<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That looks better.Can you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769325#M177679</link>
    <description>&lt;P&gt;That looks better.&lt;/P&gt;&lt;P&gt;Can you test from a client and then if it is working post back here and I'll explain what went wrong.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
    <pubDate>Fri, 16 Oct 2015 21:48:06 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2015-10-16T21:48:06Z</dc:date>
    <item>
      <title>Port Forward 46611 on ASA 5515</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769303#M177652</link>
      <description>&lt;P&gt;I work mainly with Barracuda firewalls and my Cisco command line is bad bad.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a cisco 5515 at 216.x.x.39 and I need to forward port 46611 to an internal ip address 10.10.3.7 port 9000&lt;/P&gt;&lt;P&gt;my inside interface is nas-main&lt;/P&gt;&lt;P&gt;oustide interface is twtc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried using ASDM and it didn't work and currently I am trying command line, but I keep getting error messages with my nat command.&lt;/P&gt;&lt;P&gt;Also, please detailed help would be appreciated, as I said my cisco command line experience is lacking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in adavance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:45:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769303#M177652</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2019-03-12T06:45:25Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769304#M177653</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;The configuration could be quite tricky, but this would work:&lt;/P&gt;

&lt;PRE&gt;
object network obj-10.10.3.7
 host 10.10.3.7

object service tcp-eq-9000
 service tcp source eq 9000

object service tcp-eq-46611
 service tcp source eq 46611

nat (nas-main,twtc) source static obj-10.10.3.7 interface service tcp-eq-46611 tcp-eq-9000
&lt;/PRE&gt;</description>
      <pubDate>Thu, 15 Oct 2015 20:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769304#M177653</guid>
      <dc:creator>Henrik Grankvist</dc:creator>
      <dc:date>2015-10-15T20:10:20Z</dc:date>
    </item>
    <item>
      <title>HenrikThank you, but when I</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769305#M177654</link>
      <description>&lt;P&gt;Henrik&lt;/P&gt;&lt;P&gt;Thank you, but when I typed that in I got an overlay message for that ip on port 9000&lt;/P&gt;&lt;P&gt;so what would it take to move the configuration to ip 216.x.x.42 (which is an ip address in my external pool) &amp;nbsp;Still the same internal ip address and ports. &amp;nbsp;Just need it to use a different external ip address.&lt;/P&gt;&lt;P&gt;Sorry, but the guys needing this are not that forth coming on info and they don't know what is setup already on the cisco. &amp;nbsp;I have verified there is nothing programmed for 216.x.x.42.&lt;/P&gt;&lt;P&gt;Thanks again for the help&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 20:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769305#M177654</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-15T20:28:18Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769306#M177655</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Use the same config as Henrik has suggested with one small change.&lt;/P&gt;

