<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Looks like you NAT rule is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984189#M147826</link>
    <description>&lt;P&gt;Looks like your NAT rule is incorrect. &amp;nbsp;you are translating the port tcp/3396 to tcp/3396. &amp;nbsp;This will not work as the server is, i assume, listening for port tcp/3389. &amp;nbsp;Set the original port to tcp/3389 and it should work fine.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 26 Jan 2017 09:04:51 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2017-01-26T09:04:51Z</dc:date>
    <item>
      <title>Port Forwarding for ASA Using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984187#M147824</link>
      <description>&lt;P&gt;Hello.&amp;nbsp; I am a Cisco enterprise equipment newbie so I have&amp;nbsp; a newbie&amp;nbsp; question.&amp;nbsp; I am trying to setup 2 RDP port&amp;nbsp; forwards&amp;nbsp; through the ASA 5505.&amp;nbsp; I can currently RDP through the ASA with the default listening port, 3389. However, my attempts are&amp;nbsp; configuring RDP with other ports has not&amp;nbsp; panned out&amp;nbsp; at&amp;nbsp; all.&amp;nbsp; I inherited this setup so I did not originally configure the ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using the ASDM interface and would like to continue to do so if&amp;nbsp; possible.&amp;nbsp; The ASA is v8.2 and&amp;nbsp; the ASDM is&amp;nbsp; v6.3.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA is configured&amp;nbsp; for&amp;nbsp; 1&amp;nbsp; Outside port&amp;nbsp; (10.10.30.85 - DHCP) and 3 Inside ports (10.10.30.254).&amp;nbsp; One inside port&amp;nbsp; is&amp;nbsp; connected&amp;nbsp; to a Dell PowerConnect switch which supplies a server and&amp;nbsp; 4 workstations.&amp;nbsp; The&amp;nbsp; Outside&amp;nbsp; ASA port&amp;nbsp; is&amp;nbsp; connected&amp;nbsp; to an&amp;nbsp; ATT Pace&amp;nbsp; 4111N-031 modem/router.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With other&amp;nbsp; equipment, I have just configured&amp;nbsp; a port&amp;nbsp; forward and it was pretty straightforward.&amp;nbsp; I have&amp;nbsp; seen much about&amp;nbsp; using a NAT rule.&amp;nbsp; Do I/Should&amp;nbsp; ICan I/ use a NAT Rule?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached screen&amp;nbsp; shots for the NAT and Access Rules.&lt;/P&gt;
&lt;P&gt;Thank you in advance for&amp;nbsp; your assistance&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984187#M147824</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2019-03-12T08:45:59Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984188#M147825</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Your nat is done on outside interface but your acl is pointing to an object called WAN. You should put outside like it was done for the real rdp port.&lt;/P&gt;
&lt;P&gt;Based on your description your asa outside had a private IP and your modem/router had the public IP, am I right? If yes, you need to configure your router as well to forward this port to your asa.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 05:09:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984188#M147825</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-01-26T05:09:08Z</dc:date>
    </item>
    <item>
      <title>Looks like you NAT rule is</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984189#M147826</link>
      <description>&lt;P&gt;Looks like your NAT rule is incorrect. &amp;nbsp;you are translating the port tcp/3396 to tcp/3396. &amp;nbsp;This will not work as the server is, i assume, listening for port tcp/3389. &amp;nbsp;Set the original port to tcp/3389 and it should work fine.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 09:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984189#M147826</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-26T09:04:51Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984190#M147827</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I didn't read correctly, Marius is right you're trying to do 2 nats with different ports on same machine COTEDECO-1.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You need to modify the second nat with the 2nd machine&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2017 12:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984190#M147827</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-01-26T12:34:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984191#M147829</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for&amp;nbsp; your response.&amp;nbsp; My original config did have both ports 3389 and 3395 intentionallyl NAT'd to COTEDECO-1.&amp;nbsp; My thought was that, as an experiment, I could just change the listening port on COTEDECO-1 and then&amp;nbsp; be able to remote in with either&amp;nbsp; port (as a test).&amp;nbsp; Currently I can remotely access COTEDECO-1 and was trying to figure out how to access it with a different port.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have since changed the&amp;nbsp; rules to NAT port 3396 to a different machine COTEDECO-2.&amp;nbsp; My thought was that I could use 3396 to get into COTEDECO-2.&amp;nbsp; This does not work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you please help me understand what affect an Access Rule has what&amp;nbsp; I am trying to do?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 12:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984191#M147829</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2017-01-30T12:52:56Z</dc:date>
    </item>
    <item>
      <title>Hi and thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984192#M147831</link>
      <description>&lt;P&gt;Hi and thanks for your response.&lt;/P&gt;
