<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Do you need to translate the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934537#M150581</link>
    <description>&lt;P&gt;Do you need to translate the port or can it be a one-to-one relationship? For example: The connection is from the client is done to TCP/8043 to the ASA and the server is listening to TCP/8043?&lt;/P&gt;</description>
    <pubDate>Tue, 23 Aug 2016 15:10:22 GMT</pubDate>
    <dc:creator>Henrik Grankvist</dc:creator>
    <dc:date>2016-08-23T15:10:22Z</dc:date>
    <item>
      <title>Challenge on port to port forwarding on ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934532#M150571</link>
      <description>&lt;P&gt;Hello House,&lt;/P&gt;
&lt;P&gt;Please i need help on port to port forwarding on ASA 5512-X. Below is the config and the port redirection is working but the range of ports and other ports permitted in the access-list are not opening. Kindly HELP pls....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PUBLIC_IP&lt;/P&gt;
&lt;P&gt;host 10.10.10.10&lt;/P&gt;
&lt;P&gt;object-group service PROD_101 tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 922&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object range 8000 8200&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PRIVATE_IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.1.1.&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP service tcp 8085 www&lt;/P&gt;
&lt;P&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group Outside_IN in interface outside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:09:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934532#M150571</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2019-03-12T08:09:44Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934533#M150574</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;What is the output of:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input OUTSIDE tcp 4.4.4.4 23432 10.10.10.10 8085&lt;/PRE&gt;
&lt;P&gt;You will have to create NAT statement for the rest of the ports if you want them to work too.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 08:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934533#M150574</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-23T08:55:39Z</dc:date>
    </item>
    <item>
      <title>@Henrik, Thanks so much for</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934534#M150576</link>
      <description>&lt;P&gt;@Henrik, Thanks so much for taken your precious time to read my post. I was thinking its access-list that should permit those ports. However, i would appreciate if you can help with the NAT statement for the rest of the ports.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 12:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934534#M150576</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-23T12:54:16Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934535#M150579</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14.666666666666666px; font-family: Consolas; color: #000000; background-color: transparent; font-weight: 400; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;Hi&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.666666666666666px; font-family: Consolas; color: #000000; background-color: transparent; font-weight: 400; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;This is how I would have done it. One static NAT statement per port, note that I'm using manual NAT and not object NAT, which makes it easier to see which order the NAT statements gets processed. Then I would try and reuse as many objects as I could in the access-list so you know which access-list entry and NAT statement is working together.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14.666666666666666px; font-family: Consolas; color: #000000; background-color: transparent; font-weight: 400; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 12pt;"&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;objekt service TCP-EQ-80&lt;BR /&gt; service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt; eq 80&lt;BR /&gt;&lt;BR /&gt;object service TCP-EQ-443&lt;BR /&gt; service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt; eq 22&lt;BR /&gt;&lt;BR /&gt;object service TCP-EQ-22&lt;BR /&gt; service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt; eq 22&lt;BR /&gt;&lt;BR /&gt;object service TCP-EQ-8000&lt;BR /&gt; service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt; eq 8000&lt;BR /&gt;&lt;BR /&gt;object service TCP-EQ-8001&lt;BR /&gt; service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt; eq 8001&lt;BR /&gt;&lt;BR /&gt;object service TCP-EQ-8002&lt;BR /&gt; service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;source&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt; eq 8002&lt;BR /&gt;&lt;BR /&gt;object network SERVER1&lt;BR /&gt; host 1.1.1.1&lt;BR /&gt;&lt;BR /&gt;object network SERVER_PUBLIC_IP&lt;BR /&gt; host 209.88.9.35&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) source static SERVER1 SERVER_PUBLIC_IP service tcp &lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;TCP-EQ-80&amp;nbsp;TCP-EQ-8000&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) source static SERVER1 SERVER_PUBLIC_IP service tcp &lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;TCP-EQ-443 TCP-EQ-8001&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) source static SERVER1 SERVER_PUBLIC_IP service tcp &lt;SPAN style="color: #000000; background-color: transparent; font-variant: normal; text-decoration: none; vertical-align: baseline;"&gt;TCP-EQ-22 TCP-EQ-8002&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE permit tcp any object SERVER1 object TCP-EQ-80&lt;BR /&gt;access-list OUTSIDE permit tcp any object SERVER1 object TCP-EQ-443&lt;BR /&gt;access-list OUTSIDE permit tcp any object SERVER1 object TCP-EQ-22&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 23 Aug 2016 13:37:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934535#M150579</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-23T13:37:47Z</dc:date>
    </item>
    <item>
      <title>Thanks for your swift</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934536#M150580</link>
      <description>&lt;P&gt;Thanks for your swift response, but the port range is from 8000 to 8200. Doing this in 200 places is gonna be too cumbersome. And Applications are listening on those 200 ports...&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 15:04:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934536#M150580</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-23T15:04:01Z</dc:date>
