<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic This looks very promising, by in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074264#M146165</link>
    <description>&lt;P&gt;This looks very promising, by the hits in the Access Rule list, it seem to translate correctly. I've yet only configured one host, "10.0.0.20".&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm a bit curious about my packet-tracer tho. This still drop's the packet, have I entered the wrong information here?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've run the following in packet-tracer (I do use 8.8.8.8 in the actual packet-tracer):&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;packet-tracer input Outside tcp 8.8.8.8 6881 10.0.0.20 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.20 using egress ifc InternalNetworkX&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-list Outside_access_in extended permit tcp any4 object SRV-10.0.0.20 eq 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network SRV-10.0.0.20-TCP6881&lt;BR /&gt; nat (InternalNetworkX,Outside) static 9.9.9.9 service tcp 6881 6881&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: InternalNetworkX&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The same goes for UDP.&lt;/P&gt;</description>
    <pubDate>Wed, 01 Mar 2017 14:10:52 GMT</pubDate>
    <dc:creator>trylvis123</dc:creator>
    <dc:date>2017-03-01T14:10:52Z</dc:date>
    <item>
      <title>Cisco ASA 9.4 Port-forwarding issue using multiple ports to same inside host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074260#M146156</link>
      <description>&lt;P&gt;Greetings everyone,&lt;/P&gt;
&lt;P&gt;I'm trying to set up a port-forward through Cisco ASA running version 9.4.3.8.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I want to use one public IP, and forward different ports coming to this IP, into one or more internal servers on the same port.&lt;/P&gt;
&lt;P&gt;I also want the clients on this subnet to be PAT'ed outwards on the same IP.&lt;/P&gt;
&lt;P&gt;We do have multiple public IP's in this subnet the Outside interface, used for different purposes.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Example scenario, public IP address 9.9.9.9 - internal address 10.0.0.20 for server A and 10.0.0.30 for server B.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Internet -&amp;gt; Outside interface - IP 9.9.9.9:tcp6881 -&amp;gt;NAT-&amp;gt; Inside server 10.0.0.20:tcp6881&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Internet -&amp;gt; Outside interface - IP 9.9.9.9:udp6882 -&amp;gt;NAT-&amp;gt; Inside server 10.0.0.20:udp6882&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Internet -&amp;gt; Outside interface - IP 9.9.9.9:tcp7881 -&amp;gt; &lt;SPAN&gt;NAT-&amp;gt; &lt;/SPAN&gt;Inside server 10.0.0.30:tcp7881&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Internet -&amp;gt; Outside interface - IP 9.9.9.9:udp7882 -&amp;gt;NAT-&amp;gt; Inside server 10.0.0.30:udp7882&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/portforward.jpg" class="migrated-markup-image" /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm currently working on getting host A(10.0.0.20) to work, and I've used the following commands:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;access-list Outside_access_in extended permit udp any4 object 10.0.0.20 eq 6881&lt;BR /&gt;access-list Outside_access_in extended permit tcp any4 object 10.0.0.20 eq 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;BR /&gt;object service TCP_6881&lt;BR /&gt; service tcp source eq 6881&lt;BR /&gt;object service UDP_6881&lt;BR /&gt; service udp source eq 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;nat (InternalNetworkX,Outside) source static 10.0.0.20 Outside_9.9.9.9 destination static Outside_9.9.9.9 Outside_9.9.9.9 service TCP_6881 TCP_6881&lt;BR /&gt;nat (InternalNetworkX,Outside) source static 10.0.0.20 Outside_9.9.9.9 destination static Outside_9.9.9.9 Outside_9.9.9.9 service UDP_6881 UDP_6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;BR /&gt;object network InternalNetworkX&lt;BR /&gt; nat (InternalNetworkX,Outside) dynamic 9.9.9.9&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Now we get incoming UDP traffic(hits in access rules get updated), but no TCP traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However, if I run a packet tracer, it says that both UDP and TCP should be dropped:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;UDP packet-tracer:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;packet-tracer input Outside udp 8.8.8.8 6881 10.0.0.20 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.20 using egress ifc InternalNetworkX&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-list Outside_access_in extended permit udp any4 object hostA&amp;nbsp;eq 6881&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network InternalNetworkX&lt;BR /&gt; nat (InternalNetworkX,Outside) dynamic 9.9.9.9&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: InternalNetworkX&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;TCP packet-trace:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;packet-tracer input Outside tcp 8.8.8.8 6881 10.0.0.20 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.20 using egress ifc InternalNetworkX&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-list Outside_access_in extended permit tcp any4 object hostA eq 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network InternalNetworkX&lt;BR /&gt; nat (InternalNetworkX,Outside) dynamic 9.9.9.9&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: InternalNetworkX&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Any ideas on this?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:59:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074260#M146156</guid>
      <dc:creator>trylvis123</dc:creator>
      <dc:date>2019-03-12T08:59:43Z</dc:date>
    </item>
    <item>
      <title>You are configuring it in a</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074261#M146160</link>
