<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yup, what you added was only in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011369#M147028</link>
    <description>&lt;P&gt;Yup, what you added was only the NAT. Your ACL's were correct when you added it the first time.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list CamToInside permit tcp any host 192.168.103.***&amp;nbsp;eq www&lt;BR /&gt;access-group CamToInside in interface outside&lt;/PRE&gt;</description>
    <pubDate>Fri, 03 Feb 2017 12:22:41 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-02-03T12:22:41Z</dc:date>
    <item>
      <title>Trouble</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011364#M147023</link>
      <description>&lt;P&gt;Okay, I'm starting to get desperate. Sorry if I posted this on the wrong forum.&lt;/P&gt;
&lt;P&gt;Here's my situation: There are several Cisco ASA 5506 x's deployed at our client's stores. What I'm trying to do is to make it possible to access the camera from any device by typing in the static ip with whatever port the camera is set with, like 8080. The problem is I don't know how to set up a Cisco ASA. My only experience with cisco are routers and switches.&lt;/P&gt;
&lt;P&gt;The ASA is setup like this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;outside====&amp;gt;ASA firewall&amp;lt;====inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The camera is connected on the inside interface on a switch.&lt;/P&gt;
&lt;P&gt;The command I've tried for port forwarding are these:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network camera&lt;BR /&gt;&amp;nbsp;host 192.168.103.***&lt;/P&gt;
&lt;P&gt;object service tcp_camera&lt;BR /&gt;&amp;nbsp;service tcp source eq 80&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;access-list CamToInside permit tcp any host 192.168.103.***&amp;nbsp;eq www&lt;BR /&gt;access-group CamToInside in interface outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But it didn't work, so I removed that. I've been researching for a really long time, and I'm getting nowhere. Can someone help me? I'll put the config one of the firewalls I'm working with has. I'll remove some of the info, though. These were the things done by other people before I started working here.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:52:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011364#M147023</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2019-03-12T08:52:06Z</dc:date>
    </item>
    <item>
      <title>You should follow the steps</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011365#M147024</link>
      <description>&lt;P&gt;You should follow the steps to create port forwarding rules here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/118996-config-asa-00.html#anc10&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 01:34:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011365#M147024</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-02T01:34:04Z</dc:date>
    </item>
    <item>
      <title>I tried that, but it didn't</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011366#M147025</link>
      <description>&lt;P&gt;I tried that, but it didn't work, for some reason. I looked at the logs, and I was getting this when I tried accessing the camera through my phone's ip cam app:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/20170202_131422modified_0.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;I also tried using the computer at the office, but it's not working.&lt;/P&gt;
&lt;P&gt;Here's how I set up the nat, in case it was a mis-configuration on my end.&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/20170202_131922modified.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 04:15:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011366#M147025</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-02T04:15:25Z</dc:date>
    </item>
    <item>
      <title>Can you get the Cli of the</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011367#M147026</link>
      <description>&lt;P&gt;Can you get the Cli of the nat you added? Also run a packet-tracer to simulate the asa processing. The command is below :&lt;/P&gt;
&lt;P&gt;Packet-tracer input outside tcp 4.4.4.4 12345 &amp;lt;outside ip address &amp;gt; 8080 detailed&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 10:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011367#M147026</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-02T10:19:25Z</dc:date>
    </item>
    <item>
      <title>Sorry it took a while.</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011368#M147027</link>
      <description>&lt;P&gt;Sorry it took a while. Timezone difference. Okay, it looks like the only thing added when I used ASDM to configure port forwarding were these:&lt;/P&gt;
&lt;P&gt;object network camera_192.168.***.***&lt;BR /&gt; nat (inside,outside) static interface service tcp www 8080&lt;/P&gt;
&lt;P&gt;I did not see a new access list at all. The packet tracer result is attached. It looks like it's getting dropped because of the implicit deny, if I'm reading it right.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 04:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011368#M147027</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-03T04:40:55Z</dc:date>
    </item>
    <item>
      <title>Yup, what you added was only</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011369#M147028</link>
      <description>&lt;P&gt;Yup, what you added was only the NAT. Your ACL's were correct when you added it the first time.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list CamToInside permit tcp any host 192.168.103.***&amp;nbsp;eq www&lt;BR /&gt;access-group CamToInside in interface outside&lt;/PRE&gt;</description>
      <pubDate>Fri, 03 Feb 2017 12:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011369#M147028</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-03T12:22:41Z</dc:date>
    </item>
    <item>
      <title>Okay, I'll try that Monday</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011370#M147029</link>
      <description>&lt;P&gt;Okay, I'll try that Monday since I'm off today and tomorrow and get back to you.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 04:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011370#M147029</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-04T04:56:47Z</dc:date>
