<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic sorry, how can I contact by in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038257#M134876</link>
    <description>&lt;P&gt;sorry, how can I contact by private???? by the way, I´m in EST too...&lt;/P&gt;</description>
    <pubDate>Fri, 09 Jun 2017 01:41:57 GMT</pubDate>
    <dc:creator>gasparmenendez</dc:creator>
    <dc:date>2017-06-09T01:41:57Z</dc:date>
    <item>
      <title>ASA 5580 port forwarding new problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038247#M134865</link>
      <description>&lt;P&gt;Hi friends,&lt;/P&gt;
&lt;P&gt;I'm trying to reach ports 1930 and 1946 on a PC on my LAN from the internet. PC is accessing internet through outside interface. I'm mapping port 1930 to 11930 and 1946 to 11946. The problem is that this is not workig...Here's my NAT and Packet Tracer:&lt;/P&gt;
&lt;P&gt;ASA5580# sh nat &lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (INSIDE_Prueba) to (OUTSIDE) source dynamic 172.X.X.0 interface &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 17722513, untranslate_hits = 3825414&lt;BR /&gt;2 (INSIDE_Prueba) to (OUTSIDE) source dynamic any interface &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2862, untranslate_hits = 0&lt;BR /&gt;3 (CMTS) to (OUTSIDE) source dynamic 10.19.0.0 170.X.X.16 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 4766354, untranslate_hits = 1770891&lt;BR /&gt;4 (CMTS) to (OUTSIDE) source dynamic 10.27.0.0 170.X.X.17 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 29690167, untranslate_hits = 8198483&lt;BR /&gt;5 (CMTS) to (OUTSIDE) source dynamic 10.25.0.0 170.X.X.18 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 918075, untranslate_hits = 242734&lt;BR /&gt;6 (CMTS) to (OUTSIDE) source dynamic 10.9.0.0 170.X.X.9 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 28978302, untranslate_hits = 10294354&lt;BR /&gt;7 (CMTS) to (OUTSIDE) source dynamic 10.39.0.0 170.X.X.20 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 29606416, untranslate_hits = 9081192&lt;BR /&gt;8 (CMTS) to (OUTSIDE) source dynamic 10.11.0.0 170.X.X.11 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 53391770, untranslate_hits = 17761505&lt;BR /&gt;9 (CMTS) to (OUTSIDE) source dynamic 10.35.0.0 170.X.X.22 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 20305477, untranslate_hits = 6105534&lt;BR /&gt;10 (CMTS) to (OUTSIDE) source dynamic 10.33.0.0 170.X.X.23 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 6802561, untranslate_hits = 2604976&lt;BR /&gt;11 (CMTS) to (OUTSIDE) source dynamic 10.13.0.0 170.X.X.13 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 6120965, untranslate_hits = 2759715&lt;BR /&gt;12 (CMTS) to (OUTSIDE) source dynamic 10.17.0.0 170.X.X.25 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 14523516, untranslate_hits = 4719833&lt;BR /&gt;13 (CMTS) to (OUTSIDE) source dynamic 10.37.0.0 170.X.X.26 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 5232113, untranslate_hits = 2234926&lt;BR /&gt;14 (CMTS) to (OUTSIDE) source dynamic 10.41.0.0 170.X.X.27 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1279407, untranslate_hits = 339487&lt;BR /&gt;15 (CMTS) to (OUTSIDE) source dynamic 10.45.0.0 170.X.X.28 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 25311146, untranslate_hits = 8981529&lt;BR /&gt;16 (CMTS) to (OUTSIDE) source dynamic 10.33.0.0 170.X.X.29 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;17 (CMTS) to (OUTSIDE) source dynamic 10.45.0.0 170.X.X.19 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;18 (CMTS) to (OUTSIDE) source dynamic 10.47.0.0 170.X.X.21 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 27731917, untranslate_hits = 9972706&lt;BR /&gt;19 (CMTS) to (OUTSIDE) source dynamic 10.49.0.0 170.X.X.24 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3596176, untranslate_hits = 1267521&lt;BR /&gt;20 (CMTS) to (OUTSIDE) source dynamic 10.51.0.0 170.X.X.30 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3759, untranslate_hits = 403&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (CARRIERS) to (OUTSIDE) source static CentroValle_1930 interface&amp;nbsp;&amp;nbsp; service tcp 1930 11930 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (CARRIERS) to (OUTSIDE) source static CentroValle_1946 interface&amp;nbsp;&amp;nbsp; service