<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Okay, the other way is to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015939#M136106</link>
    <description>&lt;P&gt;Okay, the other way is to move your NAT rule before rule 18 in the first section and you can do this without affecting the current user(s).&lt;/P&gt;
&lt;P&gt;So try this -&lt;/P&gt;
&lt;P&gt;"nat (CARRIERS,OUTSIDE) line 18 source static Prueba-10.227.225.210 170.x.x.3 tcp 3389 13889"&lt;/P&gt;
&lt;P&gt;then run a "sh nat" to make sure that rule is before the current rule 18, then retest.&lt;/P&gt;
&lt;P&gt;If it still doesn't work can you run the packet tracer again and post results.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
    <pubDate>Fri, 28 Apr 2017 22:17:31 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2017-04-28T22:17:31Z</dc:date>
    <item>
      <title>ASA 5580 port forwarding problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015926#M136066</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;I've been trying to access to the Remote Desktop of a PC in my LAN (behind the ASA) but no luck so far. Inside the LAN I can access to the RD without problem, the problem is from internet (public IP address). I'm configuring ASA through ASDM but here are some lines related to the access from outside:&lt;/P&gt;
&lt;P&gt;object network 170.X.X.3&lt;BR /&gt;&amp;nbsp;host 170.X.X.3&lt;BR /&gt;&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;host 10.227.225.210&lt;BR /&gt;object network 10.227.225.210&lt;BR /&gt;&amp;nbsp;host 10.227.225.210&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE_access_in remark Prueba&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 170.X.X.3 eq 13389&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;nat (CARRIERS,OUTSIDE) static 170.X.X.3 service tcp 3389 13389 &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From internet (Linux PC) I type: rdesktop 170.X.X.3:13389 but nothing happens....Can anybody helpme please??? Thanks in advance.&lt;/P&gt;
&lt;P&gt;BR.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:17:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015926#M136066</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2019-03-12T09:17:36Z</dc:date>
    </item>
    <item>
      <title>Your acl should refer to the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015927#M136067</link>
      <description>&lt;P&gt;Your acl should refer to the real IP ie. 10.227.225.10 so can you&amp;nbsp;modify your acl and try again.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 19:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015927#M136067</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T19:24:54Z</dc:date>
    </item>
    <item>
      <title>changed for:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015928#M136068</link>
      <description>&lt;P&gt;changed for:&lt;/P&gt;
&lt;P&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.210 eq 13389&lt;/P&gt;
&lt;P&gt;but the same, nothing happened...&lt;/P&gt;
&lt;P&gt;anyway I think the acl should refer to the public IP because is applied in the OUTSIDE interface....right???&lt;/P&gt;
&lt;P&gt;any more ideas??&lt;/P&gt;
&lt;P&gt;P.S: forgot to mention that PC in the LAN is behind a Router Cisco 1841 but I have redirected the port to the PC, here is the important of 1841:&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/0&lt;BR /&gt;ip address 10.227.225.210 255.255.252.0&lt;/P&gt;
&lt;P&gt;interface FastEthernet0/1&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;ip nat inside source static tcp 192.168.1.51 3389 interface FastEthernet0/0 3389&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 20:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015928#M136068</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-28T20:44:26Z</dc:date>
    </item>
    <item>
      <title>With 8.3 code onwards the acl</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015929#M136069</link>
      <description>&lt;P&gt;With 8.3 code onwards the acl should use the real IP.&lt;/P&gt;
&lt;P&gt;Have you run a packet tracer on the ASA to see where it is failing (assuming it is failing on the ASA).&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 20:54:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015929#M136069</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T20:54:28Z</dc:date>
