<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,The packet trace command in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754703#M177778</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The packet trace command is correct, looks like the NAT rule is not getting evaluated, can you try creating a NAT rule for specific host and service on top as mentioned before and check if it helps.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;&amp;nbsp;packet-tracer input outside tcp 8.8.8.8 https &amp;lt;ASA WAN IP&amp;gt; https det &amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Share your findings,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
    <pubDate>Tue, 13 Oct 2015 13:35:25 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-10-13T13:35:25Z</dc:date>
    <item>
      <title>Port forwarding ASA5512</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754698#M177773</link>
      <description>&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just having a problem with port-forwarding on ASA5512 v.9.1. The configuration the same as used for port forwarding but it doesn't work.&lt;/P&gt;&lt;P&gt;I need to forward port 443 from outside interface to local device. Local device ip is 192.168.1.90 and SSL VPN server is configured on it. Local ip of ASA (inside interface) is 192.168.2.1 then its connected to Core switch ip 192.168.2.2. Core switch has a local subnet 192.168.1.0/24.&lt;/P&gt;&lt;P&gt;When i login locally as &lt;A href="https://192.168.1.90" target="_blank"&gt;https://192.168.1.90&lt;/A&gt;, the SSL VPN login page opens.&lt;/P&gt;&lt;P&gt;Debugging doesn't show any traffic coming from outside to that. Packet tracer on ASA shows NAT problem, configuration below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network PBX&lt;BR /&gt;&amp;nbsp;host 192.168.1.90&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;object network PBX&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp https https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate any help. Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754698#M177773</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2019-03-12T06:44:25Z</dc:date>
    </item>
    <item>
      <title>Hi, The NAT statement:object</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754699#M177774</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAT statement:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;object network PBX&lt;/SPAN&gt;&lt;BR style="font-size: 14.4px; line-height: normal;" /&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;&amp;nbsp;nat (inside,outside) static interface service tcp https https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;will translate traffic coming on the outside interface with destination IP as asa's public on port 443 to&amp;nbsp;192.168.1.90/443.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;In your update you have mentioned that you tried running packet-tracer and you observed some issues with NAT. What is the error that you see in the packet-tracer output.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You can try making the object NAT to static manual NAT and put it on top so that you can ensure there is no other overlapping NAT rule present:&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static &lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;PBX interface service https https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Also ensure you have ACL to permit traffic after un-translation of tcp/443 traffic destined for&amp;nbsp;192.168.1.90/443..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Share your findings.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;R.Seth&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 11:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754699#M177774</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T11:12:12Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh.The ACL i've got</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754700#M177775</link>
      <description>&lt;P&gt;Hi Rishabh.&lt;/P&gt;&lt;P&gt;The ACL i've got:&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark SSL VPN to PBX&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PBX eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_access_in_1 remark SSL VPN to PBX&lt;BR /&gt;access-list inside_access_in_1 extended permit tcp object PBX any eq https&lt;/P&gt;&lt;P&gt;And packet-tracer:&lt;/P&gt;&lt;P&gt;# packet-tracer input outside tcp 8.8.8.8 https 192.168.1.90 https det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PBX eq https&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9fa028a0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x7fff9b9db1c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.1.90, mask=255.255.255.255, port=443, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9edeec20, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5721791, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9f869830, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6478779, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffa0564210, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=398057, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff9fae34c0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2652, user_data=0x7fff9fadc150, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it look like i need to move my NAT rule to top?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 12:05:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754700#M177775</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-13T12:05:20Z</dc:date>