tcp 1946 11946 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (CARRIERS) to (OUTSIDE) source static Prueba-10.227.225.210 170.X.X.3&amp;nbsp;&amp;nbsp; service tcp 3389 13389 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 40&lt;BR /&gt;4 (INSIDE_Prueba) to (OUTSIDE) source static ALTAI 170.X.X.4 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1060724&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (CARRIERS) to (OUTSIDE) source dynamic any interface &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 73502076, untranslate_hits = 10380482&lt;BR /&gt;ASA5580#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA5580# packet-tracer input outside tcp 3.3.3.3 12345 170.X.X.2 11930&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 170.X.X.2&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm seeing "Drop-reason: (acl-drop) Flow is denied by configured rule", but what rule??? Can anybody help me please??&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;BR.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:28:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038247#M134865</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2019-03-12T09:28:57Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038248#M134866</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Can you paste your acl config?&lt;/P&gt;
&lt;P&gt;Packet-tracer is saying that ACL is dropping that traffic.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 17:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038248#M134866</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-08T17:39:03Z</dc:date>
    </item>
    <item>
      <title>here are the acl config:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038249#M134867</link>
      <description>&lt;P&gt;here are the acl config:&lt;/P&gt;
&lt;P&gt;access-list CARRIERS_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;access-list CARRIERS_access_out extended permit ip any 10.227.224.0 255.255.252.0 &lt;BR /&gt;access-list OUTSIDE_access_in remark Prueba&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.210 eq 3389 &lt;BR /&gt;access-list OUTSIDE_access_in remark ALTAI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any object 172.X.X.22 &lt;BR /&gt;access-list OUTSIDE_access_in remark Centro Valle&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.20 eq 1930 &lt;BR /&gt;access-list OUTSIDE_access_in remark Centro Valle&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.20 eq 1946 &lt;BR /&gt;access-list INSIDE_Prueba_access_in extended permit ip 192.168.62.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE_Prueba_access_in extended permit ip object 172.X.X.0 any&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 18:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038249#M134867</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-08T18:05:44Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038250#M134868</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you share your config please?&lt;/P&gt;
&lt;P&gt;On the nat statement I see the object&amp;nbsp;&lt;SPAN&gt;CentroValle_1930 for tcp/1930 and on your acl it's object &amp;nbsp;10.227.225.20. I can't say if this is the same object.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can remove all password in your config and change your public IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:00:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038250#M134868</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-08T20:00:30Z</dc:date>
    </item>
    <item>
      <title>Here it is:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038251#M134869</link>
      <description>&lt;P&gt;Here it is:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ASA5580# sh running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(5) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA5580&lt;BR /&gt;enable password X encrypted&lt;BR /&gt;passwd X encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.44 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/0&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/2&lt;BR /&gt;&amp;nbsp;nameif CARRIERS&lt;BR /&gt;&amp;nbsp;security-level 30&lt;BR /&gt;&amp;nbsp;ip address 10.227.224.3 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/3&lt;BR /&gt;&amp;nbsp;nameif INSIDE_Prueba&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 192.168.62.