<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It won't work if you don't in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936006#M156789</link>
    <description>&lt;P&gt;It won't work if you don't open the real port from outside. NAT is done first and the translated packet (with changed port numbers from 222 to 22) is compared to the ACL. But that doesn't mean that your server is reachable through tcp/22 from outside. It's not!&lt;/P&gt;</description>
    <pubDate>Wed, 03 Aug 2016 18:58:54 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-08-03T18:58:54Z</dc:date>
    <item>
      <title>ASA port forwading</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936003#M156741</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have internal server 10.10.10.1 mapped to 2.2.2.2 (public ip). I can access the server via port 80 without no issues. Now I wanted to ssh into with different port number 222. I have made the following config. Just want to find out do I have need more config other than following?&lt;/P&gt;
&lt;P&gt;object network DEVICE-10.10.10.1&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;host &lt;SPAN&gt;10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;nat (inside,outside) static 2.2.2.2&lt;/P&gt;
&lt;P&gt;object network DEVICE-10.10.10.1-222&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;host &lt;SPAN&gt;10.10.10.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;nat (inside,outside) static 2.2.2.2 service tcp 22 222&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;ACL outside (outside interface for inbound traffic)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;permit any host 10.10.10.1 eq 222&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;ACL inside (inside interface for outbound traffic)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;permit any any eq 222&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thanks in advance.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thili&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936003#M156741</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2019-03-12T08:05:23Z</dc:date>
    </item>
    <item>
      <title>Your NAT looks fine. To make</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936004#M156764</link>
      <description>&lt;P&gt;Your NAT looks fine.&amp;nbsp;To make the config more readable, you could change the first NAT-rule to be only for service tcp/80.&lt;/P&gt;
&lt;P&gt;For the outside-ACL, you have to allow the real port that is opened on the server. I assume the server is listening on tcp/22? Then the ACL has to be the following:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;permit any host 10.10.10.1 eq 22&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;For this incoming traffic, you don't need an ACE on the inside ACL.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 18:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936004#M156764</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-03T18:29:53Z</dc:date>
    </item>
    <item>
      <title>Thanks Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936005#M156776</link>
      <description>&lt;P&gt;Thanks Karsten,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The whole purpose of this is, block well known 22 port from outside. Instead I want to use port 222 for ssh. The server is listening to port 22.If I enable port forwarding to 222 do I still need a ACE for opening port 22 from outside? if yes, then I'm loosing the purpose of the port forwarding.&lt;/P&gt;
&lt;P&gt;Let me know your thoughts.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 18:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936005#M156776</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2016-08-03T18:49:46Z</dc:date>
    </item>
    <item>
      <title>It won't work if you don't</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936006#M156789</link>
      <description>&lt;P&gt;It won't work if you don't open the real port from outside. NAT is done first and the translated packet (with changed port numbers from 222 to 22) is compared to the ACL. But that doesn't mean that your server is reachable through tcp/22 from outside. It's not!&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 18:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936006#M156789</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-03T18:58:54Z</dc:date>
    </item>
    <item>
      <title>I tried it. I opened port 22.</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936007#M156797</link>
      <description>&lt;P&gt;I tried it. I opened port 22. server responded to port 22 but not for 222.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 20:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936007#M156797</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2016-08-03T20:20:32Z</dc:date>
    </item>
    <item>
      <title>Was your new NAT-rule in</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936008#M156808</link>
      <description>&lt;P&gt;Was&amp;nbsp;your new NAT-rule in place?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 20:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936008#M156808</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-03T20:33:20Z</dc:date>
    </item>
    <item>
      <title>ok, just tested it out and it</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936009#M156819</link>
      <description>&lt;P&gt;ok, just tested it out and it seems that the ASA doesn't behave at it should. The general NAT always takes preference. To make it work, you have to change the first NAT to also do a port-forwarding:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network DEVIDE-10.10.10.1-80&lt;BR /&gt;&amp;nbsp;host 10.10.10.1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 2.2.2.2 service tcp 80 80&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object network DEVIDE-10.10.10.1-22&lt;BR /&gt;&amp;nbsp;host 10.10.10.1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 2.2.2.2 service tcp 22 222&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;permit any host 10.10.10.1 eq 80&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;permit any host 10.10.10.1 eq 22&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 03 Aug 2016 21:00:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936009#M156819</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-08-03T21:00:21Z</dc:date>
    </item>
    <item>
      <title>everything is working now.</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936010#M156831</link>
      <description>&lt;P&gt;everything is working now. you are right, I have to enable port 22 from outside.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Same time general NAT rule must take off. Otherwise it overrides other NAT rules.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 02:19:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwading/m-p/2936010#M156831</guid>
      <dc:creator>Anthonize Rajaratne</dc:creator>
      <dc:date>2016-08-05T02:19:43Z</dc:date>
    </item>
  </channel>
</rss>