&lt;PRE&gt;
nat (nas-main,twtc) source static obj-10.10.3.7 216.x.x.42 service tcp-eq-46611 tcp-eq-9000&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it answers your query&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;R.Seth&lt;/P&gt;
&lt;P&gt;Rate if ti helps!!!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 04:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769306#M177655</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-16T04:28:35Z</dc:date>
    </item>
    <item>
      <title>thank you for the help but I</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769307#M177656</link>
      <description>&lt;P&gt;thank you for the help but I am still unable to get through. &amp;nbsp;A thought occurred while doing this. &amp;nbsp;could it be https causing the problem?&lt;/P&gt;&lt;P&gt;This is how I am accessing the internal server https://216.x.x.39&lt;/P&gt;&lt;P&gt;I was able to setup a 1 to 1 nat on https and get to the internal server. &amp;nbsp;But, I am still unable to get the port 46611 part of this to work.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 16:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769307#M177656</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T16:46:04Z</dc:date>
    </item>
    <item>
      <title>ChrisWhat was the NAT command</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769308#M177657</link>
      <description>&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;What was the NAT command you used for https and was this the only static NAT command relating to the server ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 17:04:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769308#M177657</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T17:04:02Z</dc:date>
    </item>
    <item>
      <title>ok...well I thought I was</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769309#M177658</link>
      <description>&lt;P&gt;ok...well I thought I was smart but now, no one can get to the internet our out outside interface twtc.&lt;/P&gt;&lt;P&gt;I rebooted the router and got an error message about a nat command. &amp;nbsp;I have attached the jpg for it.&lt;/P&gt;&lt;P&gt;Also here is the listing of nat commands in config&lt;/P&gt;&lt;P&gt;Help??!!!&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (NAS-Main) to (TWTC) source static any interface &amp;nbsp; unidirectional&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (NAS-QA1) to (TWTC) source static any interface &amp;nbsp; unidirectional&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (NAS-QA2) to (TWTC) source static any interface &amp;nbsp; unidirectional&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (BTC) to (TWTC) source static BTC-ClearOS BTC-Email &amp;nbsp; inactive&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (BTC) to (TWTC) source static BTC-Metric-Private BTC-Metric-Public &amp;nbsp; service E&lt;BR /&gt;ncryptedMail EncryptedMail&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;6 (BTC) to (TWTC) source static BTC-Email-Private BTC-Email-Public &amp;nbsp; service BTC&lt;BR /&gt;-EmailPort25 BTC-EmailPort25&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;7 (BTC) to (TWTC) source static BTC-Email-Private BTC-Email-Public &amp;nbsp; service BTC&lt;BR /&gt;-ICMP BTC-ICMP&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (NAS-Main) to (TWTC) source static ENGR-OpenVPN NASMAIN-Public &amp;nbsp; service ENGR-&lt;BR /&gt;VPN-UDP-1194 ENGR-VPN-UDP-1194&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;9 (NAS-Main) to (TWTC) source static ENGR-OpenVPN DM_INLINE_NETWORK_1 &amp;nbsp; service&lt;BR /&gt;ENGR-VPN-1194 ENGR-VPN-1194&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;10 (NAS-Main) to (TWTC) source static GIt-SERVER NASMAIN-Public &amp;nbsp; service SSH SS&lt;BR /&gt;H&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;11 (NAS-Main) to (TWTC) source static Terastation BTC-Email &amp;nbsp; service SSH SSH&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;12 (NAS-Main) to (TWTC) source static ENGR-OpenVPN NASMAIN-Public &amp;nbsp; service ENGR&lt;BR /&gt;-VPN-443 ENGR-VPN-443&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;13 (NAS-Main) to (TWTC) source static TS3000-Build NASMAIN-Public &amp;nbsp; service TSbu&lt;BR /&gt;ild-4343-2 TSbuild-4343-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;14 (NAS-Main) to (TWTC) source static WEBAccess-FW interface &amp;nbsp; service WEBAccess&lt;BR /&gt;-FW-Port-2 WEBAccess-FW-Port-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;15 (NAS-Main) to (TWTC) source static TestRail-private NASMAIN-Public &amp;nbsp; service&lt;BR /&gt;TestRAil-80-2 TestRAil-80-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;16 (NAS-Main) to (TWTC) source static TS-WEbAccess-Test-private interface &amp;nbsp; serv&lt;BR /&gt;ice Web-Access-Test-2 Web-Access-Test-2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (BTC) to (TWTC) source static BTC-ClearOS BTC-Public&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;2 (VideoConference) to (TWTC) source static VC VideoConferencePublic&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (BTC) to (TWTC) source dynamic any interface&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;BAEng#&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 20:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769309#M177658</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T20:27:14Z</dc:date>
    </item>
    <item>
      <title>so from I can see from the</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769310#M177659</link>
      <description>&lt;P&gt;so from I can see from the full config I have removed all my nat and acl commands, so I am wondering if &amp;nbsp;I by chance deleted something extra while doing it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 20:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769310#M177659</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T20:35:22Z</dc:date>
    </item>
    <item>
      <title>ChrisIs the most important</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769311#M177660</link>
      <description>&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;Is the most important thing at the moment to get the users up and running rather than the server ?&lt;/P&gt;&lt;P&gt;If so, what interface does the internal traffic from the users come in on ?&lt;/P&gt;&lt;P&gt;Looking at your NAT statements did you add the first 3 lines ?&lt;/P&gt;&lt;P&gt;Do you know what they are for ?&lt;/P&gt;&lt;P&gt;It would help if you could post the full configuration and tell us what is the most important thing to get working.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 20:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769311#M177660</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T20:51:53Z</dc:date>