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet5/0&lt;BR /&gt;&amp;nbsp;nameif CMTS&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.61.9 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet5/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet7/0&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address X.X.X.2 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet7/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network 10.19.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.19.0.0 255.255.0.0&lt;BR /&gt;object network X.X.X.3&lt;BR /&gt;&amp;nbsp;host X.X.X.3&lt;BR /&gt;object network X.X.X.4&lt;BR /&gt;&amp;nbsp;host X.X.X.4&lt;BR /&gt;object network X.X.X.5&lt;BR /&gt;&amp;nbsp;host X.X.X.5&lt;BR /&gt;object network X.X.X.6&lt;BR /&gt;&amp;nbsp;host X.X.X.6&lt;BR /&gt;object network X.X.X.7&lt;BR /&gt;&amp;nbsp;host X.X.X.7&lt;BR /&gt;object network X.X.X.8&lt;BR /&gt;&amp;nbsp;host X.X.X.8&lt;BR /&gt;object network X.X.X.9&lt;BR /&gt;&amp;nbsp;host X.X.X.9&lt;BR /&gt;object network X.X.X.10&lt;BR /&gt;&amp;nbsp;host X.X.X.10&lt;BR /&gt;object network X.X.X.11&lt;BR /&gt;&amp;nbsp;host X.X.X.11&lt;BR /&gt;object network X.X.X.12&lt;BR /&gt;&amp;nbsp;host X.X.X.12&lt;BR /&gt;object network X.X.X.13&lt;BR /&gt;&amp;nbsp;host X.X.X.13&lt;BR /&gt;object network X.X.X.14&lt;BR /&gt;&amp;nbsp;host X.X.X.14&lt;BR /&gt;object network 10.27.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.27.0.0 255.255.0.0&lt;BR /&gt;object network 10.25.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.25.0.0 255.255.0.0&lt;BR /&gt;object network 10.9.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.9.0.0 255.255.0.0&lt;BR /&gt;object network 10.39.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.39.0.0 255.255.0.0&lt;BR /&gt;object network 10.11.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.11.0.0 255.255.0.0&lt;BR /&gt;object network 10.35.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.35.0.0 255.255.0.0&lt;BR /&gt;object network 10.33.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.33.0.0 255.255.0.0&lt;BR /&gt;object network 10.13.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.13.0.0 255.255.0.0&lt;BR /&gt;object network 10.17.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.17.0.0 255.255.0.0&lt;BR /&gt;object network 10.37.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.37.0.0 255.255.0.0&lt;BR /&gt;object network Pool_CMTS&lt;BR /&gt;&amp;nbsp;range X.X.X.32 X.X.X.47&lt;BR /&gt;object network 10.41.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.41.0.0 255.255.0.0&lt;BR /&gt;object network 10.45.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.45.0.0 255.255.0.0&lt;BR /&gt;object network X.X.X.16&lt;BR /&gt;&amp;nbsp;host X.X.X.16&lt;BR /&gt;object network X.X.X.17&lt;BR /&gt;&amp;nbsp;host X.X.X.17&lt;BR /&gt;object network X.X.X.18&lt;BR /&gt;&amp;nbsp;host X.X.X.18&lt;BR /&gt;object network X.X.X.19&lt;BR /&gt;&amp;nbsp;host X.X.X.19&lt;BR /&gt;object network X.X.X.20&lt;BR /&gt;&amp;nbsp;host X.X.X.20&lt;BR /&gt;object network X.X.X.21&lt;BR /&gt;&amp;nbsp;host X.X.X.21&lt;BR /&gt;object network X.X.X.22&lt;BR /&gt;&amp;nbsp;host X.X.X.22&lt;BR /&gt;object network X.X.X.23&lt;BR /&gt;&amp;nbsp;host X.X.X.23&lt;BR /&gt;object network X.X.X.24&lt;BR /&gt;&amp;nbsp;host X.X.X.24&lt;BR /&gt;object network X.X.X.25&lt;BR /&gt;&amp;nbsp;host X.X.X.25&lt;BR /&gt;object network 10.47.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.47.0.0 255.255.0.0&lt;BR /&gt;object network X.X.X.26&lt;BR /&gt;&amp;nbsp;host X.X.X.26&lt;BR /&gt;object network X.X.X.27&lt;BR /&gt;&amp;nbsp;host X.X.X.27&lt;BR /&gt;object network X.X.X.28&lt;BR /&gt;&amp;nbsp;host X.X.X.28&lt;BR /&gt;object network X.X.X.29&lt;BR /&gt;&amp;nbsp;host X.X.X.29&lt;BR /&gt;object network X.X.X.30&lt;BR /&gt;&amp;nbsp;host X.X.X.30&lt;BR /&gt;object network X.X.X.31&lt;BR /&gt;&amp;nbsp;host X.X.X.31&lt;BR /&gt;object network 10.49.