<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 6 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837658#M172533</link>
    <description>&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Feb 16 2016&lt;/TD&gt;
&lt;TD&gt;06:06:47&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;54.194.180.39&lt;/TD&gt;
&lt;TD&gt;36512&lt;/TD&gt;
&lt;TD&gt;192.168.2.80&lt;/TD&gt;
&lt;TD&gt;32400&lt;/TD&gt;
&lt;TD&gt;Teardown TCP connection 24075085 for outside:54.194.180.39/36512 to inside:192.168.2.80/32400 duration 0:00:30 bytes 0 SYN Timeout&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Tue, 16 Feb 2016 18:34:55 GMT</pubDate>
    <dc:creator>flyntransam</dc:creator>
    <dc:date>2016-02-16T18:34:55Z</dc:date>
    <item>
      <title>port forwarding in a cisco ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837652#M172527</link>
      <description>&lt;P&gt;Having trouble with my ASA. Not the greatest with cisco command line.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyways, I have it setup after my cable modem and before my router. Ideally, it should just forward all traffic to my router and let it deal with it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Trying to setup a Plex server, and getting this error:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;6 Feb 14 2016 23:17:58 54.229.51.0 43297 192.168.2.1 32400 Built inbound TCP connection 23926181 for outside:54.229.51.0/43297 (54.229.51.0/43297) to inside:192.168.2.1/32400 (67.175.30.50/32400)&lt;BR /&gt;6 Feb 14 2016 23:17:58 54.229.51.0 43297 192.168.2.1 32400 Routing failed to locate next hop for TCP from outside:54.229.51.0/43297 to inside:192.168.2.1/32400&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've also tried setting the network obj plex to both my router's ip or the plex server's ip with the same error as above.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas or good articles that can point me in the right direction?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Brian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;asa's ip is 192.168.1.1&lt;/P&gt;
&lt;P&gt;Router is 192.168.2.1&lt;/P&gt;
&lt;P&gt;Plex server 192.168.2.80&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 9.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname FIREWALL&lt;BR /&gt;domain-name *********&lt;BR /&gt;enable password ************&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd ***************&lt;BR /&gt;names&lt;BR /&gt;ip local pool VPN 192.168.3.1-192.168.3.10 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa921-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name ********&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object service rdp&lt;BR /&gt; service tcp source eq 1001 destination eq 1001 &lt;BR /&gt; description rdp&lt;BR /&gt;object network Brians_comp&lt;BR /&gt; host 192.168.2.75&lt;BR /&gt;object network Internal_RDP_Server-2&lt;BR /&gt;object network TV_Hopper&lt;BR /&gt; host 192.168.2.103&lt;BR /&gt;object network NETWORK_OBJ_192.168.3.0_28&lt;BR /&gt; subnet 192.168.3.0 255.255.255.240&lt;BR /&gt;object network VPN_Main&lt;BR /&gt; host 192.168.2.75&lt;BR /&gt; description VPN_Main&lt;BR /&gt;object network Plex&lt;BR /&gt; host 192.168.2.1&lt;BR /&gt;object-group service customrdp tcp&lt;BR /&gt; description customrdp&lt;BR /&gt; port-object eq 1001&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service TV_Hooper tcp-udp&lt;BR /&gt; port-object eq 50001&lt;BR /&gt;object-group service BT tcp-udp&lt;BR /&gt; description bt&lt;BR /&gt; port-object eq 1080&lt;BR /&gt;object-group service plexservice tcp-udp&lt;BR /&gt; port-object eq 32400&lt;BR /&gt;access-list outside-entry extended permit tcp any interface outside eq 5678 &lt;BR /&gt;access-list inbound extended permit object-group TCPUDP any object TV_Hopper object-group TV_Hooper &lt;BR /&gt;access-list inbound extended permit object-group TCPUDP any object Plex object-group plexservice &lt;BR /&gt;access-list inbound extended permit icmp host 8.8.8.8 any &lt;BR /&gt;access-list inbound extended permit object rdp any object Brians_comp inactive &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-751.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.3.0_28 NETWORK_OBJ_192.168.3.0_28 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network TV_Hopper&lt;BR /&gt; nat (inside,outside) static interface service tcp 50001 50001 &lt;BR /&gt;object network VPN_Main&lt;BR /&gt; nat (inside,outside) static interface service tcp pptp pptp &lt;BR /&gt;object network Plex&lt;BR /&gt; nat (inside,outside) static interface service tcp 32400 32400 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inbound in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;http ********* 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-TRANS ESP-3DES-SHA-TRANS ESP-DES-SHA-TRANS&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; no validation-usage&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt; certificate ca******&lt;BR /&gt; quit&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 900&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.2.