&gt;&lt;BR style="box-sizing: border-box;" /&gt; &lt;STRONG style="box-sizing: border-box;"&gt;&lt;SPAN style="font-family: 'Helvetica','sans-serif';"&gt;host 10.0.0.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Helvetica','sans-serif'; color: #58585b;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; margin-bottom: .0001pt; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px;"&gt;&lt;STRONG style="box-sizing: border-box;"&gt;&lt;SPAN style="font-size: 9.0pt; font-family: 'Helvetica','sans-serif'; color: #58585b;"&gt;nat (Outside2,DMZ) source static any any destination static cisco cisco service TCP_80 TCP_81&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3691853#M12770</guid>
      <dc:creator>raymand.hau</dc:creator>
      <dc:date>2020-02-21T16:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT with port translation</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3691874#M12773</link>
      <description>&lt;P&gt;a port forward/NAT needs to be accompanied with an access list, so if you port forward tcp/80&amp;nbsp; the your acl will need to allow port 80 to the real IP address,&amp;nbsp; if that does not include port 443, then yes it will get dropped.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Aug 2018 04:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3691874#M12773</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-08-21T04:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT with port translation</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3693584#M12778</link>
      <description>&lt;P&gt;Thank you for your reply. I would like to explain further of my problem. I did apply a acl but there had an unexpected situation.&amp;nbsp; I want any IP address from outside2 with prot80 translated to 10.0.0.1:81 only. But for my NAT setting, IP address with any port number (443, 22, 23....) will translate to port 81 too. Here is my NAT configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network cisco &lt;BR /&gt;host 10.0.0.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service TCP_81&lt;BR /&gt; service tcp destination eq 81&lt;BR /&gt; &lt;BR /&gt;object service TCP_80&lt;BR /&gt; service tcp destination eq 80&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service TCP_2010&lt;BR /&gt; service tcp destination eq 2010&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object service TCP_2020&lt;BR /&gt; service tcp destination eq 2020&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object-group service NAT_ACL&lt;BR /&gt; service-object object TCP_2010 &lt;BR /&gt; service-object object TCP_2020 &lt;BR /&gt; service-object tcp destination eq https &lt;BR /&gt; service-object tcp destination eq 81&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list Outside2_access_in extended permit object-group NAT_ACL any4 object cisco log &lt;BR /&gt; &lt;BR /&gt;access-group Outside2_access_in in interface Outside2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (Outside2,DMZ) source static any any destination static cisco cisco service TCP_80 TCP_81&lt;/P&gt;</description>
      <pubDate>Thu, 23 Aug 2018 09:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-port-translation/m-p/3693584#M12778</guid>
      <dc:creator>raymand.hau</dc:creator>
      <dc:date>2018-08-23T09:20:29Z</dc:date>
    </item>
  </channel>
</rss>