    </item>
    <item>
      <title>Do you need to translate the</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934537#M150581</link>
      <description>&lt;P&gt;Do you need to translate the port or can it be a one-to-one relationship? For example: The connection is from the client is done to TCP/8043 to the ASA and the server is listening to TCP/8043?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 15:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934537#M150581</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-23T15:10:22Z</dc:date>
    </item>
    <item>
      <title>what i need is to open those</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934538#M150582</link>
      <description>&lt;P&gt;what i need is to open those port range on the firewall so that application on the server can be listening to it. Also, ssh port so that i can be able to ssh remotely to the server&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 15:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934538#M150582</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-23T15:53:28Z</dc:date>
    </item>
    <item>
      <title>Is it only one server that is</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934539#M150584</link>
      <description>&lt;P&gt;Is it only one server that is mapped to the public IP? If so you could do just a standard static NAT statement without port forwarding and then control the access with the ACL.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 18:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934539#M150584</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-23T18:10:40Z</dc:date>
    </item>
    <item>
      <title>It is only one server that is</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934540#M150585</link>
      <description>&lt;P&gt;It is only one server that is mapped to the public IP and i have done static NAT with port redirection because of security reason. that is if one accessess the domain name on the server on default port 80 web traffic, Firewall redirects the default port to 8085 internally because 8085 has been binded to the private IP of the server and its working perfectly. However, the challenge is with the access-list that permits range of ports that the application is listening to on the server that is not working. so, also telnet to the server. I think the focus should be on the access-list that is permitting the port ranges. See the config below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PUBLIC_IP&lt;/P&gt;
&lt;P&gt;host 10.10.10.10&lt;/P&gt;
&lt;P&gt;object-group service PROD_101 tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 922&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object range 8000 8200&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PRIVATE_IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.1.1.&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP service tcp 8085 www&lt;/P&gt;
&lt;P&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group Outside_IN in interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;NOTE: If i remove&amp;nbsp;service tcp 8085 www of the NAT, the domain name will be opening with port no 8085 and the access-list that permits all the range of ports will be working perfectly. Thus, we need the port redirection from default 80 to 8085 for security reason and &amp;nbsp;also, we cannot be giving people our domain name with port no 8085 before they can be able to access it. Do you get the logic?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 17:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934540#M150585</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-24T17:05:00Z</dc:date>
    </item>
    <item>
      <title>It looks correct. What is the</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934541#M150586</link>
      <description>&lt;P&gt;It looks correct. What is the output of this packet trace?&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;packet&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;tracer input OUTSIDE tcp &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;4.4&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;4.4&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;23432&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.10&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;10.10&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 24 Aug 2016 17:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934541#M150586</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-24T17:05:34Z</dc:date>
    </item>
    <item>
      <title>TFW/sec/actNoFailover# packet</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934542#M150588</link>
      <description>&lt;P&gt;TFW/sec/actNoFailover# packet-tracer input OUTSIDE tcp 4.4.4.4 23432 10.10.10.10 80&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network TEST_PRIVATE_IP&lt;BR /&gt; nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface PRODUCTION&lt;BR /&gt;Untranslate 10.10.10.10/80 to 1.1.1.1/80&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: PRODUCTION&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Pls note that its only NAT that is configured now. Port redirection aspect has been removed (&lt;SPAN&gt;service tcp 8085 www) and the domain name is being access with port 8085.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 07:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934542#M150588</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-25T07:47:59Z</dc:date>
    </item>
    <item>
      <title>@Henrik, Pls am still</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934543#M150591</link>
      <description>&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;/SPAN&gt;@Henrik, Pls am still awaiting your feedback.Thanks in anticipation for your kind gesture.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 10:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934543#M150591</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-26T10:33:29Z</dc:date>
    </item>
    <item>
      <title>Do you have the access rules</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934544#M150593</link>
