<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic So the issue I'm running to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000244#M148286</link>
    <description>&lt;P&gt;So the issue I'm running to now, is after I add the NAT entry, I lose internet access on the server in which it corresponds to. Am I missing something in the ACL?&lt;/P&gt;</description>
    <pubDate>Wed, 28 Dec 2016 19:25:06 GMT</pubDate>
    <dc:creator>ddesroche1</dc:creator>
    <dc:date>2016-12-28T19:25:06Z</dc:date>
    <item>
      <title>ASA LDAP port forward</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000236#M148263</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;I've been trying to allow an&amp;nbsp;outside application to pass LDAP(s) traffic to a server on our network. We have an ASA 5520 running 8.2. The first step I took was creating an ACL for the desired IPs:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list outside_access_in extended permit tcp host Address_1&amp;nbsp;host AD_Sync_Server-10.1.1.1 eq ldaps&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list outside_access_in extended permit tcp host Address_2 host AD_Sync_Server-10.1.1.1 eq ldap&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;From there I thought all I needed to do was create the NAT:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;static (Inside,Outside) PublicIP&amp;nbsp;10.1.1.1 netmask 255.255.255.255&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After making that entry, our server was not able to access anything outside the network. So I tried&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;static (Inside,Outside) tcp PublicIP 636 10.1.1.1&amp;nbsp;636&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This entry didn't cause loss of external access, but when I had the vendor test the connection, they still were still not able to connect on the ports.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What am I missing here? I still have a lot to learn in the world of Cisco, so I may be way off or just missing something simple. Any advice would be appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000236#M148263</guid>
      <dc:creator>ddesroche1</dc:creator>
      <dc:date>2019-03-12T08:42:08Z</dc:date>
    </item>
    <item>
      <title>After creating static NAT for</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000237#M148265</link>
      <description>&lt;P&gt;After creating static NAT for your internal server did you replace internal address with the public address in the ACL? the ACL you posted it appears to be using internal address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;I&gt;access-list outside_access_in extended permit tcp host Address_1&amp;nbsp;host &lt;SPAN style="color: #ff0000;"&gt;AD_Sync_Server-10.1.1.1&lt;/SPAN&gt; eq ldaps&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2016 21:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000237#M148265</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-12-23T21:34:51Z</dc:date>
    </item>
    <item>
      <title>Yes, pre 8.3 version of the</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000238#M148268</link>
      <description>&lt;P&gt;Yes, pre 8.3 version of the ASA, public IP address of the static NAT is used in Outside ACL. From 8.3 onwards, you can use the private (10.1.1.1 in this case) in the ACL.&lt;/P&gt;
&lt;P&gt;Another good way to figure out what is blocking the traffic is to run a packet-tracer for sample traffic from outside to inside. In your scenario, it would be something like:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp Address_1 12345 &lt;EM&gt;PublicIP&lt;/EM&gt; 636 detailed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Dec 2016 23:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000238#M148268</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2016-12-23T23:13:18Z</dc:date>
    </item>
    <item>
      <title>Do packet tracer from outisde</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000239#M148271</link>
      <description>&lt;P&gt;Do packet tracer from outisde to inside details with ldap.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mani&lt;/P&gt;</description>
      <pubDate>Sat, 24 Dec 2016 01:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000239#M148271</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2016-12-24T01:16:22Z</dc:date>
    </item>
    <item>
      <title>Thank you all for the replies</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000240#M148275</link>
      <description>&lt;P&gt;Thank you all for the replies. I went ahead and changed the NAT to use the public address. I then ran packet tracer. I'm not completely familiar with it, but all phases showed up with ALLOW as a result, I can only assume that's a good start? Then if I'm not mistaken I went to look for untranslate-hits which represent outside address coming in? In which case I&amp;nbsp;do show a hit there as well.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'll be holding actual testing later today with the vendor needing to access this server, I'll return with results. Again, I appreciate the help!&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 12:52:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000240#M148275</guid>
      <dc:creator>ddesroche1</dc:creator>
      <dc:date>2016-12-27T12:52:37Z</dc:date>
    </item>
    <item>
      <title>The vendor responded to my</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000241#M148278</link>
      <description>&lt;P&gt;The vendor responded to my request to test the connection again, and they are still not able to connect to our server. The packet tracer shows traffic being Allowed all the way though. Have any ideas what I could still be missing?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 16:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000241#M148278</guid>
      <dc:creator>ddesroche1</dc:creator>
      <dc:date>2016-12-27T16:31:22Z</dc:date>
    </item>
    <item>
      <title>Please refer to the below</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000242#M148281</link>
      <description>&lt;P&gt;Please refer to the below mentioned url with the complete information about the subject.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/video/11929221/asa-enabling-port-forwarding-asdm-versions-83-and-84" target="_blank"&gt;https://supportforums.cisco.com/video/11929221/asa-enabling-port-forwarding-asdm-versions-83-and-84&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Video Link for Enabling port forwarding via ASDM (versions 8.3 and 8.4)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli" target="_blank"&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Let me know if it help.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 18:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000242#M148281</guid>
      <dc:creator>syeda3</dc:creator>
      <dc:date>2016-12-27T18:22:34Z</dc:date>
    </item>
    <item>
      <title>Unfortunately we're still</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000243#M148283</link>
      <description>&lt;P&gt;Unfortunately we're still running 8.2 and we're not using asdm.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Dec 2016 18:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000243#M148283</guid>
      <dc:creator>ddesroche1</dc:creator>
      <dc:date>2016-12-27T18:56:02Z</dc:date>
    </item>
    <item>
      <title>So the issue I'm running to</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000244#M148286</link>
      <description>&lt;P&gt;So the issue I'm running to now, is after I add the NAT entry, I lose internet access on the server in which it corresponds to. Am I missing something in the ACL?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2016 19:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000244#M148286</guid>
      <dc:creator>ddesroche1</dc:creator>
      <dc:date>2016-12-28T19:25:06Z</dc:date>
    </item>
    <item>
      <title>Can you run the same packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000245#M148290</link>
      <description>&lt;P&gt;Can you run the same packet-tracer from inside to outside with source as your server and destination as an internet ip (eg 4.2.2.2) and see then results?&lt;/P&gt;
&lt;P&gt;Also, could you past the relevant nat statements here so that we can confirm that the config is correct?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2016 12:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000245#M148290</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2016-12-29T12:48:29Z</dc:date>
    </item>
    <item>
      <title>I have since resolved the</title>
      <link>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000246#M148291</link>
      <description>&lt;P&gt;I have since resolved the issue. Turns out they had me working&amp;nbsp; with false information. They had me using a public address that wasn't in our allocated block. But, thanks to you guys, as soon as I used the correct IP everything worked perfectly!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Dec 2016 13:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ldap-port-forward/m-p/3000246#M148291</guid>
      <dc:creator>ddesroche1</dc:creator>
      <dc:date>2016-12-29T13:06:00Z</dc:date>
    </item>
  </channel>
</rss>

