<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Shivapramod M , you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828422#M174952</link>
    <description>&lt;P&gt;Thanks Shivapramod M , you were a great help, this is the final configuration:&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static obj-Servidor interface service HTTP HTTP&lt;BR /&gt;nat (inside,outside) source static obj-Servidor interface service HTTPS HTTPS&lt;BR /&gt;nat (inside,outside) source static obj-Servidor interface service RDP RDP&lt;/P&gt;
&lt;P&gt;access-list outside_access_in_SERVIDOR extended permit tcp any host 192.168.0.251 eq www&lt;BR /&gt;access-list outside_access_in_SERVIDOR extended permit tcp any host 192.168.0.251 eq https&lt;BR /&gt;access-list outside_access_in_SERVIDOR extended permit tcp any host 192.168.0.251 eq 3389&lt;/P&gt;
&lt;P&gt;Best Regrads!!&lt;/P&gt;</description>
    <pubDate>Sat, 14 Nov 2015 17:43:14 GMT</pubDate>
    <dc:creator>guillermo_cisco</dc:creator>
    <dc:date>2015-11-14T17:43:14Z</dc:date>
    <item>
      <title>Enable port Forwarding in ASA 5506</title>
      <link>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828418#M174939</link>
      <description>&lt;P&gt;Hello!!&lt;/P&gt;
&lt;PRE class="tw-data-text vk_txt tw-ta tw-text-small prettyprint" data-placeholder="Traducción" id="tw-target-text" data-fulltext="" dir="ltr"&gt;&lt;SPAN lang="en"&gt;I need to enable the port forwarding ports 443, 80 , 33389 , and redirect it to my LAN server from 192.168.0 to access Public IP .

I have enabled NAT following rules :

network -server object obj
&amp;nbsp;host 192.168.0.251

HTTP service object
&amp;nbsp;service tcp eq source 80

HTTPS service object
&amp;nbsp;source service tcp eq 443

RDP service object
&amp;nbsp;source service tcp eq 3389

nat (inside , outside ) source static obj- service HTTP Server HTTP interface
nat (inside , outside ) source static obj- service interface HTTPS Server HTTPS
nat (inside , outside ) source static obj- RDP RDP Server service interface

What else do I need ??&lt;BR /&gt;Tanks for the help!! &lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828418#M174939</guid>
      <dc:creator>guillermo_cisco</dc:creator>
      <dc:date>2019-03-12T06:52:56Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828419#M174942</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;You are correct. You can create 3 static NAT on the ASA with different services.&lt;/P&gt;
&lt;P&gt;Other than the NAT you need to configure the ACL with the destaintion as the real IP address.&lt;/P&gt;
&lt;P&gt;But in your above NAT conifguration I do not see the mapped IP address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static real_IP mapped_IP service real_port mapped_port&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Shivapramod M&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 01:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828419#M174942</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2015-11-13T01:14:32Z</dc:date>
    </item>
    <item>
      <title>Tanks for the answer</title>
      <link>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828420#M174946</link>
      <description>&lt;P&gt;Tanks for the answer&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/shim2" title="View user profile." class="username" lang="" about="/users/shim2" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Shivapramod M&lt;/A&gt;, Could you give me an example of the syntax for the ACL please??&lt;/P&gt;</description>
      <pubDate>Fri, 13 Nov 2015 19:46:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828420#M174946</guid>
      <dc:creator>guillermo_cisco</dc:creator>
      <dc:date>2015-11-13T19:46:15Z</dc:date>
    </item>
    <item>
      <title>Hi Guillermo,</title>
      <link>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828421#M174948</link>
      <description>&lt;P&gt;Hi Guillermo,&lt;/P&gt;
&lt;P&gt;I belive you are have a public IP address outside and you would like to map it to a real IP with the port. Please correct me if it is incorrect.&lt;/P&gt;
&lt;P&gt;sample configuration for the ACL&lt;/P&gt;
&lt;P&gt;access-list outside_in extended permit tcp any &lt;SPAN&gt;host &amp;lt;real IP address&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;access-group outside_in in interface outside ---(add it to the access group which you have)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Shivapramod M&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;P.S. Please rate helpful posts.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Nov 2015 01:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828421#M174948</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2015-11-14T01:10:30Z</dc:date>
    </item>
    <item>
      <title>Thanks Shivapramod M , you</title>
      <link>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828422#M174952</link>
      <description>&lt;P&gt;Thanks Shivapramod M , you were a great help, this is the final configuration:&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static obj-Servidor interface service HTTP HTTP&lt;BR /&gt;nat (inside,outside) source static obj-Servidor interface service HTTPS HTTPS&lt;BR /&gt;nat (inside,outside) source static obj-Servidor interface service RDP RDP&lt;/P&gt;
&lt;P&gt;access-list outside_access_in_SERVIDOR extended permit tcp any host 192.168.0.251 eq www&lt;BR /&gt;access-list outside_access_in_SERVIDOR extended permit tcp any host 192.168.0.251 eq https&lt;BR /&gt;access-list outside_access_in_SERVIDOR extended permit tcp any host 192.168.0.251 eq 3389&lt;/P&gt;
&lt;P&gt;Best Regrads!!&lt;/P&gt;</description>
      <pubDate>Sat, 14 Nov 2015 17:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/enable-port-forwarding-in-asa-5506/m-p/2828422#M174952</guid>
      <dc:creator>guillermo_cisco</dc:creator>
      <dc:date>2015-11-14T17:43:14Z</dc:date>
    </item>
  </channel>
</rss>