      <description>&lt;P&gt;Do you have the access rules in place? If so try wto implement just one of the port forwarding rules:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 12pt;"&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="pln"&gt;objekt service TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; service tcp &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="pln"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="pln"&gt; eq &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;&lt;BR /&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; service TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;8085&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; service tcp &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="pln"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="pln"&gt; eq &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;8085&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;SPAN class="pln"&gt;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;PRODUCTION&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;OUTSIDE&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; source &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; SERVER1 SERVER_PUBLIC_IP service tcp &lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="pln"&gt;TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;8085&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;H4&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; font-size: 10pt; color: #000000;"&gt;&lt;SPAN style="background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="lit"&gt;And then try the same packet-tracer command as before&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H4&gt;
&lt;P&gt;&lt;SPAN style="font-family: courier new,courier,monospace; font-size: 10pt;"&gt;&lt;SPAN style="color: #000000; background-color: transparent; text-decoration: none;"&gt;&lt;SPAN class="lit"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 11:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934544#M150593</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2016-08-26T11:50:40Z</dc:date>
    </item>
    <item>
      <title>There is access rule in place</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934545#M150595</link>
      <description>&lt;P&gt;There is access rule in place that is why port redirection is working but port range declared and allowed are not opening... I think the emphasis should be laid on how to ensure range of ports are opening after the redirection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object-group service PROD_101 tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq 8443&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq 922&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq ssh&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object range 8000 8200&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This config seems to be equivalent to the one currently working for redirection.&lt;/P&gt;
&lt;P&gt;object network TEST_PRIVATE_IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.1.1.&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP service tcp 8085 www&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;objekt service TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; service tcp &lt;/SPAN&gt;&lt;SPAN class="pln"&gt;source&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; eq &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; service TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;8085&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; service tcp &lt;/SPAN&gt;&lt;SPAN class="pln"&gt;source&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; eq &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;8085&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;PRODUCTION&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;OUTSIDE&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; source &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; SERVER1 SERVER_PUBLIC_IP service tcp &lt;/SPAN&gt;&lt;SPAN class="pln"&gt;TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;8085&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; TCP&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;EQ&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;80&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 26 Aug 2016 12:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934545#M150595</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-26T12:40:15Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934546#M150597</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can map a range of port like this:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object service TCP-RA-8000_8200&lt;BR /&gt; service tcp source range 8000 8200&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;nat (PRODUCTION,OUTSIDE) source static SERVER1 SERVER_PUBLIC_IP service TCP-RA-8000_8200 TCP-RA-8000_8200&lt;/PRE&gt;
&lt;P&gt;Mind that this will be 1-to-1 mapping of ports (8000 &amp;gt; 8000 etc).&lt;/P&gt;
&lt;P&gt;If you want inside 8000 to be accessed by outside lets say 1025 you need multiple NAT statements.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;//Cristian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 13:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934546#M150597</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-26T13:16:11Z</dc:date>
    </item>
    <item>
      <title>@Cristian. Thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934547#M150599</link>
      <description>&lt;P&gt;@Cristian. Thanks for your effort. But, existing NAT is doing both NAT and port redirection very well with this config below.&lt;/P&gt;
&lt;P&gt;object network TEST_PRIVATE_IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.1.1.&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP service tcp 8085 www&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, the below config is not allowing access to the server&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object-group service PROD_101 tcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq 8443&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq 922&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq ssh&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;port-object range 8000 8200&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Pls are you saying i should also use NAT to allow access to the server through all the ports-objects declared?. Because access to the server via all the ports is the challenge now.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 14:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934547#M150599</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-26T14:05:51Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934548#M150602</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Unfortunaly i dont think that service groups can be used in NAT statements.&lt;/P&gt;