    </item>
    <item>
      <title>Hi, In packet-tracer you are</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754701#M177776</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In packet-tracer you are trying the real IP for the internal device.&lt;/P&gt;&lt;P&gt;Try the packet tracer with the destination as your ASA's public IP and not the internal IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us know if it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 12:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754701#M177776</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T12:34:28Z</dc:date>
    </item>
    <item>
      <title>Hi.But i need to reach local</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754702#M177777</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;But i need to reach local ip from outside using ASA public ip.&lt;/P&gt;&lt;P&gt;i tried this:&lt;/P&gt;&lt;P&gt;# packet-tracer input outside tcp 8.8.8.8 https &amp;lt;ASA WAN IP&amp;gt; https det&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; &amp;lt;ASA WAN IP&amp;gt;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9edeec20, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5810133, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9f863570, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=685701, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas about that ACL?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 12:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754702#M177777</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-13T12:53:35Z</dc:date>
    </item>
    <item>
      <title>Hi,The packet trace command</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754703#M177778</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The packet trace command is correct, looks like the NAT rule is not getting evaluated, can you try creating a NAT rule for specific host and service on top as mentioned before and check if it helps.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;&amp;nbsp;packet-tracer input outside tcp 8.8.8.8 https &amp;lt;ASA WAN IP&amp;gt; https det &amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Share your findings,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 13:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754703#M177778</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T13:35:25Z</dc:date>
    </item>
    <item>
      <title>Hi,Still web page is not</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754704#M177779</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Still web page is not opening from outside.&lt;/P&gt;&lt;P&gt;Did those changes:&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static PBX interface service HTTPS HTTPS&lt;BR /&gt;&lt;BR /&gt;#packet-tracer input outside tcp 8.8.8.8 https &amp;lt;ASA WAN IP&amp;gt; https&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static PBX interface service HTTPS HTTPS&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate &amp;lt;ASA WAN IP&amp;gt;/443 to 192.168.1.90/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object PBX eq https&lt;BR /&gt;access-list outside_access_in remark CUE_WEB_access&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9fa028a0, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6, user_data=0x7fff9b9db1c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.1.90, mask=255.255.255.255, port=443, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static PBX interface service HTTPS HTTPS&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 8.8.8.8/443 to 8.8.8.8/443&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9e5fbca0, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x7fffa10d5bd0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=443, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=&amp;lt;ASA WAN IP&amp;gt;, mask=255.255.255.255, port=443, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9edeec20, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6034939, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9f869830, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6747444, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fffa0564210, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=407079, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static PBX interface service HTTPS HTTPS&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff9f235900, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x7fffa123ce30, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=443, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=192.168.1.90, mask=255.255.255.255, port=443, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fffa0517050, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3977057, user_data=0x7fffa0a1c3b0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=inside&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9edeec20, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6034941, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff9fa458c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5915584, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff9e5eb380, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4724199, user_data=0x7fffa0a1c3b0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 6904215, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looks like everything is ALLOW then where is a problem.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 15:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754704#M177779</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-13T15:49:15Z</dc:date>
