<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Something like the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043389#M145850</link>
    <description>&lt;P&gt;Something like the configuration below should work. In summary, we:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;a. define the service objects&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;b. make a group of the services&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;c. define the server (network object)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;d. make a NAT rule combining the above&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;e. make an access-list (or an additional access list entry if the ACL already exists) and&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;f. apply the access-list inbound for traffic ariving at the outside interface&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object service VTC_udp_ports_1&lt;BR /&gt;&amp;nbsp; service udp source range 1719 1720&amp;nbsp;&lt;BR /&gt;object service VTC_udp_ports_2&lt;BR /&gt;&amp;nbsp; service udp source range 50000 50499&lt;BR /&gt;object service VTC_tcp-ports_1&lt;BR /&gt;&amp;nbsp; service tcp source range 1719 1720&amp;nbsp;&lt;BR /&gt;object service VTC_tcp_ports_2&lt;BR /&gt;&amp;nbsp; service tcp source range 50000 50499&lt;BR /&gt;object service SSL-TLS&lt;BR /&gt; service tcp destination eq https &lt;BR /&gt;object-group service VTC_Services&lt;BR /&gt; description Needed from outside inbound to VTC server&lt;BR /&gt; service-object object&amp;nbsp;&lt;SPAN&gt;VTC_udp_ports_1&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt; service-object object&amp;nbsp;&lt;SPAN&gt;VTC_udp_ports_2&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt; service-object object&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;VTC_tcp_ports_1&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt; service-object object&amp;nbsp;&lt;SPAN&gt;VTC_tcp_ports_2&lt;BR /&gt; service-object object SSL-TLS&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;object network VTC_Server&lt;BR /&gt; host &amp;lt;server real IP address&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside) source static VTC_Server interface service VTC_Services VTC_Services&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in extended permit object-group VTC_Services any object VTC_Server&lt;BR /&gt;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if that helps.&lt;/P&gt;
&lt;P&gt;Based in part on the following document:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/33921/asa-pre-83-83-nat-configuration-examples&lt;/P&gt;</description>
    <pubDate>Sun, 12 Mar 2017 06:34:51 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-03-12T06:34:51Z</dc:date>
    <item>
      <title>PAT multiple ports to outside interface IP?</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043388#M145849</link>
      <description>&lt;P&gt;old school PIX ASAer here who is lost in the new code &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am setting up an ASA running 9.4.4 and trying to use port forwarding with the outside interface IP address to forward the necessary ports to a video conferencing server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It seems as though there are 2 places to do NAT..one is within a specific host object, the other is at a "global" level like you used to with statics or nat/global.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It also seems that in order to forward ports on the outside interface...I have to apply the NAt within the network object. &amp;nbsp;I was able to to this with a single port....but I need to forward groups of ports/services.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;443&lt;/P&gt;
&lt;P&gt;TCPandUDP1719/1720&lt;/P&gt;
&lt;P&gt;TCPandUDP50000-50499&lt;/P&gt;
&lt;P&gt;and so on.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;how can I do this? &amp;nbsp;the NAT configuration line within the network object configuration doesnt seem to want to let me use service/port groups or even ranges?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043388#M145849</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2019-03-12T09:02:55Z</dc:date>
    </item>
    <item>
      <title>Something like the</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043389#M145850</link>
      <description>&lt;P&gt;Something like the configuration below should work. In summary, we:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;a. define the service objects&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;b. make a group of the services&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;c. define the server (network object)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;d. make a NAT rule combining the above&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;e. make an access-list (or an additional access list entry if the ACL already exists) and&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;f. apply the access-list inbound for traffic ariving at the outside interface&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object service VTC_udp_ports_1&lt;BR /&gt;&amp;nbsp; service udp source range 1719 1720&amp;nbsp;&lt;BR /&gt;object service VTC_udp_ports_2&lt;BR /&gt;&amp;nbsp; service udp source range 50000 50499&lt;BR /&gt;object service VTC_tcp-ports_1&lt;BR /&gt;&amp;nbsp; service tcp source range 1719 1720&amp;nbsp;&lt;BR /&gt;object service VTC_tcp_ports_2&lt;BR /&gt;&amp;nbsp; service tcp source range 50000 50499&lt;BR /&gt;object service SSL-TLS&lt;BR /&gt; service tcp destination eq https &lt;BR /&gt;object-group service VTC_Services&lt;BR /&gt; description Needed from outside inbound to VTC server&lt;BR /&gt; service-object object&amp;nbsp;&lt;SPAN&gt;VTC_udp_ports_1&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt; service-object object&amp;nbsp;&lt;SPAN&gt;VTC_udp_ports_2&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt; service-object object&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;VTC_tcp_ports_1&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt; service-object object&amp;nbsp;&lt;SPAN&gt;VTC_tcp_ports_2&lt;BR /&gt; service-object object SSL-TLS&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;object network VTC_Server&lt;BR /&gt; host &amp;lt;server real IP address&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside) source static VTC_Server interface service VTC_Services VTC_Services&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in extended permit object-group VTC_Services any object VTC_Server&lt;BR /&gt;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if that helps.&lt;/P&gt;
&lt;P&gt;Based in part on the following document:&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/33921/asa-pre-83-83-nat-configuration-examples&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 06:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043389#M145850</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-12T06:34:51Z</dc:date>
    </item>
    <item>
      <title>the problem with articles</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043390#M145852</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the problem with articles like that is when they show how to do static PAT, they are doing it for a single port, and doing so within the network object.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The NAT statements I had in place were already similar to what you are proposing...&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static yealink interface service YeaLink-1719-UDP YeaLink-1719-UDP&lt;BR /&gt;nat (inside,outside) source static yealink interface service YeaLink-1720-TCP YeaLink-1720-TCP&lt;BR /&gt;nat (inside,outside) source static yealink interface service YeaLink-HTTPS YeaLink-HTTPS&lt;BR /&gt;nat (inside,outside) source static yealink interface service YeaLink-50000-50499-TCP YeaLink-50000-50499-TCP&lt;BR /&gt;nat (inside,outside) source static yealink interface service YeaLink-50000-50499-UDP YeaLink-50000-50499-UDP&lt;BR /&gt;nat (inside,outside) source static yealink interface service YeaLink-5060-5061-TCP YeaLink-5060-5061-TCP&lt;BR /&gt;nat (inside,outside) source static yealink interface service YeaLink-5060-5061-UDP YeaLink-5060-5061-UDP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The only difference is that your proposed NAT statement uses a service group (which incidentally the NAT command didnt seem to like when I just tried to use it). &amp;nbsp;Did your FW accept your commands as written?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the error I get in the logs is just&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Mar 12 2017 07:25:41: %ASA-3-710003: TCP access denied by ACL from&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This goes away if I go into the network object and add a local NAT statement there (like this:&lt;BR /&gt;object network yealink&lt;BR /&gt; nat (inside,outside) static interface service tcp https https) &amp;nbsp;so I am pretty sure its not an ACL issue, just an issue with the FW not recognizing the translation of the port to the internal server so it doesnt think the ACL even applies...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 14:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043390#M145852</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2017-03-12T14:29:26Z</dc:date>
    </item>
    <item>
      <title>I see what you mean. the docs</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043391#M145860</link>
      <description>&lt;P&gt;I see what you mean. the docs and examples are a bit hazy when it comes to service groups.&lt;/P&gt;
&lt;P&gt;I labbed it on an ASA with 9.6(2) and got the errors with the NAT statement as well.&lt;/P&gt;
&lt;P&gt;I think the modification below using separate NAT statements might work. (Make sure none of the ports are in use by any other services - 443 is often used for SSL VPN.) The access-list can use the group still. I also believe we want to define the services as destination type (vs. source).&lt;/P&gt;
&lt;P&gt;If a flow appears to fail, then check out what packet-tracer gives you. It will inject a simulated packets and examine the internal flow indicating what NAT, ACL etc is encountered and the eventual disposition of the flow. We sometimes learn from this diagnostic tool that the command syntax is correct but it's necessary to adjust a NAT or ACE order with respect to the other ones to make the ASA behave as desired.