    </item>
    <item>
      <title>my ASA is 8.4(5) but I think</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015930#M136071</link>
      <description>&lt;P&gt;my ASA is 8.4(5) but I think is the same that 8.3...&lt;/P&gt;
&lt;P&gt;sorry for ask but what would be the packet tracer command??&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:03:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015930#M136071</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-28T21:03:40Z</dc:date>
    </item>
    <item>
      <title>It is a command that allows</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015931#M136075</link>
      <description>&lt;P&gt;It is a command that allows you to simulate a packet being sent through the ASA.&lt;/P&gt;
&lt;P&gt;Run this command and post the result -&lt;/P&gt;
&lt;P&gt;"packet-tracer input outside tcp 3.3.3.3 12345 170.x.x.3 13389"&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015931#M136075</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T21:08:22Z</dc:date>
    </item>
    <item>
      <title>here's the result:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015932#M136081</link>
      <description>&lt;P&gt;here's the result:&lt;/P&gt;
&lt;P&gt;ASA5580# packet-tracer input outside tcp 3.3.3.3 12345 170.X.X.3 13389&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 170.X.X.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.240 OUTSIDE&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: OUTSIDE&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015932#M136081</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-28T21:14:45Z</dc:date>
    </item>
    <item>
      <title>Did you leave the acl</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015933#M136087</link>
      <description>&lt;P&gt;Did you leave the acl referencing the real IP ?&lt;/P&gt;
&lt;P&gt;If so can you post a "sh nat"&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015933#M136087</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T21:17:23Z</dc:date>
    </item>
    <item>
      <title>I let the one you told me,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015934#M136093</link>
      <description>&lt;P&gt;I let the one you told me, here's the sh nat:&lt;/P&gt;
&lt;P&gt;ASA5580# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (CMTS) to (OUTSIDE) source dynamic 10.19.0.0 170.X.X.16 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (CMTS) to (OUTSIDE) source dynamic 10.27.0.0 170.X.X.17 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 47851778, untranslate_hits = 15151388&lt;BR /&gt;3 (CMTS) to (OUTSIDE) source dynamic 10.25.0.0 170.X.X.18 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8256808, untranslate_hits = 3494235&lt;BR /&gt;4 (CMTS) to (OUTSIDE) source dynamic 10.9.0.0 170.X.X.9 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (CMTS) to (OUTSIDE) source dynamic 10.39.0.0 170.X.X.20 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 54942446, untranslate_hits = 19970221&lt;BR /&gt;6 (CMTS) to (OUTSIDE) source dynamic 10.11.0.0 170.X.X.11 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;7 (CMTS) to (OUTSIDE) source dynamic 10.35.0.0 170.X.X.22 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 38187414, untranslate_hits = 9971950&lt;BR /&gt;8 (CMTS) to (OUTSIDE) source dynamic 10.33.0.0 170.X.X.23 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 8550911, untranslate_hits = 2721063&lt;BR /&gt;9 (CMTS) to (OUTSIDE) source dynamic 10.13.0.0 170.X.X.13 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 13188096, untranslate_hits = 5397774&lt;BR /&gt;10 (CMTS) to (OUTSIDE) source dynamic 10.17.0.0 170.X.X.25 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 30375943, untranslate_hits = 12193290&lt;BR /&gt;11 (CMTS) to (OUTSIDE) source dynamic 10.37.0.0 170.X.X.26 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 10078767, untranslate_hits = 4322498&lt;BR /&gt;12 (CMTS) to (OUTSIDE) source dynamic 10.41.0.0 170.X.X.27 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 3769501, untranslate_hits = 1460400&lt;BR /&gt;13 (CMTS) to (OUTSIDE) source dynamic 10.45.0.0 170.X.X.28 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 43901686, untranslate_hits = 14100249&lt;BR /&gt;14 (CMTS) to (OUTSIDE) source dynamic 10.33.0.0 170.X.X.29 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;15 (CMTS) to (OUTSIDE) source