    </item>
    <item>
      <title>Hi,NAT and acts seems to be</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754705#M177780</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;NAT and acts seems to be fine. I think there is some issue with vpn config, I see that the packet-tracer shows ipsec-tunnel. It could be that the traffic after getting permitted is entering the tunnel. Can you check if this traffic is not sent over vpn.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hint: check the ACL used in crypto-map. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2015 15:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754705#M177780</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-13T15:56:07Z</dc:date>
    </item>
    <item>
      <title>Hi.Couldn't see any obvious.</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754706#M177783</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;Couldn't see any obvious. There three L2L IPSec and two VPNclient configurations and all are having or pointing to different subnets like local 192.168.1.0/24 to remote 192.168.200.0/24, and crypto ACL has that config so looks ok. I don't how traffic pointing to 192.168.1.90 would go to a tunnel. How can i check that?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 10:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754706#M177783</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-14T10:32:23Z</dc:date>
    </item>
    <item>
      <title>Hi,You can try checking the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754707#M177787</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can try checking the real traffic by applying captures on the ingress and egress interface for specific source and destination IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;capture capo&amp;nbsp;interface outside match tcp any host &amp;lt;public-IP&amp;gt; eq 443&lt;/P&gt;&lt;P&gt;capture capi interface inside match tcp any host&amp;nbsp;&lt;SPAN style="font-size: 14.4px; line-height: normal;"&gt;&amp;nbsp;192.168.1.90 eq 443&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;View captures:&lt;/P&gt;&lt;P&gt;show cap capi&lt;/P&gt;&lt;P&gt;show cap capo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remove captures:&lt;/P&gt;&lt;P&gt;no cap capi&lt;/P&gt;&lt;P&gt;no cap capo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way you can check if the traffic hitting the firewall is getting properly translated and leaving the ASA towards inside host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 11:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754707#M177787</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-14T11:00:12Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh.I've tried your</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754708#M177790</link>
      <description>&lt;P&gt;Hi Rishabh.&lt;/P&gt;&lt;P&gt;I've tried your recommendation, see results below:&lt;/P&gt;&lt;P&gt;# sh cap capi&lt;/P&gt;&lt;P&gt;0 packet captured&lt;/P&gt;&lt;P&gt;0 packet shown&lt;/P&gt;&lt;P&gt;# sh cap capo&lt;/P&gt;&lt;P&gt;37 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp; 32: 11:55:33.674769&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Remote_WAN_ip&amp;gt;.16889 &amp;gt; &amp;lt;ASA_WAN_ip&amp;gt;.443: S 1979714501:1979714501(0) win 5840 &amp;lt;mss 1442,sackOK,timestamp 157663 0,nop,wscale 1&amp;gt;&lt;BR /&gt;&amp;nbsp; 33: 11:56:13.104242&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Remote_WAN_ip&amp;gt;.16892 &amp;gt; &amp;lt;ASA_WAN_ip&amp;gt;.443: S 2030584064:2030584064(0) win 5840 &amp;lt;mss 1442,sackOK,timestamp 161605 0,nop,wscale 1&amp;gt;&lt;BR /&gt;&amp;nbsp; 34: 11:56:16.096659&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Remote_WAN_ip&amp;gt;.16892 &amp;gt; &amp;lt;ASA_WAN_ip&amp;gt;.443: S 2030584064:2030584064(0) win 5840 &amp;lt;mss 1442,sackOK,timestamp 161905 0,nop,wscale 1&amp;gt;&lt;BR /&gt;&amp;nbsp; 35: 11:56:34.098566&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Remote_WAN_ip&amp;gt;.16892 &amp;gt; &amp;lt;ASA_WAN_ip&amp;gt;.443: S 2030584064:2030584064(0) win 5840 &amp;lt;mss 1442,sackOK,timestamp 163705 0,nop,wscale 1&amp;gt;&lt;BR /&gt;&amp;nbsp; 36: 11:56:54.376857&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Remote_WAN_ip&amp;gt;.16898 &amp;gt; &amp;lt;ASA_WAN_ip&amp;gt;.443: S 2058663125:2058663125(0) win 5840 &amp;lt;mss 1442,sackOK,timestamp 165732 0,nop,wscale 1&amp;gt;&lt;BR /&gt;&amp;nbsp; 37: 11:56:57.373424&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Remote_WAN_ip&amp;gt;.16898 &amp;gt; &amp;lt;ASA_WAN_ip&amp;gt;.443: S 2058663125:2058663125(0) win 5840 &amp;lt;mss 1442,sackOK,timestamp 166032 0,nop,wscale 1&amp;gt;&lt;/P&gt;&lt;P&gt;Then checking NAT hits:&lt;/P&gt;&lt;P&gt;# sh nat det&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static PBX interface&amp;nbsp;&amp;nbsp; service HTTPS HTTPS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.1.90/32, Translated: &amp;lt;ASA WAN IP&amp;gt;/30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Origin: tcp source eq https destination eq https , Translated: tcp source eq https destination eq https&lt;/P&gt;&lt;P&gt;i don't see statistics for translating &amp;lt;ASA WAN IP&amp;gt; to 192.168.1.90.&lt;/P&gt;&lt;P&gt;Should it be translating (outside, inside)?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 11:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754708#M177790</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-15T11:15:10Z</dc:date>
