<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5506 Port Forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984679#M147809</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have a 5506-x that needs to port forward a range of ports. My outside IP is also Dynamic from the ISP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So far I made a Network\Service Object for the ports I want to use in the port forwarding.&lt;/P&gt;
&lt;P&gt;object service Service_OBJ_IPcamPorts_UDP&lt;BR /&gt;&amp;nbsp;service udp source range 8186 8191 destination range 8186 8191&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;object service Service_OBJ_IPcamPort_TCP&lt;BR /&gt;&amp;nbsp;service tcp source range 8186 8191 destination range 8186 8191&lt;/P&gt;
&lt;P&gt;object network Network-Object-SOHO-Cisco-Router&lt;BR /&gt;&amp;nbsp;host 10.0.0.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After the creation of the objects I'm unsure how to nat and make the acl to allow the packets.&lt;/P&gt;
&lt;P&gt;nat (CISCO-SOHO-Router,outside) source static Network-Object-SOHO-Cisco-Router Network-Object-SOHO-Cisco-Router service Service_OBJ_IPcamPort_TCP Service_OBJ_IPcamPort_TCP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Then my Current ACL&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list outside_access_in line 2 extended permit tcp any range 8186 8191 host 10.0.0.2 range 8186 8191 log disable (hitcnt=0) 0x95da1b49&lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 2 extended permit udp any range 8186 8191 host 10.0.0.2 range 8186 8191 log disable (hitcnt=0) 0x401fe7ac&lt;BR /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/capture_254.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;any is the internet&lt;/P&gt;
&lt;P&gt;10.0.0.2 is a SOHO home router that is nating again with the same port ranges&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:46:06 GMT</pubDate>
    <dc:creator>Joshuabowers</dc:creator>
    <dc:date>2019-03-12T08:46:06Z</dc:date>
    <item>
      <title>ASA 5506 Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984679#M147809</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have a 5506-x that needs to port forward a range of ports. My outside IP is also Dynamic from the ISP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So far I made a Network\Service Object for the ports I want to use in the port forwarding.&lt;/P&gt;
&lt;P&gt;object service Service_OBJ_IPcamPorts_UDP&lt;BR /&gt;&amp;nbsp;service udp source range 8186 8191 destination range 8186 8191&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;object service Service_OBJ_IPcamPort_TCP&lt;BR /&gt;&amp;nbsp;service tcp source range 8186 8191 destination range 8186 8191&lt;/P&gt;
&lt;P&gt;object network Network-Object-SOHO-Cisco-Router&lt;BR /&gt;&amp;nbsp;host 10.0.0.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After the creation of the objects I'm unsure how to nat and make the acl to allow the packets.&lt;/P&gt;
&lt;P&gt;nat (CISCO-SOHO-Router,outside) source static Network-Object-SOHO-Cisco-Router Network-Object-SOHO-Cisco-Router service Service_OBJ_IPcamPort_TCP Service_OBJ_IPcamPort_TCP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Then my Current ACL&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list outside_access_in line 2 extended permit tcp any range 8186 8191 host 10.0.0.2 range 8186 8191 log disable (hitcnt=0) 0x95da1b49&lt;BR /&gt;&amp;nbsp; access-list outside_access_in line 2 extended permit udp any range 8186 8191 host 10.0.0.2 range 8186 8191 log disable (hitcnt=0) 0x401fe7ac&lt;BR /&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/capture_254.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;any is the internet&lt;/P&gt;
&lt;P&gt;10.0.0.2 is a SOHO home router that is nating again with the same port ranges&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984679#M147809</guid>
      <dc:creator>Joshuabowers</dc:creator>
      <dc:date>2019-03-12T08:46:06Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984680#M147810</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you capture traffic on your outside interface to make sure that you are receiving traffic from SOHO using the right IP/Port&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2017 06:38:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984680#M147810</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2017-01-12T06:38:07Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984681#M147811</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You need to translate the private IP address 10.0.0.2 to a public one. You can use the outside interface public IP, similar to this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (CISCO-SOHO-Router,outside) source static Network-Object-SOHO-Cisco-Router&amp;nbsp;interface service Service_OBJ_IPcamPort_TCP Service_OBJ_IPcamPort_TCP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Another thing, I am not sure if the incoming traffic would be sourcing from the same destination range ports toward the 10.0.0.2. If not please correct the ACLs to read as following:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.0.2 range 8186 8191 log disable&lt;BR /&gt;access-list outside_access_in&amp;nbsp;extended permit udp any host 10.0.0.2 range 8186 8191 log disable&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also please remove the destination range from the service object.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2017 23:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984681#M147811</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2017-01-12T23:43:54Z</dc:date>
    </item>
    <item>
      <title>I found out my main problem.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984682#M147812</link>
      <description>&lt;P&gt;I found out my main problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;for acls for natting, only one acl needs to be &amp;nbsp; Specified &amp;nbsp;for the node that has the natted service. I believe the asa will build acls&amp;nbsp;&amp;nbsp;on there own to allow non nated traffic to come back.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2017 20:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984682#M147812</guid>
      <dc:creator>Joshuabowers</dc:creator>
      <dc:date>2017-01-13T20:12:29Z</dc:date>
    </item>
    <item>
      <title>ASA by default inspects the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984683#M147813</link>
      <description>&lt;P&gt;ASA by default inspects the traffic leaving and&amp;nbsp;allows&amp;nbsp;the returning traffic to pass through without any need for any ACL, but if you want to allow the traffic initiated from outside to inside, you need an ACL entry to allow it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2017 20:29:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-port-forwarding/m-p/2984683#M147813</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2017-01-13T20:29:37Z</dc:date>
    </item>
  </channel>
</rss>