&lt;P&gt;I created the rule to the WAN_ destination as a test.&amp;nbsp; There also already exists a rule with Destination outside.&amp;nbsp; I was trying to mirror the rules that were already in place for Port 3389 (default listening port).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All of these rules are "outside" incoming rules" which would explain needing to use a Destination interface of "outside".&amp;nbsp; Are rules required for outgoing (to the WAN) traffic or are these port&amp;nbsp; rules bi-directional?&lt;/P&gt;
&lt;P&gt;As far as the router, I do have port&amp;nbsp; forwarding configured for ports 3389, 3395 and 3396.&amp;nbsp; I eventually want to stop using 3389 to allow two different people to log in to two different machines (COTEDECO-1 and&amp;nbsp; COTEDECO-2) with ports 3395 and 3396.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 13:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984192#M147831</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2017-01-30T13:18:34Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984193#M147833</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you changed the RDP listening port in Windows?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use whatever port you want but you need to change it into Windows machine:&lt;/P&gt;
&lt;P&gt;https://support.microsoft.com/en-us/help/306759/how-to-change-the-listening-port-for-remote-desktop&lt;/P&gt;
&lt;P&gt;On ASA, for sure, you'll be allowed to as much as nat as you want on the same IP if the port is different.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 13:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984193#M147833</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-01-30T13:23:03Z</dc:date>
    </item>
    <item>
      <title>There are three ways to NAT</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984194#M147834</link>
      <description>&lt;P&gt;There are three ways to NAT the outside port of 3389 to the inside.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;You can assign a dedicated public IP to the first server and NAT 3389 -&amp;gt; 3389 or NAT all ports for that matter.&lt;/LI&gt;
&lt;LI&gt;change the outside port (to as you have 3398) and map that to port 3389 on the inside towards the second server&lt;/LI&gt;
&lt;LI&gt;Or, as mentioned by Francesco, you can have the server listen for a different (user-defined) RDP port. &amp;nbsp;Although you can do this it just complicates things in my opinion.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 14:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984194#M147834</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-30T14:02:47Z</dc:date>
    </item>
    <item>
      <title>Static NAT is bidirectional</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984195#M147836</link>
      <description>&lt;P&gt;Static NAT is bidirectional and dynamic nat is unidirectional. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will also need to add access-list entries to allow the traffic from WAN interface to the inside host you are setting this up for.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 14:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984195#M147836</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-30T14:06:07Z</dc:date>
    </item>
    <item>
      <title>Thank  you Marius.  I</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984196#M147837</link>
      <description>&lt;P&gt;Thank &amp;nbsp;you Marius. &amp;nbsp;I appreciate the NAT information. &amp;nbsp;I am using Static NAT's. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;You mention that I need to add access-list entires to allow traffice from WAN Interface to the inside host. &amp;nbsp;I think that these already exist. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have attached the ACL for your review. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aren't rules 2, 7 and 8 what I need to cover any of the three RDP Ports? &amp;nbsp; &amp;nbsp;I created rules 9 and 10 an experiment to test the rues. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again and I look forward to hearing back from you.&lt;/P&gt;
&lt;P&gt;Chuck&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 18:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984196#M147837</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2017-01-30T18:22:33Z</dc:date>
    </item>
    <item>
      <title>Well as mentioned earlier you</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984197#M147839</link>
      <description>&lt;P&gt;Well as mentioned earlier you one NAT rule is not correct. You need to change the original source to 3389 and keep the translated source to 3396. &amp;nbsp;Your access list looks correct.&lt;/P&gt;
&lt;P&gt;Unless you change the port which the server is listening to it will not respond on 3396, but if you NAT 3389 to 3396 then you should be able to access the server using port 3396 from a PC located on the WAN interface.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 18:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984197#M147839</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-30T18:56:38Z</dc:date>
    </item>
    <item>
      <title>Thanks for  your patience on</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984198#M147841</link>
      <description>&lt;P&gt;Thanks for &amp;nbsp;your patience on this. &amp;nbsp;I now see what you are saying. &amp;nbsp;The NAT must be to the Windows &amp;nbsp;Server machine which will have port 3389 (not to each individual machine). &amp;nbsp;This &amp;nbsp;then allows any port to be used externally (remotely) and the "server/local network" doesn't care as it will always look like 3389.&lt;/P&gt;
&lt;P&gt;I will try this later tonight. &amp;nbsp;I have to run out again.&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 20:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984198#M147841</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2017-01-30T20:30:14Z</dc:date>