    </item>
    <item>
      <title>Hi, Based on your packet</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754709#M177794</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on your packet-tracer output looks like the configuration is correct but the captures show that the traffic is hitting the firewalls outside interface and not making to the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;To check what is happening to the traffic you can try couple of things:&lt;/P&gt;&lt;P&gt;1. Check syslogs/ ASDM logs for this traffic and check what is ASA doing with this traffic.&lt;/P&gt;&lt;P&gt;2. Apply ASP drop captures to check if ASA is dropping the traffic due to some security reason/protocol anomaly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASP capture captures everything which ASA would drop so the buffer might get full before capturing intended traffic. So you should try this more than once to collect correct data:&lt;/P&gt;&lt;P&gt;configure: cap asp type asp-drop all&lt;/P&gt;&lt;P&gt;view: show cap asp. Try to filter these for appropriate traffic and check if you see any drops here and check the reason for drop.&lt;/P&gt;&lt;P&gt;remove: no cap asp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2015 11:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754709#M177794</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-15T11:34:36Z</dc:date>
    </item>
    <item>
      <title>Hi Rishabh.I haven't tried</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754710#M177796</link>
      <description>&lt;P&gt;Hi Rishabh.&lt;/P&gt;&lt;P&gt;I haven't tried your suggestion as i think we're going too far away so i start checking the configuration as i thought there is a problem with NAT configuration. When i was creating Static NAT forwarding using your command it was asking for Object service which i didn't have so i created it in ASDM as:&lt;/P&gt;&lt;P&gt;object service HTTPS&lt;BR /&gt;&amp;nbsp;service tcp source eq https destination eq https&lt;BR /&gt;&amp;nbsp;description HTTPS SSL VPN access&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This Object service didn't work correctly, once i removed: destination eq https, phones started working using SSL VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, I've got another question.&lt;/P&gt;&lt;P&gt;I want to use a different port, for example, port 444. I did change it in PBX and Object service and SSL VPN works if you use web browser as you can assign port 444 there, but the phones don't work as they always use port 443 to connect.&lt;/P&gt;&lt;P&gt;I tried manipulate Object service but nothing works. So i need to create some kind of rule like that:&lt;/P&gt;&lt;P&gt;Incoming ASA port 443 --&amp;gt; Forwarding to PBX port 444&lt;/P&gt;&lt;P&gt;Outgoing PBX port 444 --&amp;gt; ASA outgoing port 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 07:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754710#M177796</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-20T07:50:56Z</dc:date>
    </item>
    <item>
      <title>Hi, You can create a static</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754711#M177797</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can create a static NAT for the same&lt;/P&gt;&lt;P&gt;Sample conifg:&lt;/P&gt;&lt;P&gt;object service 444&lt;BR /&gt;&amp;nbsp;service tcp source eq 444&lt;/P&gt;&lt;P&gt;object service 443&lt;BR /&gt;&amp;nbsp;service tcp source eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network PBX_real&lt;BR /&gt;&amp;nbsp;host 10.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network PBX_public&lt;BR /&gt;&amp;nbsp;host 100.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static PBX_real PBX_pubic service 443 444&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Hope it helps!!!&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;&lt;P&gt;Mark the answer as correct if it helps in resolving your query!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2015 09:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754711#M177797</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-21T09:46:58Z</dc:date>
    </item>
    <item>
      <title>Thanks for suggestion. i'll</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754712#M177798</link>
      <description>&lt;P&gt;Thanks for suggestion. i'll try that at some stage.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2015 21:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5512/m-p/2754712#M177798</guid>
      <dc:creator>firestormnet</dc:creator>
      <dc:date>2015-10-23T21:50:11Z</dc:date>
    </item>
  </channel>
</rss>