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;vpnclient mode client-mode&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.10 inside&lt;BR /&gt;dhcpd dns 192.168.2.12 8.8.8.8 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;dynamic-filter updater-client enable&lt;BR /&gt;dynamic-filter use-database&lt;BR /&gt;dynamic-filter enable &lt;BR /&gt;ssl encryption aes128-sha1 3des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt; enable inside&lt;BR /&gt; enable outside&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt; default-domain value *******&lt;BR /&gt;group-policy DefaultRAGroup_1 internal&lt;BR /&gt;group-policy DefaultRAGroup_1 attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt; default-domain value *********&lt;BR /&gt;username ***&lt;BR /&gt;username ****&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool VPN&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt; no authentication chap&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; class global-class&lt;BR /&gt; inspect pptp &lt;BR /&gt; class class-default&lt;BR /&gt; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837652#M172527</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2019-03-12T07:18:13Z</dc:date>
    </item>
    <item>
      <title>What it looks like to me is</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837653#M172528</link>
      <description>&lt;P&gt;What it looks like to me is your ASA does not know how to get to your Plex server or the 192.168.2.0/24 subnet.&lt;/P&gt;
&lt;P&gt;Your ASA is on 192.168.1.0/24 network:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;interface Vlan1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.1.1 255.255.255.0&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;There is no route to send traffic for the 192.168.2.0/24 subnet, so try adding in a route for it to whichever device can get it there.&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;route inside 192.168.2.0 255.255.255.0 x.x.x.x&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;Or, put your ASA on the 192.168.2.0/24 subnet with your router.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 16:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837653#M172528</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-15T16:38:39Z</dc:date>
    </item>
    <item>
      <title>I tried this:</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837654#M172529</link>
      <description>&lt;P&gt;I tried this:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;route inside &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;2.0&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.255&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.0 192.168.2.1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;But seems to be the same result. Also tried pinging 192.168.2.1 from the asa with no hits back.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Router ip is 192.168.2.1&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 02:40:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837654#M172529</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T02:40:48Z</dc:date>
    </item>
    <item>
      <title>That's not going to work.</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837655#M172530</link>
      <description>&lt;P&gt;That's not going to work. Your router needs to have an interface on the 192.168.1.0 network or you need to put your ASA on the 192.168.2.0 network which may be the easiest in your case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 03:48:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837655#M172530</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-16T03:48:54Z</dc:date>
    </item>
    <item>
      <title>It's currently setup so the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837656#M172531</link>
      <description>&lt;P&gt;It's currently setup so the asa pulls my wan IP and uses 192.168.1.1 as the lan.&lt;/P&gt;
&lt;P&gt;My router pulls WAN ip of 192.168.1.2 and a Lan ip of 192.168.2.1.&lt;/P&gt;
&lt;P&gt;I played with it some as here is what I am getting:&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Feb 15 2016&lt;/TD&gt;
&lt;TD&gt;15:02:20&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;52.19.16.34&lt;/TD&gt;
&lt;TD&gt;37163&lt;/TD&gt;
&lt;TD&gt;192.168.2.80&lt;/TD&gt;
&lt;TD&gt;32400&lt;/TD&gt;
&lt;TD&gt;Built inbound TCP connection 24004464 for outside:52.19.16.34/37163 (52.19.16.34/37163) to inside:192.168.2.80/32400 (wanIP/32400)&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;7&lt;/TD&gt;
&lt;TD&gt;Feb 15 2016&lt;/TD&gt;
&lt;TD&gt;15:02:20&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;52.19.16.34&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;Built local-host outside:52.19.16.34&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;7&lt;/TD&gt;
&lt;TD&gt;Feb 15 2016&lt;/TD&gt;
&lt;TD&gt;15:02:20&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;192.168.2.80&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;Built local-host inside:192.168.2.80&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But when I do a port scan of it, it comes back filtered.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837656#M172531</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T18:12:24Z</dc:date>
    </item>
    <item>
      <title>Ok, your topology makes sense</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837657#M172532</link>
