<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I have included part of my in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691617#M193226</link>
    <description>&lt;P&gt;I have included part of my config, just ips are changed from real. Hope it helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i have to do something with my policy map?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jul 2015 11:22:20 GMT</pubDate>
    <dc:creator>ptoumbas2011</dc:creator>
    <dc:date>2015-07-30T11:22:20Z</dc:date>
    <item>
      <title>ASA 5516 to allow http connection from outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691611#M193216</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to allow http/80 connection on my new asa 5516 to access a web server. I am using static nat with port translation to redirect the traffic to the web server. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are 2 problems:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Http traffic is blocked as soon as it arrives at outside interface (Block by ACL implicit rule)&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) I only have 1 public ip for my outside interface. Is it fine to use it to access the web server (static nat)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am also using AnyConnect (working fine) on https://my-firewall&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691611#M193216</guid>
      <dc:creator>ptoumbas2011</dc:creator>
      <dc:date>2019-03-12T06:21:24Z</dc:date>
    </item>
    <item>
      <title>&gt; 1) Http traffic is blocked</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691612#M193217</link>
      <description>&lt;P style="font-size: 14px;"&gt;&amp;gt; 1) Http traffic is blocked as soon as it arrives at outside interface (Block by ACL implicit rule)&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;Have you used the real (internal) IP as the destination in the ACL?&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;&amp;gt; 2) I only have 1 public ip for my outside interface. Is it fine to use it to access the web server (static nat)?&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;Why not? At least it's all you can do without additional addresses. Only when you want to deploy TLS on your server you'll have to decide which system gets TCP/443: The ASA for VPN &lt;STRONG&gt;or&lt;/STRONG&gt; the server.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 08:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691612#M193217</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-07-30T08:50:45Z</dc:date>
    </item>
    <item>
      <title>Yes,  I have added an inbound</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691613#M193218</link>
      <description>&lt;P&gt;Yes,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have added an inbound rule on the outside interface to allow traffic destined for the server (private ip) and it did not work. This is what i get on the log:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;source_ip&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;53804&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;destination_ip 80&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;TCP access denied by ACL from source_ip/53804 to outside:destination_ip/80&amp;nbsp;&lt;/P&gt;&lt;P&gt;* Destination IP is the real public ip of the asa&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 09:04:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691613#M193218</guid>
      <dc:creator>ptoumbas2011</dc:creator>
      <dc:date>2015-07-30T09:04:22Z</dc:date>
    </item>
    <item>
      <title>Have you assigned the right</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691614#M193220</link>
      <description>&lt;P&gt;Have you assigned the right ACL to the interface? Are there other ACEs in the ACL above your rule that deny access?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 09:20:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691614#M193220</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-07-30T09:20:27Z</dc:date>
    </item>
    <item>
      <title>This is my configuration,  </title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691615#M193222</link>
      <description>&lt;P&gt;This is my configuration,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(config)#object network out_to_in_server&amp;nbsp;&lt;BR /&gt;(config-network-object)#host 10.0.0.11&amp;nbsp;&lt;BR /&gt;(config-network-object)#nat (services_Lan,outside) static interface service tcp 80 80&amp;nbsp;&lt;BR /&gt;(config-network-object)#access-list OutsideToServer permit tcp any host 10.0.0.11 eq www&amp;nbsp;&lt;BR /&gt;(config)# access-group OutsideToServer in interface outside &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is what the ASA says&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA denied an attempt to connect to the interface service. For example, the ASA received an SNMP request from an unauthorized SNMP management station&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 09:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691615#M193222</guid>
      <dc:creator>ptoumbas2011</dc:creator>
      <dc:date>2015-07-30T09:55:20Z</dc:date>
    </item>
    <item>
      <title>That part of the config looks</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691616#M193224</link>
      <description>&lt;P&gt;That part of the config looks good. The problem is probably located in the rest of the config. If you can share your complete config, that could help.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 10:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691616#M193224</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-07-30T10:24:45Z</dc:date>
    </item>
    <item>
      <title>I have included part of my</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691617#M193226</link>
      <description>&lt;P&gt;I have included part of my config, just ips are changed from real. Hope it helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do i have to do something with my policy map?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 11:22:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691617#M193226</guid>
      <dc:creator>ptoumbas2011</dc:creator>
      <dc:date>2015-07-30T11:22:20Z</dc:date>
    </item>
    <item>
      <title>&gt; I have included part of my</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691618#M193228</link>
      <description>&lt;P style="font-size: 14px;"&gt;&amp;gt; I have included part of my config, just ips are changed from real. Hope it helps.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;at least it shows one mistake in NAT, your dynamic rule has to be the last in the order:&lt;/P&gt;

&lt;PRE&gt;
no nat (any,outside) source dynamic any interface
nat (any,outside) after-auto source dynamic any interface&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 12:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691618#M193228</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-07-30T12:31:56Z</dc:date>
    </item>
    <item>
      <title>We have fixed the issue by</title>
      <link>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691619#M193229</link>
      <description>&lt;P&gt;We have fixed the issue by correcting the NAT statements and by applying the correct global rules&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object service obj_http&lt;/P&gt;&lt;P style="margin-left:36.0pt;"&gt;Service tcp source eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nat (Services_Lan,outside) source static SRV interface service obj_http obj_http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access-list global_access permit tcp any host 10.0.0.11 eq 80&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your quick and helpful responses&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2015 07:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5516-to-allow-http-connection-from-outside/m-p/2691619#M193229</guid>
      <dc:creator>ptoumbas2011</dc:creator>
      <dc:date>2015-08-04T07:15:41Z</dc:date>
    </item>
  </channel>
</rss>