dynamic 10.45.0.0 170.X.X.19 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;16 (CMTS) to (OUTSIDE) source dynamic 10.47.0.0 170.X.X.21 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 37849891, untranslate_hits = 12194900&lt;BR /&gt;17 (CMTS) to (OUTSIDE) source dynamic 10.49.0.0 170.X.X.24 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 60001, untranslate_hits = 22381&lt;BR /&gt;18 (CARRIERS) to (OUTSIDE) source dynamic any 170.X.X.3 &amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 87438, untranslate_hits = 2238&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (CARRIERS) to (OUTSIDE) source static Prueba-10.227.225.210 170.X.X.3&amp;nbsp;&amp;nbsp; service tcp 3389 13389 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:25:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015934#M136093</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-28T21:25:39Z</dc:date>
    </item>
    <item>
      <title>You can see your NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015935#M136098</link>
      <description>&lt;P&gt;You can see your NAT statement has no hits and that is because it is hitting rule 18 above it.&lt;/P&gt;
&lt;P&gt;So ideally we need to move that rule ie.&lt;/P&gt;
&lt;P&gt;"no nat (CARRIERS,OUTSIDE) source dynamic any interface"&lt;/P&gt;
&lt;P&gt;and then add this -&lt;/P&gt;
&lt;P&gt;"nat (CARRIERS,OUTSIDE) after-auto source dynamic any interface"&lt;/P&gt;
&lt;P&gt;however it depends if there are currently users accessing the internet via the CARRIERS interface, so can you change it now, and if you can't we can try something else.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015935#M136098</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T21:38:31Z</dc:date>
    </item>
    <item>
      <title>I have only one client</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015936#M136099</link>
      <description>&lt;P&gt;I have only one client accessing to the internet via CARRIERS interface...my question is: if we move the rule as you say, the client lose internet access for how much time???&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:50:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015936#M136099</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-28T21:50:16Z</dc:date>
    </item>
    <item>
      <title>If they lose access at all it</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015937#M136102</link>
      <description>&lt;P&gt;If they lose access at all it should simply be as long as it takes you to move the rule.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 21:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015937#M136102</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T21:54:41Z</dc:date>
    </item>
    <item>
      <title>maybe is better to wait for</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015938#M136104</link>
      <description>&lt;P&gt;maybe is better to wait for the client leave his office...I'll be pending and get back to you...&lt;/P&gt;
&lt;P&gt;Thanks!!!&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 22:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015938#M136104</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-28T22:00:49Z</dc:date>
    </item>
    <item>
      <title>Okay, the other way is to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015939#M136106</link>
      <description>&lt;P&gt;Okay, the other way is to move your NAT rule before rule 18 in the first section and you can do this without affecting the current user(s).&lt;/P&gt;
&lt;P&gt;So try this -&lt;/P&gt;
&lt;P&gt;"nat (CARRIERS,OUTSIDE) line 18 source static Prueba-10.227.225.210 170.x.x.3 tcp 3389 13889"&lt;/P&gt;
&lt;P&gt;then run a "sh nat" to make sure that rule is before the current rule 18, then retest.&lt;/P&gt;
&lt;P&gt;If it still doesn't work can you run the packet tracer again and post results.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 28 Apr 2017 22:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015939#M136106</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-28T22:17:31Z</dc:date>
    </item>
    <item>
      <title>Hi Jon, sorry for the delay..</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015940#M136107</link>
      <description>&lt;P&gt;Hi Jon, sorry for the delay...&lt;/P&gt;