      <description>&lt;P&gt;Ok, your topology makes sense now. &amp;nbsp;I assume your Plex server is either directly connected to the router or some sort of switch. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;What type of router are we talking about here? A Cisco router? A home/SMB router like a Linksys/etc? Is the router performing any NAT for the 192.168.2.0/24 network?&lt;/P&gt;
&lt;P&gt;Try:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;route inside &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;2.0&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.255&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.0&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;FONT color="#006666"&gt;1.2&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837657#M172532</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-16T18:30:43Z</dc:date>
    </item>
    <item>
      <title>6</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837658#M172533</link>
      <description>&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Feb 16 2016&lt;/TD&gt;
&lt;TD&gt;06:06:47&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;54.194.180.39&lt;/TD&gt;
&lt;TD&gt;36512&lt;/TD&gt;
&lt;TD&gt;192.168.2.80&lt;/TD&gt;
&lt;TD&gt;32400&lt;/TD&gt;
&lt;TD&gt;Teardown TCP connection 24075085 for outside:54.194.180.39/36512 to inside:192.168.2.80/32400 duration 0:00:30 bytes 0 SYN Timeout&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:34:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837658#M172533</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T18:34:55Z</dc:date>
    </item>
    <item>
      <title>router is a TP Link TL-ER5120</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837659#M172534</link>
      <description>&lt;P&gt;router is a TP Link&amp;nbsp;&lt;SPAN&gt;TL-ER5120.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Pretty much no nat&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There is a port forward I setup in it for port 32400 to forward all traffic to 192.168.2.80.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837659#M172534</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T18:37:51Z</dc:date>
    </item>
    <item>
      <title>That is how I currently have</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837660#M172535</link>
      <description>&lt;P&gt;That is how I currently have it setup in the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;route inside &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="lit"&gt;2.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="lit"&gt;255.255&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="lit"&gt;255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;FONT color="#006666"&gt;&lt;SPAN class="lit"&gt;1.2&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837660#M172535</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T18:40:38Z</dc:date>
    </item>
    <item>
      <title>Without seeing the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837661#M172536</link>
      <description>&lt;P&gt;Without seeing the configuration of that router, it will be tough. &amp;nbsp;You can try sending the port 32400 to 192.168.1.2 on your ASA instead of 192.168.2.80, then your router will see it on 1.2 and forward it to 192.168.2.80 on the inside.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837661#M172536</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-16T18:47:11Z</dc:date>
    </item>
    <item>
      <title>Still get the syn error. </title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837662#M172537</link>
      <description>&lt;P&gt;Still get the syn error.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;6&lt;/TD&gt;
&lt;TD&gt;Feb 16 2016&lt;/TD&gt;
&lt;TD&gt;06:25:13&lt;/TD&gt;
&lt;TD&gt;&lt;/TD&gt;
&lt;TD&gt;54.194.180.39&lt;/TD&gt;
&lt;TD&gt;46461&lt;/TD&gt;
&lt;TD&gt;192.168.1.2&lt;/TD&gt;
&lt;TD&gt;32400&lt;/TD&gt;
&lt;TD&gt;Teardown TCP connection 24077512 for outside:54.194.180.39/46461 to inside:192.168.1.2/32400 duration 0:00:30 bytes 0 SYN Timeout&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:51:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837662#M172537</guid>
      <dc:creator>flyntransam</dc:creator>
      <dc:date>2016-02-16T18:51:12Z</dc:date>
    </item>
    <item>
      <title>That means the connection was</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837663#M172538</link>
      <description>&lt;P&gt;That means the connection was built and the ASA did not&amp;nbsp;receive a response within 30 seconds, so something is messed up in your router configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 18:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/2837663#M172538</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-02-16T18:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: port forwarding in a cisco ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/3770914#M172539</link>
      <description>&lt;P&gt;did you ever get this resolved?&lt;/P&gt;</description>
      <pubDate>Mon, 31 Dec 2018 21:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-in-a-cisco-asa-5505/m-p/3770914#M172539</guid>
      <dc:creator>bruno.chung@cvetech.com</dc:creator>
      <dc:date>2018-12-31T21:29:07Z</dc:date>
    </item>
  </channel>
</rss>