    </item>
    <item>
      <title>Ok internally you can keep</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984199#M147842</link>
      <description>&lt;P&gt;Ok internally you can keep port 3389 but in your NAT translation, original port is set to 3396 and translated set to 3396. If you want to keep port 3389 on your server, it should be original port 3389 and translated to 3396.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jan 2017 22:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984199#M147842</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-01-30T22:45:36Z</dc:date>
    </item>
    <item>
      <title>Hello Francesco.  Thanks</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984200#M147843</link>
      <description>&lt;P&gt;Hello Francesco.&amp;nbsp; Thanks again for your help on this.&lt;/P&gt;
&lt;P&gt;I did as you suggested &lt;STRONG&gt;and it worked&lt;/STRONG&gt;.&amp;nbsp; To further test it, I created another rule for one of the other computers and it worked as expected.&lt;/P&gt;
&lt;P&gt;I can't thank you enough.....but if you don't mind, can I ask another question or two?&lt;/P&gt;
&lt;P&gt;For the NAT rules, why is the "&lt;STRONG&gt;Original&lt;/STRONG&gt;" "&lt;STRONG&gt;Source&lt;/STRONG&gt;" an inside device?&amp;nbsp; From the terminology, I would have&amp;nbsp; thought that this&amp;nbsp; should be from the network (WAN) so it would read "&lt;STRONG&gt;any&lt;/STRONG&gt;" - because we don't know who will be RDP's in.&amp;nbsp; My guess is that "&lt;STRONG&gt;Original&lt;/STRONG&gt;" has nothing to do with the direction of the communication but purely relative to the port that you are wanting to translate.&amp;nbsp; Can&amp;nbsp; you confirm this (and please embellish if you feel up to it).&lt;/P&gt;
&lt;P&gt;Secondly, I have revised (removed several of) the Access Rules.&amp;nbsp; I first removed two of the rules (#9 and #10) which had &lt;STRONG&gt;pc's&lt;/STRONG&gt; as destinations, not &lt;STRONG&gt;outside&lt;/STRONG&gt;. &lt;/P&gt;
&lt;P&gt;Again, my confusion is over terminology.&amp;nbsp; The Source and Destination for these rules was &lt;STRONG&gt;Any&lt;/STRONG&gt; and &lt;STRONG&gt;Outside&lt;/STRONG&gt; respectively.&amp;nbsp; It seems like the Destination should have been "&lt;STRONG&gt;inside&lt;/STRONG&gt;".&amp;nbsp;&amp;nbsp; Further confusing me is that this is an Outside rule based on the Outside interface.&amp;nbsp; So, it seems contradictory that the Source is &lt;STRONG&gt;any&lt;/STRONG&gt; but also &lt;STRONG&gt;outside&lt;/STRONG&gt; and the Destination is &lt;STRONG&gt;Outside&lt;/STRONG&gt;.&amp;nbsp; See my attached Access Rules&amp;nbsp; screen shot. Can you offer any guidance on this terminology.&lt;/P&gt;
&lt;P&gt;One more related to access rules - Are they bidirectional?&amp;nbsp; They seem to be.&lt;/P&gt;
&lt;P&gt;My final question is can you offer any literature to read where I can learn this stuff better.&amp;nbsp; I already have the Cisco online documentation but it would be nice to have another source to help me resolve conflicts (in my mind -- and I know they will occur).&lt;/P&gt;
&lt;P&gt;Thank you again for your help.&amp;nbsp; I understand if you don't want to take the time to reply to all of my questions.&amp;nbsp; Have a great day.&lt;/P&gt;
&lt;P&gt;Chuck&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 02:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984200#M147843</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2017-01-31T02:46:56Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984201#M147844</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;For books, you can have a look on all Cisco Press books and specially the CCNA Security and Cisco ASA All-in-one.&lt;/P&gt;
&lt;P&gt;For NAT, you need to think the other way, it looks like strange but let me explain:&lt;/P&gt;
&lt;UL style="list-style-type: circle;"&gt;
&lt;LI&gt;Your internal host is natted on a public IP with a port x&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;This explain that original are everything internal (IP + PORT SOURCE)&lt;/LI&gt;
&lt;LI&gt;And Natted is (PUBLIC + PORT DESTINATION) ==&amp;gt; This will be the information facing internet and be accessible from outside.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For ACL, on old version (before 8.3), the destination on acl for outside acl was the Public IP of the natted object. Since 8.3, the source is IP coming from internet (anyone for example) and destination will be the real IP of the object (Inside object).&lt;/P&gt;
&lt;P&gt;Hope this more clear.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 03:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984201#M147844</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-01-31T03:11:29Z</dc:date>
    </item>
    <item>
      <title>Thank you. It does help.  I</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984202#M147845</link>
      <description>&lt;P&gt;Thank you. It does help.&amp;nbsp; I will be putting in some time on this as it is important.&lt;/P&gt;
&lt;P&gt;My next project is to setup VPN for this same customer so you may see more posts from me then.&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 04:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984202#M147845</guid>
      <dc:creator>chuckbalogh</dc:creator>
      <dc:date>2017-01-31T04:23:07Z</dc:date>
    </item>
    <item>
      <title>You're very welcome</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984203#M147846</link>
      <description>&lt;P&gt;You're very welcome&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jan 2017 04:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-for-asa-using-asdm/m-p/2984203#M147846</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-01-31T04:24:12Z</dc:date>
    </item>
  </channel>
</rss>