&lt;P&gt;- not static facts here, but i find it hard for ASA to figure out if its source or destination port as it is not an option to specify.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It should work in ACL thou.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;//Cristian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 14:49:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934548#M150602</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-26T14:49:06Z</dc:date>
    </item>
    <item>
      <title>see...lemme explain this</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934549#M150604</link>
      <description>&lt;P&gt;see...lemme explain this fully. With the below config, i can access &lt;STRONG&gt;abc.com.ng:8085 &lt;/STRONG&gt;for example because 8085 has been binded to the locap IP of the server.Thus, it is&amp;nbsp;not ideal to be giving client because of the port no. Also, i can ssh in to the server and as well all the ports used internally for the application on the server are opened. (&lt;SPAN&gt;port-object range 8000 8200&lt;/SPAN&gt;)&lt;/P&gt;
&lt;P&gt;object network TEST_PUBLIC_IP&lt;/P&gt;
&lt;P&gt;host 10.10.10.10&lt;/P&gt;
&lt;P&gt;object-group service PROD_101 tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 922&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object range 8000 8200&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PRIVATE_IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.1.1.&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP&lt;/P&gt;
&lt;P&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group Outside_IN in interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However, with the below config, when i added&amp;nbsp;&lt;STRONG&gt;service tcp 8085 www&lt;/STRONG&gt; to the NAT for the redirection, then i can access &lt;STRONG&gt;abc.com.ng &lt;/STRONG&gt;without the port 8085 added which is ideal and it shows port redirection is working. But, the challenge now is that with the below config,&amp;nbsp;i can not ssh in to the server and as well all the ports used internally for the application on the server are not opening.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PUBLIC_IP&lt;/P&gt;
&lt;P&gt;host 10.10.10.10&lt;/P&gt;
&lt;P&gt;object-group service PROD_101 tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 922&lt;BR /&gt;port-object eq ssh&lt;BR /&gt;port-object eq https&lt;BR /&gt;port-object range 8000 8200&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;object network TEST_PRIVATE_IP&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 1.1.1.1.&lt;BR /&gt;&lt;/SPAN&gt;nat (PRODUCTION,OUTSIDE) static TEST_PUBLIC_IP service tcp 8085 www&lt;/P&gt;
&lt;P&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group Outside_IN in interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;KINDLY HELP PLS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 15:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934549#M150604</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-26T15:58:04Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934550#M150605</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;If you want to use twice-nat you cannot use a service group as it wouldnt understand what port to map to which.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This should be what you are looking for:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network TEST_PUBLIC_IP&lt;BR /&gt; host 10.10.10.10&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object network TEST_PRIVATE_IP&lt;BR /&gt; host 1.1.1.1&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object-group service PROD_101 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object range 8000 8200&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object service TCP-SOURCE-8443&lt;BR /&gt;&amp;nbsp;service tcp source eq 8443&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object service TCP-SOURCE-443&lt;BR /&gt;&amp;nbsp;service tcp source eq 443&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object service TCP-SOURCE-922&lt;BR /&gt;&amp;nbsp;service tcp source eq 922&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object service TCP-SOURCE-22&lt;BR /&gt;&amp;nbsp;service tcp source eq 22&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object service TCP-SOURCE-8000_8200&lt;BR /&gt;&amp;nbsp;service tcp source range 8000 8200&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;nat (PRODUCTION,OUTSIDE) &amp;lt;seq no&amp;gt; static TEST_PRIVATE_IP TEST_PUBLIC_IP destination any any service TCP-SOURCE-8443 TCP-SOURCE-443&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;nat (PRODUCTION,OUTSIDE) &amp;lt;seq no&amp;gt; static TEST_PRIVATE_IP TEST_PUBLIC_IP destination any any service TCP-SOURCE-922 TCP-SOURCE-22&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;nat (PRODUCTION,OUTSIDE) &amp;lt;seq no&amp;gt; static TEST_PRIVATE_IP TEST_PUBLIC_IP destination any any service TCP-SOURCE-8000_8200 TCP-SOURCE-8000_8200&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;access-list Outside_IN extended permit tcp any object TEST_PRIVATE_IP object-group PROD_101&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;access-group Outside_IN in interface outside&lt;/PRE&gt;
&lt;P&gt;//Cristian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 16:09:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934550#M150605</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-26T16:09:01Z</dc:date>
    </item>
    <item>
      <title>I really appreciate your</title>
      <link>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934551#M150606</link>
      <description>&lt;P&gt;I really appreciate your effort...I will check it out and get back you next week...Thanks a lot...&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 17:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/challenge-on-port-to-port-forwarding-on-asa-5512-x/m-p/2934551#M150606</guid>
      <dc:creator>bashiru.bayonle</dc:creator>
      <dc:date>2016-08-26T17:09:39Z</dc:date>
    </item>
  </channel>
</rss>