      <description>&lt;P&gt;You are configuring it in a too complicated way ...&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network SRV-10.0.0.20-6881&lt;BR /&gt; host 10.0.0.20&lt;BR /&gt; nat (InternalNetworkX,Outside) static 9.9.9.9 service tcp 6881 6881&lt;BR /&gt;!&lt;BR /&gt;object network SRV-10.0.0.20-6882&lt;BR /&gt; host 10.0.0.20&lt;BR /&gt; nat (InternalNetworkX,Outside) static 9.9.9.9 service udp 6882 6882&lt;BR /&gt;!&lt;BR /&gt;object network SRV-10.0.0.30-7881&lt;BR /&gt; host 10.0.0.30&lt;BR /&gt; nat (InternalNetworkX,Outside) static 9.9.9.9 service tcp 7881 7881&lt;BR /&gt;!&lt;BR /&gt;object network SRV-10.0.0.30-7882&lt;BR /&gt; host 10.0.0.30&lt;BR /&gt; nat (InternalNetworkX,Outside) static 9.9.9.9 service udp 7882 7882&lt;BR /&gt;!&lt;BR /&gt;object network InternalNetworkX&lt;BR /&gt; nat (InternalNetworkX,Outside) dynamic 9.9.9.9&lt;/PRE&gt;
&lt;P&gt;And you need to allow the traffic in your outside ACL:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list OUTSIDE-IN permit tcp any host 10.0.0.20 eq 6881&lt;BR /&gt;access-list OUTSIDE-IN permit udp any host 10.0.0.20 eq 6882&lt;BR /&gt;access-list OUTSIDE-IN permit tcp any host 10.0.0.30 eq 7881&lt;BR /&gt;access-list OUTSIDE-IN permit udp any host 10.0.0.30 eq 7882&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 Mar 2017 13:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074261#M146160</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-03-01T13:24:10Z</dc:date>
    </item>
    <item>
      <title>Thanks for your reply!</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074262#M146162</link>
      <description>&lt;P&gt;Thanks for your reply!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That seems alot easier, but how will that be if we use port 6881 for both TCP and UDP, can I create two objects with the same IP, but different ports?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Like:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network SRV&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.0&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0.20&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-TCP&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6881&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; host &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.0&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;InternalNetworkX&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;9.9&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;9.9&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; service tcp &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6881&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6881&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pun"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network SRV&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.0&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0.20&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-UDP&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6881&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; host &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.0&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;InternalNetworkX&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;9.9&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;9.9&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; service udp &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6881&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6881&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pun"&gt;!&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 01 Mar 2017 13:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074262#M146162</guid>
      <dc:creator>trylvis123</dc:creator>
      <dc:date>2017-03-01T13:27:28Z</dc:date>
    </item>
    <item>
      <title>Yes, exactly like that.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074263#M146164</link>
      <description>&lt;P&gt;Yes, exactly like that.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 13:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074263#M146164</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-03-01T13:31:31Z</dc:date>
    </item>
    <item>
      <title>This looks very promising, by</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074264#M146165</link>
      <description>&lt;P&gt;This looks very promising, by the hits in the Access Rule list, it seem to translate correctly. I've yet only configured one host, "10.0.0.20".&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm a bit curious about my packet-tracer tho. This still drop's the packet, have I entered the wrong information here?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've run the following in packet-tracer (I do use 8.8.8.8 in the actual packet-tracer):&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;packet-tracer input Outside tcp 8.8.8.8 6881 10.0.0.20 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.0.20 using egress ifc InternalNetworkX&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-list Outside_access_in extended permit tcp any4 object SRV-10.0.0.20 eq 6881&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network SRV-10.0.0.20-TCP6881&lt;BR /&gt; nat (InternalNetworkX,Outside) static 9.9.9.9 service tcp 6881 6881&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: InternalNetworkX&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The same goes for UDP.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 14:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074264#M146165</guid>
      <dc:creator>trylvis123</dc:creator>
      <dc:date>2017-03-01T14:10:52Z</dc:date>
    </item>
    <item>
      <title>The packet-tracer has to be</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074265#M146166</link>
      <description>&lt;P&gt;The packet-tracer has to be used with the packet-information as it enters the ASA:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;packet-tracer input Outside tcp 8.8.8.8 6881 9.9.9.9&amp;nbsp;6881&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 14:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074265#M146166</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2017-03-01T14:37:04Z</dc:date>
    </item>
    <item>
      <title>Exactly, that seems to work</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074266#M146170</link>
      <description>&lt;P&gt;Exactly, that seems to work perfectly.&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 12:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-4-port-forwarding-issue-using-multiple-ports-to-same/m-p/3074266#M146170</guid>
      <dc:creator>trylvis123</dc:creator>
      <dc:date>2017-03-02T12:33:34Z</dc:date>
    </item>
  </channel>
</rss>