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object service VTC_udp_ports_1&lt;BR /&gt; service udp destination range 1719 1720 &lt;BR /&gt;object service VTC_udp_ports_2&lt;BR /&gt; service udp destination range 50000 50499&lt;BR /&gt;object service VTC_tcp_ports_1&lt;BR /&gt; service tcp destination range 1719 1720 &lt;BR /&gt;object service VTC_tcp_ports_2&lt;BR /&gt; service tcp destination range 50000 50499&lt;BR /&gt;object service SSL-TLS&lt;BR /&gt; service tcp destination eq https&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; service VTC_Services&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; description &lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Needed&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;from&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; outside inbound to VTC server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;VTC_udp_ports_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;VTC_udp_ports_2&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;VTC_tcp_ports_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;VTC_tcp_ports_2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; service&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; SSL&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;TLS&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;object network VTC_Server&lt;BR /&gt; host &amp;lt;real IP Address of server&amp;gt;&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static VTC_Server interface service VTC_udp_ports_1 VTC_udp_ports_1&lt;BR /&gt;nat (inside,outside) source static VTC_Server interface service VTC_udp_ports_2 VTC_udp_ports_2&lt;BR /&gt;nat (inside,outside) source static VTC_Server interface service VTC_tcp_ports_1 VTC_tcp_ports_1&lt;BR /&gt;nat (inside,outside) source static VTC_Server interface service VTC_tcp_ports_2 VTC_tcp_ports_2&lt;BR /&gt;nat (inside,outside) source static VTC_Server interface service SSL-TLS SSL-TLS&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list outside_access_in extended permit &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; VTC_Services any &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; VTC_Server&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 12 Mar 2017 15:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043391#M145860</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-12T15:54:35Z</dc:date>
    </item>
    <item>
      <title>I believe what you are</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043392#M145864</link>
      <description>&lt;P&gt;I believe what you are suggesting is what I have in the firewall right now...the only thing FW int 443 is used for is ASDM and I have moved that to another port...there are some extra permit ACLs but only because I was trying to throw stuff against the wall when it wasn't working....&lt;/P&gt;
&lt;P&gt;Keep in mind if I att a 443 PAT config to the TeleConference network object, it works fine.&lt;/P&gt;
&lt;PRE style="line-height: normal;" class="prettyprint"&gt;FIREWALL1(config)# show run access-list&lt;BR /&gt;access-list outside extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside extended permit tcp any object TeleConference eq https&lt;BR /&gt;access-list outside extended permit tcp any object TeleConference eq h323&lt;BR /&gt;access-list outside extended permit udp any object TeleConference eq 1719&lt;BR /&gt;access-list outside extended permit tcp any object TeleConference range sip 5061&lt;BR /&gt;access-list outside extended permit tcp any object TeleConference range 50000 50499&lt;BR /&gt;access-list outside extended permit udp any object TeleConference range 50000 50499&lt;BR /&gt;access-list outside extended permit udp any object TeleConference range sip 5061&lt;BR /&gt;access-list outside extended permit tcp any4 interface outside eq https&lt;BR /&gt;access-list outside extended permit tcp any4 host 200.200.200.200 eq https&lt;BR /&gt;access-list outside extended permit ip host 5.5.5.5 interface outside&lt;BR /&gt;access-list outside extended permit ip host 5.5.5.5 object TeleConference&lt;BR /&gt;access-list outside extended permit ip host 5.5.5.5 host 200.200.200.200&lt;BR /&gt;access-list outside extended permit object-group TeleConference-SVC any object TeleConference&lt;BR /&gt;FIREWALL1(config)# show run nat&lt;BR /&gt;nat (inside,any) source static obj-10.10.30.0 obj-10.10.30.0 destination static obj-10.10.0.0 obj-10.10.0.0 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-1719-UDP TeleConference-1719-UDP&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-1720-TCP TeleConference-1720-TCP&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-HTTPS TeleConference-HTTPS&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-50000-50499-TCP TeleConference-50000-50499-TCP&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-50000-50499-UDP TeleConference-50000-50499-UDP&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-5060-5061-TCP TeleConference-5060-5061-TCP&lt;BR /&gt;nat (inside,outside) source static TeleConference interface service TeleConference-5060-5061-UDP TeleConference-5060-5061-UDP&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;FIREWALL1(config)# show run obj&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-10.10.0.0&lt;BR /&gt; subnet 10.10.0.0 255.255.252.0&lt;BR /&gt;object network obj-10.10.30.0&lt;BR /&gt; subnet 10.10.30.0 255.255.255.0&lt;BR /&gt;object network TeleConference&lt;BR /&gt; host 10.10.30.120&lt;BR /&gt;object service TeleConference-1719-1720&lt;BR /&gt; service tcp destination range 1719 h323&lt;BR /&gt;object service TeleConference-5060-5061&lt;BR /&gt; service tcp destination range sip 5061&lt;BR /&gt;object service TeleConference-1719-UDP&lt;BR /&gt; service udp destination eq 1719&lt;BR /&gt;object service TeleConference-1720-TCP&lt;BR /&gt; service tcp destination eq h323&lt;BR /&gt;object service TeleConference-HTTPS&lt;BR /&gt; service tcp destination eq https&lt;BR /&gt;object service TeleConference-50000-50499-UDP&lt;BR /&gt; service udp destination range 50000 50499&lt;BR /&gt;object service TeleConference-50000-50499-TCP&lt;BR /&gt; service tcp destination range 50000 50499&lt;BR /&gt;object