    </item>
    <item>
      <title>Here is the full confignas</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769312#M177661</link>
      <description>&lt;P&gt;Here is the full config&lt;/P&gt;&lt;P&gt;nas-main is the main group to get fixed&lt;/P&gt;&lt;P&gt;twtc is the outside interface&lt;/P&gt;&lt;P&gt;commands for https&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the ADSM commands from this link&lt;/P&gt;&lt;P&gt;and added the https protcol&lt;/P&gt;&lt;P&gt;http://www.petenetlive.com/KB/Article/0000691.htm&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:03:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769312#M177661</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T21:03:14Z</dc:date>
    </item>
    <item>
      <title>ChrisIs general internet</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769313#M177662</link>
      <description>&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;Is general internet access for internal users on the NAS-Main interface the most important thing because I think we need a list of priorities.&lt;/P&gt;&lt;P&gt;If so then can you run from the CLI -&lt;/P&gt;&lt;P&gt;"packet-tracer input inside tcp 10.10.0.2 12345 8.8.8.8 80"&lt;/P&gt;&lt;P&gt;and post the results.&lt;/P&gt;&lt;P&gt;Or do you just want to try and fix the server in your initial request ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:08:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769313#M177662</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T21:08:52Z</dc:date>
    </item>
    <item>
      <title>the general internet access</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769314#M177663</link>
      <description>&lt;P&gt;the general internet access for internal users is my main concern, the other I will deal with next week&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769314#M177663</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T21:11:59Z</dc:date>
    </item>
    <item>
      <title>Okay, can you run that</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769315#M177664</link>
      <description>&lt;P&gt;Okay, can you run that command and post the results here.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:13:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769315#M177664</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T21:13:13Z</dc:date>
    </item>
    <item>
      <title>yes it was only related to</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769316#M177669</link>
      <description>&lt;P&gt;yes it was only related to the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you look at the link in the first reply with the full config. &amp;nbsp;the comands are there,&lt;/P&gt;&lt;P&gt;it was a PAT with an acl for tcp/http/https&lt;/P&gt;&lt;P&gt;but I have since deleted that command&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769316#M177669</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T21:13:18Z</dc:date>
    </item>
    <item>
      <title>BAEng# packet-tracer input</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769317#M177670</link>
      <description>&lt;P&gt;BAEng# packet-tracer input nas-main tcp 10.10.0.2 12345 8.8.8.8 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; TWTC&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: NAS-Main&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: TWTC&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;BAEng#&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769317#M177670</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T21:16:02Z</dc:date>
    </item>
    <item>
      <title>Can you remove a line from</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769318#M177671</link>
      <description>&lt;P&gt;Can you remove a line from your configuration temporarily.&lt;/P&gt;&lt;P&gt;So type this -&lt;/P&gt;&lt;P&gt;"no access-group global_access global"&lt;/P&gt;&lt;P&gt;Then in this order -&lt;/P&gt;&lt;P&gt;1) run "sh nat"&amp;nbsp; and save the output&lt;/P&gt;&lt;P&gt;2) run the same packet-tracer command as before&lt;/P&gt;&lt;P&gt;3) run "sh nat" again&lt;/P&gt;&lt;P&gt;post results.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:30:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769318#M177671</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T21:30:00Z</dc:date>
    </item>
    <item>
      <title>am getting an error message</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769319#M177673</link>
      <description>&lt;P&gt;am getting an error message on the command&lt;/P&gt;&lt;P&gt;no access-group global_access global&lt;/P&gt;&lt;P&gt;it is putting a marker at the a in the first access&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769319#M177673</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T21:32:48Z</dc:date>
    </item>
    <item>
      <title>Not sure why, it's in your</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769320#M177674</link>
      <description>&lt;P&gt;Not sure why, it's in your configuration.&lt;/P&gt;&lt;P&gt;Can you post output of "sh run access-group".&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:37:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769320#M177674</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T21:37:10Z</dc:date>
    </item>
    <item>
      <title>got it I had to do config t</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769321#M177675</link>
      <description>&lt;P&gt;got it I had to do config t first&lt;/P&gt;&lt;P&gt;but now run sh nat is not working.&lt;/P&gt;&lt;P&gt;I am at the enable level&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769321#M177675</guid>
      <dc:creator>chris.hall6777</dc:creator>
      <dc:date>2015-10-16T21:38:50Z</dc:date>
    </item>
    <item>
      <title>At the enable mode it should</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769322#M177676</link>
      <description>&lt;P&gt;At the enable mode it should just be "sh nat".&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 16 Oct 2015 21:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-46611-on-asa-5515/m-p/2769322#M177676</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-16T21:41:11Z</dc:date>
    </item>
  </channel>
</rss>