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.49.0.0 255.255.0.0&lt;BR /&gt;object network Z.Z.Z.136&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.136&lt;BR /&gt;object network Z.Z.Z.137&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.137&lt;BR /&gt;object network Z.Z.Z.138&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.138&lt;BR /&gt;object network Z.Z.Z.139&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.139&lt;BR /&gt;object network Z.Z.Z.140&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.140&lt;BR /&gt;object network Z.Z.Z.141&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.141&lt;BR /&gt;object network Z.Z.Z.142&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.142&lt;BR /&gt;object network Z.Z.Z.143&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.143&lt;BR /&gt;object network Z.Z.Z.144&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.144&lt;BR /&gt;object network Z.Z.Z.145&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.145&lt;BR /&gt;object network Z.Z.Z.146&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.146&lt;BR /&gt;object network Z.Z.Z.147&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.147&lt;BR /&gt;object network Z.Z.Z.148&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.148&lt;BR /&gt;object network Z.Z.Z.149&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.149&lt;BR /&gt;object network Z.Z.Z.150&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.150&lt;BR /&gt;object network Z.Z.Z.151&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.151&lt;BR /&gt;object network Z.Z.Z.152&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.152&lt;BR /&gt;object network Z.Z.Z.153&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.153&lt;BR /&gt;object network Z.Z.Z.154&lt;BR /&gt;&amp;nbsp;host Z.Z.Z.154&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;host 10.227.225.210&lt;BR /&gt;object network 10.227.225.210&lt;BR /&gt;&amp;nbsp;host 10.227.225.210&lt;BR /&gt;object network Y.Y.Y.0&lt;BR /&gt;&amp;nbsp;subnet Y.Y.Y.0 255.255.255.0&lt;BR /&gt;object network Y.Y.Y.22&lt;BR /&gt;&amp;nbsp;host Y.Y.Y.22&lt;BR /&gt;object network ALTAI&lt;BR /&gt;&amp;nbsp;host Y.Y.Y.22&lt;BR /&gt;object network 10.50.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.50.0.0 255.255.0.0&lt;BR /&gt;object network 10.51.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.51.0.0 255.255.0.0&lt;BR /&gt;object network 10.227.225.20&lt;BR /&gt;&amp;nbsp;host 10.227.225.20&lt;BR /&gt;object network CentroValle_1930&lt;BR /&gt;&amp;nbsp;host 10.227.225.20&lt;BR /&gt;object network CentroValle_1946&lt;BR /&gt;&amp;nbsp;host 10.227.225.20&lt;BR /&gt;object network X.X.X.2&lt;BR /&gt;&amp;nbsp;host X.X.X.2&lt;BR /&gt;access-list CARRIERS_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;access-list CARRIERS_access_out extended permit ip any 10.227.224.0 255.255.252.0 &lt;BR /&gt;access-list OUTSIDE_access_in remark Prueba&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.210 eq 3389 &lt;BR /&gt;access-list OUTSIDE_access_in remark ALTAI&lt;BR /&gt;access-list OUTSIDE_access_in extended permit ip any object Y.Y.Y.22 &lt;BR /&gt;access-list OUTSIDE_access_in remark Centro Valle&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.20 eq 1930 &lt;BR /&gt;access-list OUTSIDE_access_in remark Centro Valle&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.20 eq 1946 &lt;BR /&gt;access-list INSIDE_Prueba_access_in extended permit ip 192.168.62.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE_Prueba_access_in extended permit ip object Y.Y.Y.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu CARRIERS 1500&lt;BR /&gt;mtu INSIDE_Prueba 1500&lt;BR /&gt;mtu CMTS 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (INSIDE_Prueba,OUTSIDE) source dynamic Y.Y.Y.0 interface&lt;BR /&gt;nat (INSIDE_Prueba,OUTSIDE) source dynamic any interface&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.19.0.0 X.X.X.16&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.27.0.0 X.X.X.17&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.25.0.0 X.X.X.18&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.9.0.0 X.X.X.9&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.39.0.0 X.X.X.20&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.11.0.0 X.X.X.11&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.35.0.0 X.X.X.22&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.33.0.0 X.X.X.23&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.13.0.0 X.X.X.13&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.17.0.0 X.X.X.25&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.37.0.0 X.X.X.26&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.41.0.0 X.X.X.27&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.45.0.0 X.X.X.28&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.33.0.0 X.X.X.29&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.45.0.0 X.X.X.19&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.47.0.0 X.X.X.21&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.49.0.0 X.X.X.24&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.51.0.0 X.X.X.30&lt;BR /&gt;!