&lt;P&gt;the NAT rules stayed like this:&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt; nat (CARRIERS,OUTSIDE) static 170.X.X.3 service tcp 3389 13389&lt;BR /&gt;!&lt;BR /&gt;nat (CARRIERS,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;access-group CARRIERS_access_in in interface CARRIERS&lt;BR /&gt;access-group CARRIERS_access_out out interface CARRIERS&lt;/P&gt;
&lt;P&gt;but still didn´t work...&lt;/P&gt;
&lt;P&gt;sh nat:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA5580# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (CMTS) to (OUTSIDE) source dynamic 10.19.0.0 170.X.X.16&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (CMTS) to (OUTSIDE) source dynamic 10.27.0.0 170.X.X.17&lt;BR /&gt; translate_hits = 49751334, untranslate_hits = 15740716&lt;BR /&gt;3 (CMTS) to (OUTSIDE) source dynamic 10.25.0.0 170.X.X.18&lt;BR /&gt; translate_hits = 8256808, untranslate_hits = 3494235&lt;BR /&gt;4 (CMTS) to (OUTSIDE) source dynamic 10.9.0.0 170.X.X.9&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (CMTS) to (OUTSIDE) source dynamic 10.39.0.0 170.X.X.20&lt;BR /&gt; translate_hits = 57055449, untranslate_hits = 20689126&lt;BR /&gt;6 (CMTS) to (OUTSIDE) source dynamic 10.11.0.0 170.X.X.11&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;7 (CMTS) to (OUTSIDE) source dynamic 10.35.0.0 170.X.X.22&lt;BR /&gt; translate_hits = 39376285, untranslate_hits = 10284317&lt;BR /&gt;8 (CMTS) to (OUTSIDE) source dynamic 10.33.0.0 170.X.X.23&lt;BR /&gt; translate_hits = 8913774, untranslate_hits = 2845519&lt;BR /&gt;9 (CMTS) to (OUTSIDE) source dynamic 10.13.0.0 170.X.X.13&lt;BR /&gt; translate_hits = 13655111, untranslate_hits = 5515360&lt;BR /&gt;10 (CMTS) to (OUTSIDE) source dynamic 10.17.0.0 170.X.X.25&lt;BR /&gt; translate_hits = 31540644, untranslate_hits = 12565071&lt;BR /&gt;11 (CMTS) to (OUTSIDE) source dynamic 10.37.0.0 170.X.X.26&lt;BR /&gt; translate_hits = 10442663, untranslate_hits = 4446410&lt;BR /&gt;12 (CMTS) to (OUTSIDE) source dynamic 10.41.0.0 170.X.X.27&lt;BR /&gt; translate_hits = 3940024, untranslate_hits = 1511366&lt;BR /&gt;13 (CMTS) to (OUTSIDE) source dynamic 10.45.0.0 170.X.X.28&lt;BR /&gt; translate_hits = 45668378, untranslate_hits = 14714553&lt;BR /&gt;14 (CMTS) to (OUTSIDE) source dynamic 10.33.0.0 170.X.X.29&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;15 (CMTS) to (OUTSIDE) source dynamic 10.45.0.0 170.X.X.19&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;16 (CMTS) to (OUTSIDE) source dynamic 10.47.0.0 170.X.X.21&lt;BR /&gt; translate_hits = 39816979, untranslate_hits = 12897500&lt;BR /&gt;17 (CMTS) to (OUTSIDE) source dynamic 10.49.0.0 170.X.X.24&lt;BR /&gt; translate_hits = 68919, untranslate_hits = 27873&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (CARRIERS) to (OUTSIDE) source static Prueba-10.227.225.210 170.X.X.3 service tcp 3389 13389&lt;BR /&gt; translate_hits = 0, untranslate_hits = 17&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (CARRIERS) to (OUTSIDE) source dynamic any interface&lt;BR /&gt; translate_hits = 16607, untranslate_hits = 766&lt;BR /&gt;ASA5580#&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 03:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015940#M136107</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-29T03:39:24Z</dc:date>
    </item>
    <item>
      <title>You are getting hits now on</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015941#M136108</link>
      <description>&lt;P&gt;You are getting hits now on your NAT though so something else is now the problem.&lt;/P&gt;
&lt;P&gt;Can you run packet tracer again and it should show something different this time.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 10:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015941#M136108</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-29T10:42:56Z</dc:date>
    </item>
    <item>
      <title>here's packet tracer:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015942#M136109</link>
      <description>&lt;P&gt;here's packet tracer:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA5580# packet-tracer input outside tcp 3.3.3.3 12345 170.X.X.3 13389&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;nat (CARRIERS,OUTSIDE) static 170.X.X.3 service tcp 3389 13389 &lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface CARRIERS&lt;BR /&gt;Untranslate 170.X.X.3/13389 to 10.227.225.210/3389&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: CARRIERS&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 15:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015942#M136109</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-29T15:27:05Z</dc:date>