    </item>
    <item>
      <title>Okay, I added the access-list</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011371#M147030</link>
      <description>&lt;P&gt;Okay, I added the access-list, but for whatever reason, it's still being denied. I attached the packet tracer result. The commands that were added to the running config were these:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-variant-ligatures: normal; font-variant-caps: normal; text-decoration: none; vertical-align: baseline;"&gt;access-list Cam_Access extended permit tcp any host 192.168.***.*** eq www&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-variant-ligatures: normal; font-variant-caps: normal; text-decoration: none; vertical-align: baseline;"&gt;&lt;SPAN style="font-family: Arial; color: #000000; background-color: transparent; font-weight: 400; font-variant-ligatures: normal; font-variant-caps: normal; text-decoration: none; vertical-align: baseline;"&gt;access-group Cam_Access in interface outside&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Actually, it's kinda weird it became an extended permit. I didn't type that at all.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 07:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011371#M147030</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-06T07:20:13Z</dc:date>
    </item>
    <item>
      <title>What was the packet-tracer</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011372#M147031</link>
      <description>&lt;P&gt;What was the packet-tracer command that you ran? Can you attach a santized config to this thread if possible to check?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 13:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011372#M147031</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-06T13:05:27Z</dc:date>
    </item>
    <item>
      <title>Okay, I actually made an</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011373#M147032</link>
      <description>&lt;P&gt;Okay, I actually made an error in the ip address for the object network, so I corrected it. But now, I'm getting a weird result. The packet tracer result shows that it should be working, but when I try to access the camera on my phone, it's not working. Could this be an issue not related to the asa config?&lt;/P&gt;
&lt;P&gt;I attached the results I got when using packet-tracer input outside tcp 4.4.4.4 12345 (outside ip address) 8080 detailed command after fixing the ip address error.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 04:13:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011373#M147032</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-07T04:13:38Z</dc:date>
    </item>
    <item>
      <title>If the packet-tracer shows</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011374#M147033</link>
      <description>&lt;P&gt;If the packet-tracer shows the right output, try applying a packet capture on the outside and inside interface for traffic from your source public ip address while you do the actual test. This will show if there is something wrong with the actual traffic.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 05:02:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011374#M147033</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-07T05:02:59Z</dc:date>
    </item>
    <item>
      <title>Okay, I actually tried</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011375#M147034</link>
      <description>&lt;P&gt;Okay, I actually tried something that worked. I changed the port set on the camera. So all I really needed was the that thing you linked and the acl. Thanks!&lt;/P&gt;
&lt;P&gt;Just one more question before I mark the correct stuff, so I can use it in the future. With the camera they have, I can set the port to anything other than 80. So, when setting up on the asdm, would the real port section be the one set on the camera itself?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2017 03:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011375#M147034</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-08T03:50:05Z</dc:date>
    </item>
    <item>
      <title>If you change the camera port</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011376#M147035</link>
      <description>&lt;P&gt;If you change the camera port, you would have to change the real port in the NAT statement and also in the ACL applied on the outside interface.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2017 13:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011376#M147035</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-08T13:01:44Z</dc:date>
    </item>
    <item>
      <title>Okay. Thanks! Can you give me</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011377#M147036</link>
      <description>&lt;P&gt;Okay. Thanks! Can you give me an example of the ACL? Like, let's say I have a camera at port 5010 at the address of 172.168.1.20. How would the ACL statement go? Would go something like:&lt;/P&gt;
&lt;P&gt;access-list Outside_to_Cam extended permit tcp any host 172.168.1.20 eq 5010&lt;/P&gt;
&lt;P&gt;then insert it to the outside interface?&lt;/P&gt;
&lt;P&gt;Just want to know for future reference.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 01:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011377#M147036</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-09T01:15:48Z</dc:date>
    </item>
    <item>
      <title>Yes. You would have the ACL</title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011378#M147037</link>
      <description>&lt;P&gt;Yes. You would have the ACL with source as 'any' and destination as the real ip address and real port of the camera.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 01:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011378#M147037</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-02-09T01:36:49Z</dc:date>
    </item>
    <item>
      <title>Thank you! </title>
      <link>https://community.cisco.com/t5/network-security/trouble/m-p/3011379#M147038</link>
      <description>&lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Feb 2017 01:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble/m-p/3011379#M147038</guid>
      <dc:creator>Dana_Alexis</dc:creator>
      <dc:date>2017-02-09T01:53:07Z</dc:date>
    </item>
  </channel>
</rss>