&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;nat (CARRIERS,OUTSIDE) static X.X.X.3 service tcp 3389 13389 &lt;BR /&gt;object network ALTAI&lt;BR /&gt;&amp;nbsp;nat (INSIDE_Prueba,OUTSIDE) static X.X.X.4&lt;BR /&gt;object network CentroValle_1930&lt;BR /&gt;&amp;nbsp;nat (CARRIERS,OUTSIDE) static interface service tcp 1930 11930 &lt;BR /&gt;object network CentroValle_1946&lt;BR /&gt;&amp;nbsp;nat (CARRIERS,OUTSIDE) static interface service tcp 1946 11946 &lt;BR /&gt;!&lt;BR /&gt;nat (CARRIERS,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;access-group CARRIERS_access_in in interface CARRIERS&lt;BR /&gt;access-group CARRIERS_access_out out interface CARRIERS&lt;BR /&gt;access-group INSIDE_Prueba_access_in in interface INSIDE_Prueba&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 X.X.X.1 1&lt;BR /&gt;route CMTS 10.8.0.0 255.255.0.0 192.168.61.102 1&lt;BR /&gt;route CMTS 10.9.0.0 255.255.0.0 192.168.61.102 1&lt;BR /&gt;route CMTS 10.10.0.0 255.255.0.0 192.168.61.101 1&lt;BR /&gt;route CMTS 10.11.0.0 255.255.0.0 192.168.61.101 1&lt;BR /&gt;route CMTS 10.12.0.0 255.255.0.0 192.168.61.114 1&lt;BR /&gt;route CMTS 10.13.0.0 255.255.0.0 192.168.61.114 1&lt;BR /&gt;route CMTS 10.16.0.0 255.255.0.0 192.168.61.112 1&lt;BR /&gt;route CMTS 10.17.0.0 255.255.0.0 192.168.61.112 1&lt;BR /&gt;route CMTS 10.18.0.0 255.255.0.0 192.168.61.111 1&lt;BR /&gt;route CMTS 10.19.0.0 255.255.0.0 192.168.61.111 1&lt;BR /&gt;route CMTS 10.24.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.25.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.26.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.27.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.32.0.0 255.255.0.0 192.168.61.130 1&lt;BR /&gt;route CMTS 10.33.0.0 255.255.0.0 192.168.61.130 1&lt;BR /&gt;route CMTS 10.34.0.0 255.255.0.0 192.168.61.131 1&lt;BR /&gt;route CMTS 10.35.0.0 255.255.0.0 192.168.61.131 1&lt;BR /&gt;route CMTS 10.36.0.0 255.255.0.0 192.168.61.132 1&lt;BR /&gt;route CMTS 10.37.0.0 255.255.0.0 192.168.61.132 1&lt;BR /&gt;route CMTS 10.38.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.39.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.40.0.0 255.255.0.0 192.168.61.134 1&lt;BR /&gt;route CMTS 10.41.0.0 255.255.0.0 192.168.61.134 1&lt;BR /&gt;route CMTS 10.44.0.0 255.255.0.0 192.168.61.135 1&lt;BR /&gt;route CMTS 10.45.0.0 255.255.0.0 192.168.61.135 1&lt;BR /&gt;route CMTS 10.46.0.0 255.255.0.0 192.168.61.137 1&lt;BR /&gt;route CMTS 10.47.0.0 255.255.0.0 192.168.61.137 1&lt;BR /&gt;route CMTS 10.48.0.0 255.255.0.0 192.168.61.138 1&lt;BR /&gt;route CMTS 10.49.0.0 255.255.0.0 192.168.61.138 1&lt;BR /&gt;route CMTS 10.50.0.0 255.255.0.0 192.168.61.139 1&lt;BR /&gt;route CMTS 10.51.0.0 255.255.0.0 192.168.61.139 1&lt;BR /&gt;route INSIDE_Prueba Y.Y.Y.0 255.255.255.0 192.168.62.253 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;snmp-server host management 192.168.0.2 community ***** udp-port 161&lt;BR /&gt;snmp-server location Site-Dg&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;!&lt;BR /&gt;tls-proxy maximum-session 1000&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;username fermin password X encrypted privilege 15&lt;BR /&gt;username gaspar password X encrypted privilege 15&lt;BR /&gt;username extra password X encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 7&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 7&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:fX&lt;BR /&gt;: end&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;ASA5580#&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038251#M134869</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-08T20:25:13Z</dc:date>
    </item>
    <item>
      <title>It looks good.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038252#M134870</link>
      <description>&lt;P&gt;It looks good.&lt;/P&gt;