    </item>
    <item>
      <title>Well the NAT is now working</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015943#M136110</link>
      <description>&lt;P&gt;Well the NAT is now working but it is still getting dropped.&lt;/P&gt;
&lt;P&gt;Can you just post the configuration of the ASA ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 16:28:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015943#M136110</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-29T16:28:57Z</dc:date>
    </item>
    <item>
      <title>whole configuration:</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015944#M136111</link>
      <description>&lt;P&gt;whole configuration:&lt;/P&gt;
&lt;P&gt;ASA5580# sh run&lt;BR /&gt;ASA5580# sh running-config &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(5) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA5580&lt;BR /&gt;enable password TFyi2xrsdagfdsgfdsgfd encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2sdaga encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.44 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/0&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/1&lt;BR /&gt;&amp;nbsp;nameif CMTS&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.61.9 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/2&lt;BR /&gt;&amp;nbsp;nameif CARRIERS&lt;BR /&gt;&amp;nbsp;security-level 30&lt;BR /&gt;&amp;nbsp;ip address 10.227.224.3 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3/3&lt;BR /&gt;&amp;nbsp;nameif CMTS1&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 192.168.62.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet5/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet5/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet7/0&lt;BR /&gt;&amp;nbsp;nameif OUTSIDE&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 170.X.X.2 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet7/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network 10.19.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.19.0.0 255.255.0.0&lt;BR /&gt;object network 170.X.X.3&lt;BR /&gt;&amp;nbsp;host 170.X.X.3&lt;BR /&gt;object network 170.X.X.4&lt;BR /&gt;&amp;nbsp;host 170.X.X.4&lt;BR /&gt;object network 170.X.X.5&lt;BR /&gt;&amp;nbsp;host 170.X.X.5&lt;BR /&gt;object network 170.X.X.6&lt;BR /&gt;&amp;nbsp;host 170.X.X.6&lt;BR /&gt;object network 170.X.X.7&lt;BR /&gt;&amp;nbsp;host 170.X.X.7&lt;BR /&gt;object network 170.X.X.8&lt;BR /&gt;&amp;nbsp;host 170.X.X.8&lt;BR /&gt;object network 170.X.X.9&lt;BR /&gt;&amp;nbsp;host 170.X.X.9&lt;BR /&gt;object network 170.X.X.10&lt;BR /&gt;&amp;nbsp;host 170.X.X.10&lt;BR /&gt;object network 170.X.X.11&lt;BR /&gt;&amp;nbsp;host 170.X.X.11&lt;BR /&gt;object network 170.X.X.12&lt;BR /&gt;&amp;nbsp;host 170.X.X.12&lt;BR /&gt;object network 170.X.X.13&lt;BR /&gt;&amp;nbsp;host 170.X.X.13&lt;BR /&gt;object network 170.X.X.14&lt;BR /&gt;&amp;nbsp;host 170.X.X.14&lt;BR /&gt;object network 10.27.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.27.0.0 255.255.0.0&lt;BR /&gt;object network 10.25.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.25.0.0 255.255.0.0&lt;BR /&gt;object network 10.9.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.9.0.0 255.255.0.0&lt;BR /&gt;object network 10.39.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.39.0.0 255.255.0.0&lt;BR /&gt;object network 10.11.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.11.0.0 255.255.0.0&lt;BR /&gt;object network 10.35.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.35.0.0 255.255.0.0&lt;BR /&gt;object network 10.33.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.33.0.0 255.255.0.0&lt;BR /&gt;object network 10.13.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.13.0.0 255.255.0.0&lt;BR /&gt;object network 10.17.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.17.0.0 255.255.0.0&lt;BR /&gt;object network 10.37.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.37.0.0 255.255.0.0&lt;BR /&gt;object network Pool_CMTS&lt;BR /&gt;&amp;nbsp;range 170.X.X.32 170.X.X.47&lt;BR /&gt;object network 10.41.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.41.0.0 255.255.0.0&lt;BR /&gt;object network 10.45.