service TeleConference-5060-5061-TCP&lt;BR /&gt; service tcp destination range sip 5061&lt;BR /&gt;object service TeleConference-5060-5061-UDP&lt;BR /&gt; service udp destination range sip 5061&lt;BR /&gt;FIREWALL1(config)# show run object-group&lt;BR /&gt;object-group service TeleConferenceSvc tcp&lt;BR /&gt; port-object range 50000 50499&lt;BR /&gt; port-object range 1719 h323&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object range sip 5061&lt;BR /&gt;object-group service TeleConference-SVC&lt;BR /&gt; service-object object TeleConference-1719-UDP&lt;BR /&gt; service-object object TeleConference-1720-TCP&lt;BR /&gt; service-object object TeleConference-HTTPS&lt;BR /&gt; service-object object TeleConference-50000-50499-UDP&lt;BR /&gt; service-object object TeleConference-50000-50499-TCP&lt;BR /&gt; service-object object TeleConference-5060-5061-TCP&lt;BR /&gt; service-object object TeleConference-5060-5061-UDP&lt;BR /&gt;FIREWALL1(config)#&lt;BR /&gt;&lt;BR /&gt;FIREWALL1(config)# packet-tracer input outside tcp 5.5.5.5 20202 200.200.200.200 443 det&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 200.200.200.200 using egress ifc identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffe133eb20, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=73795, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7fffe1a59dc0, priority=0, domain=permit, deny=true&lt;BR /&gt; hits=5580, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P style="line-height: normal;"&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Mar 2017 16:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043392#M145864</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2017-03-12T16:35:37Z</dc:date>
    </item>
    <item>
      <title>any other thoughts on this?</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043393#M145869</link>
      <description>&lt;P&gt;any other thoughts on this? &amp;nbsp;I feel like this shouldn't be that difficult...&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 00:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043393#M145869</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2017-03-16T00:31:36Z</dc:date>
    </item>
    <item>
      <title>I think that your service</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043394#M145872</link>
      <description>&lt;P&gt;I think that your service object should be "service tcp source eq https" not destination. With respect to the inside server, the source port is 443, not the destination port. Your packet tracer should have ideally hit an un-nat phase if the NAT rule was correct.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 17:46:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043394#M145872</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-03-16T17:46:31Z</dc:date>
    </item>
    <item>
      <title>My goal is to expose the</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043395#M145891</link>
      <description>&lt;P&gt;My goal is to expose the inside server to the outside on a number of ports, using port forwarding on the outside interface to map those ports to the internal server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As such I used a destination port of 443 in the packet tracer to simulate an incoming 443 connection which should be forwarded (by NAT/PAT) to the internal server and allowed by ACL.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am open to changing the NAT commands to say source instead of destination but I guess I am confused since when a packet comes to the firewall from the internet, it is the destination port which will be 443. &amp;nbsp;When the internal server sends a syn-ack back to the host on the Internet to build the connection, that would have a source port of 443 and a destination port of whatever but on the initial packet (SYN) that needs to be NAT/PATd properly to the inside server, the destination would be 443.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 17:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043395#M145891</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2017-03-16T17:54:23Z</dc:date>
    </item>
    <item>
      <title>Static Nat rules are bi</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043396#M145892</link>
      <description>&lt;P&gt;Static Nat rules are bi-directional. When you define the rules, you are actually defining the rule from inside to outside interfaces for your inside server. If you look at it in that direction, the server uses the source port of 443. That is why the the service-object comes after the "source static" section. The actual traffic is initiated in the opposite direction and reverse of the NAT rule is applied (destination NAT translation)&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 18:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043396#M145892</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-03-16T18:27:54Z</dc:date>
    </item>
    <item>
      <title>that appears to have done it</title>
      <link>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043397#M145894</link>
      <description>&lt;P&gt;that appears to have done it,thanks. &amp;nbsp;I figured it was something being interpreted backwards but didnt know if it was an ACL, NAT statement, object etc &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 18:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-multiple-ports-to-outside-interface-ip/m-p/3043397#M145894</guid>
      <dc:creator>slug420</dc:creator>
      <dc:date>2017-03-16T18:45:00Z</dc:date>
    </item>
  </channel>
</rss>