&lt;P&gt;Can you redo the packet tracer:&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 3.3.3.3 12345 Public_IP&amp;nbsp;11930&lt;/P&gt;
&lt;P&gt;and paste the output?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 20:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038252#M134870</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-08T20:58:19Z</dc:date>
    </item>
    <item>
      <title>the same thing:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038253#M134871</link>
      <description>&lt;P&gt;the same thing:&lt;/P&gt;
&lt;P&gt;ASA5580# packet-tracer input outside tcp 3.3.3.3 12345 170.X.X.2 11930&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 170.X.X.2&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;and I'm agree with you, all looks good....&lt;/P&gt;
&lt;P&gt;???&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 21:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038253#M134871</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-08T21:05:52Z</dc:date>
    </item>
    <item>
      <title>Are you able to do a</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038254#M134872</link>
      <description>&lt;P&gt;Are you able to do a teamviewer?&lt;/P&gt;
&lt;P&gt;If Yes, ping me by private chat and we'll figure it out.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 21:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038254#M134872</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-08T21:13:36Z</dc:date>
    </item>
    <item>
      <title>Ok my friend, tomorrow</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038255#M134873</link>
      <description>&lt;P&gt;Ok my friend, tomorrow morning then...&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 22:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038255#M134873</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-08T22:15:25Z</dc:date>
    </item>
    <item>
      <title>Ok we will try. I'm in EST</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038256#M134875</link>
      <description>&lt;P&gt;Ok we will try. I'm in EST timezone&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2017 22:32:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038256#M134875</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-08T22:32:05Z</dc:date>
    </item>
    <item>
      <title>sorry, how can I contact by</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038257#M134876</link>
      <description>&lt;P&gt;sorry, how can I contact by private???? by the way, I´m in EST too...&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 01:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038257#M134876</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-09T01:41:57Z</dc:date>
    </item>
    <item>
      <title>Through this forum you can</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038258#M134877</link>
      <description>&lt;P&gt;Through this forum you can send me a private message if you go to your profile and message.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 01:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038258#M134877</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-09T01:48:49Z</dc:date>
    </item>
    <item>
      <title>Update:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038259#M134878</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;
&lt;P&gt;I can now access through remote desktop to PC 10.227.224.210...&lt;/P&gt;
&lt;P&gt;the rule I've made for this is pointing to public ip 170.X.X.3 and the PC when I run speedtest shows 170.X.X.2 ???? it's crazy, isn't it???&lt;/P&gt;
&lt;P&gt;Another update:&lt;/P&gt;
&lt;P&gt;when I change the rule to public ip 170.X.X.3 everything works fine (ports 1930 and 1946). The problem seems to occur when I use OUTSIDE interface...&lt;/P&gt;
&lt;P&gt;any ideas???&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 22:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038259#M134878</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-09T22:21:00Z</dc:date>
    </item>
    <item>
      <title>Hi </title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038260#M134879</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did that came up after a reboot?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's normal that your ip on internet is .2 because the traffic goes to your dynamic nat. You've just the nat with ip in .3 for rdp connection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Why it's not working with ip .2:&lt;/P&gt;