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.45.0.0 255.255.0.0&lt;BR /&gt;object network 170.X.X.16&lt;BR /&gt;&amp;nbsp;host 170.X.X.16&lt;BR /&gt;object network 170.X.X.17&lt;BR /&gt;&amp;nbsp;host 170.X.X.17&lt;BR /&gt;object network 170.X.X.18&lt;BR /&gt;&amp;nbsp;host 170.X.X.18&lt;BR /&gt;object network 170.X.X.19&lt;BR /&gt;&amp;nbsp;host 170.X.X.19&lt;BR /&gt;object network 170.X.X.20&lt;BR /&gt;&amp;nbsp;host 170.X.X.20&lt;BR /&gt;object network 170.X.X.21&lt;BR /&gt;&amp;nbsp;host 170.X.X.21&lt;BR /&gt;object network 170.X.X.22&lt;BR /&gt;&amp;nbsp;host 170.X.X.22&lt;BR /&gt;object network 170.X.X.23&lt;BR /&gt;&amp;nbsp;host 170.X.X.23&lt;BR /&gt;object network 170.X.X.24&lt;BR /&gt;&amp;nbsp;host 170.X.X.24&lt;BR /&gt;object network 170.X.X.25&lt;BR /&gt;&amp;nbsp;host 170.X.X.25&lt;BR /&gt;object network 10.47.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.47.0.0 255.255.0.0&lt;BR /&gt;object network 170.X.X.26&lt;BR /&gt;&amp;nbsp;host 170.X.X.26&lt;BR /&gt;object network 170.X.X.27&lt;BR /&gt;&amp;nbsp;host 170.X.X.27&lt;BR /&gt;object network 170.X.X.28&lt;BR /&gt;&amp;nbsp;host 170.X.X.28&lt;BR /&gt;object network 170.X.X.29&lt;BR /&gt;&amp;nbsp;host 170.X.X.29&lt;BR /&gt;object network 170.X.X.30&lt;BR /&gt;&amp;nbsp;host 170.X.X.30&lt;BR /&gt;object network 170.X.X.31&lt;BR /&gt;&amp;nbsp;host 170.X.X.31&lt;BR /&gt;object network 10.49.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.49.0.0 255.255.0.0&lt;BR /&gt;object network 189.197.184.136&lt;BR /&gt;&amp;nbsp;host 189.197.184.136&lt;BR /&gt;object network 189.197.184.137&lt;BR /&gt;&amp;nbsp;host 189.197.184.137&lt;BR /&gt;object network 189.197.184.138&lt;BR /&gt;&amp;nbsp;host 189.197.184.138&lt;BR /&gt;object network 189.197.184.139&lt;BR /&gt;&amp;nbsp;host 189.197.184.139&lt;BR /&gt;object network 189.197.184.140&lt;BR /&gt;&amp;nbsp;host 189.197.184.140&lt;BR /&gt;object network 189.197.184.141&lt;BR /&gt;&amp;nbsp;host 189.197.184.141&lt;BR /&gt;object network 189.197.184.142&lt;BR /&gt;&amp;nbsp;host 189.197.184.142&lt;BR /&gt;object network 189.197.184.143&lt;BR /&gt;&amp;nbsp;host 189.197.184.143&lt;BR /&gt;object network 189.197.184.144&lt;BR /&gt;&amp;nbsp;host 189.197.184.144&lt;BR /&gt;object network 189.197.184.145&lt;BR /&gt;&amp;nbsp;host 189.197.184.145&lt;BR /&gt;object network 189.197.184.146&lt;BR /&gt;&amp;nbsp;host 189.197.184.146&lt;BR /&gt;object network 189.197.184.147&lt;BR /&gt;&amp;nbsp;host 189.197.184.147&lt;BR /&gt;object network 189.197.184.148&lt;BR /&gt;&amp;nbsp;host 189.197.184.148&lt;BR /&gt;object network 189.197.184.149&lt;BR /&gt;&amp;nbsp;host 189.197.184.149&lt;BR /&gt;object network 189.197.184.150&lt;BR /&gt;&amp;nbsp;host 189.197.184.150&lt;BR /&gt;object network 189.197.184.151&lt;BR /&gt;&amp;nbsp;host 189.197.184.151&lt;BR /&gt;object network 189.197.184.152&lt;BR /&gt;&amp;nbsp;host 189.197.184.152&lt;BR /&gt;object network 189.197.184.153&lt;BR /&gt;&amp;nbsp;host 189.197.184.153&lt;BR /&gt;object network 189.197.184.154&lt;BR /&gt;&amp;nbsp;host 189.197.184.154&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;host 10.227.225.210&lt;BR /&gt;object network 10.227.225.210&lt;BR /&gt;&amp;nbsp;host 10.227.225.210&lt;BR /&gt;access-list CARRIERS_access_in extended permit ip 10.227.224.0 255.255.252.0 any &lt;BR /&gt;access-list CARRIERS_access_out extended permit ip any 10.227.224.0 255.255.252.0 &lt;BR /&gt;access-list OUTSIDE_access_in remark Prueba&lt;BR /&gt;access-list OUTSIDE_access_in extended permit tcp any object 10.227.225.210 eq 13389 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu CMTS 1500&lt;BR /&gt;mtu CARRIERS 1500&lt;BR /&gt;mtu CMTS1 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any OUTSIDE&lt;BR /&gt;icmp permit any CMTS&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.19.0.0 170.X.X.16&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.27.0.0 170.X.X.17&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.25.0.0 170.X.X.18&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.9.0.0 170.X.X.9&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.39.0.0 170.X.X.20&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.11.0.0 170.X.X.11&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.35.0.0 170.X.X.22&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.33.0.0 170.X.X.23&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.13.0.0 170.X.X.13&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.17.0.0 170.X.X.25&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.37.0.0 170.X.X.26&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.41.0.0 170.X.X.27&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.45.0.0 170.X.X.28&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.33.0.0 170.X.X.29&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.45.0.0 170.X.X.19&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.47.0.0 170.X.X.21&lt;BR /&gt;nat (CMTS,OUTSIDE) source dynamic 10.49.0.0 170.X.X.24&lt;BR /&gt;!&lt;BR /&gt;object network Prueba-10.227.225.210&lt;BR /&gt;&amp;nbsp;nat (CARRIERS,OUTSIDE) static 170.X.X.3 service tcp 3389 13389 &lt;BR /&gt;!&lt;BR /&gt;nat (CARRIERS,OUTSIDE) after-auto source dynamic any interface&lt;BR /&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;BR /&gt;access-group CARRIERS_access_in in interface CARRIERS&lt;BR /&gt;access-group CARRIERS_access_out out interface CARRIERS&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 170.X.X.1 1&lt;BR /&gt;route CMTS1 10.8.0.0 255.255.0.0 192.168.61.102 1&lt;BR /&gt;route CMTS1 10.9.0.0 255.255.0.0 192.168.61.102 1&lt;BR /&gt;route CMTS1 10.10.0.0 255.255.0.0 192.168.61.101 1&lt;BR /&gt;route CMTS1 10.11.0.0 255.255.0.0 192.168.61.101 1&lt;BR /&gt;route CMTS 10.12.0.0 255.255.0.0 192.168.61.114 1&lt;BR /&gt;route CMTS 10.13.0.0 255.255.0.0 192.168.61.114 1&lt;BR /&gt;route CMTS 10.16.0.0 255.255.0.0 192.168.61.112 1&lt;BR /&gt;route CMTS 10.17.0.0 255.255.0.0 192.168.61.112 1&lt;BR /&gt;route CMTS 10.18.0.0 255.255.0.0 192.168.61.111 1&lt;BR /&gt;route CMTS 10.19.0.0 255.255.0.0 192.168.61.111 1&lt;BR /&gt;route CMTS 10.24.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.25.0.0 255.255.0.0 192.168.61.122 1&lt;BR /&gt;route CMTS 10.26.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.27.0.0 255.255.0.0 192.168.61.123 1&lt;BR /&gt;route CMTS 10.32.0.0 255.255.0.0 192.168.61.130 1&lt;BR /&gt;route CMTS 10.33.0.0 255.255.0.0 192.168.61.130 1&lt;BR /&gt;route CMTS 10.34.0.0 255.255.0.0 192.168.61.131 1&lt;BR /&gt;route CMTS 10.35.0.0 255.255.0.0 192.168.61.131 1&lt;BR /&gt;route CMTS 10.36.0.0 255.255.0.0 192.168.61.132 1&lt;BR /&gt;route CMTS 10.37.0.0 255.255.0.0 192.168.61.132 1&lt;BR /&gt;route CMTS 10.38.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.39.0.0 255.255.0.0 192.168.61.133 1&lt;BR /&gt;route CMTS 10.40.0.0 255.255.0.0 192.168.61.134 1&lt;BR /&gt;route CMTS 10.41.0.0 255.255.0.0 192.168.61.134 1&lt;BR /&gt;route CMTS 10.44.0.0 255.255.0.0 192.168.61.135 1&lt;BR /&gt;route CMTS 10.45.0.0 255.255.0.0 192.168.61.135 1&lt;BR /&gt;route CMTS 10.46.0.0 255.255.0.0 192.168.61.137 1&lt;BR /&gt;route CMTS 10.47.0.0 255.255.0.0 192.168.61.137 1&lt;BR /&gt;route CMTS 10.48.0.0 255.255.0.0 192.168.61.138 1&lt;BR /&gt;route CMTS 10.49.0.0 255.255.0.0 192.168.61.138 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 management&lt;BR /&gt;snmp-server host management 192.168.0.2 community ***** udp-port 161&lt;BR /&gt;snmp-server location Site-Dg&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;!&lt;BR /&gt;tls-proxy maximum-session 1000&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username gaspar password uFhUHzfbhfhfgfh encrypted privilege 15&lt;BR /&gt;username extra password Mgi9n5sdhgdfghgx encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 7&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 7&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:488ed4aadf6c81f3d85f4c87ce320e03&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 16:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015944#M136111</guid>
      <dc:creator>gasparmenendez</dc:creator>
      <dc:date>2017-04-29T16:37:58Z</dc:date>
    </item>
    <item>
      <title>Your acl on the outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015945#M136114</link>
      <description>&lt;P&gt;Your acl on the outside interface should be using the real port ie,. 3389 not the mapped one.&lt;/P&gt;
&lt;P&gt;Can you modify, retest and if still no success packet tracer again.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Sat, 29 Apr 2017 16:47:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5580-port-forwarding-problem/m-p/3015945#M136114</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-04-29T16:47:07Z</dc:date>
    </item>
  </channel>
</rss>