&lt;P&gt;Can you move your 2 dynamic nat from the top to the bottom by adding the keyword after-auto and test again?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 23:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038260#M134879</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-09T23:37:16Z</dc:date>
    </item>
    <item>
      <title>Hi:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038261#M134880</link>
      <description>&lt;P&gt;Hi:&lt;/P&gt;
&lt;P&gt;I still don´t reboot, I had planned to do it tomorrow at 5 am in the morning but know I don´t think I will...&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Why it's not working with ip .2 is the one million dollar question...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;tomorrow I´ll try what you suggest and post results.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2017 23:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038261#M134880</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-09T23:56:51Z</dc:date>
    </item>
    <item>
      <title>Moving the dynamic nat will</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038262#M134881</link>
      <description>&lt;P&gt;Moving the dynamic nat will help to work with the ip 2. This is what I wanted to do some we are connected through TeamViewer.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ip 3 wasn't working. What did you change to make it working now?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jun 2017 00:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038262#M134881</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-10T00:15:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038263#M134882</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I changed nothing, that's the weird...I just connected the PC with IP 10.227.225.210 fpr testing&lt;/P&gt;
&lt;P&gt;About what you suggested I moved the second dynamic nat rule to the bottom (nat (INSIDE_Prueba,OUTSIDE) after-auto source dynamic any interface) but didn't work...same result, nat with ip .2 (OUTSIDE interface) refuse to work&lt;/P&gt;
&lt;P&gt;???&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jun 2017 15:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038263#M134882</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-10T15:10:11Z</dc:date>
    </item>
    <item>
      <title>Can you share the output of</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038264#M134883</link>
      <description>&lt;P&gt;Can you share the output of packet-tracer with detailled keyword at the end for both public ip with the right tcp port for each of them?&lt;/P&gt;
&lt;P&gt;Maybe you should keep the reboot in mind.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jun 2017 15:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038264#M134883</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-10T15:15:21Z</dc:date>
    </item>
    <item>
      <title>Update:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038265#M134884</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;
&lt;P&gt;I just realized that when I use the ip .2 (OUTSIDE interface) all other mapped ports stop working (11930 and 11946) and therefore that's what happened yesterday, at the moment I changed .2 by .3 all began to work...&lt;/P&gt;
&lt;P&gt;Right now I have all mappped to .3 and working fine&lt;/P&gt;
&lt;P&gt;????&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jun 2017 15:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038265#M134884</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-06-10T15:31:38Z</dc:date>
    </item>
    <item>
      <title>Hey</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038266#M134885</link>
      <description>&lt;P&gt;Hey&lt;/P&gt;
&lt;P&gt;Can you send me by email your exact config please I'm gonna do a quick lab to reproduce your issue?&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Sat, 10 Jun 2017 20:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-new-problem/m-p/3038266#M134885</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-06-10T20:57:50Z</dc:date>
    </item>
  </channel>
</rss>

