<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,&amp;gt;&amp;gt; create a service object in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709774#M194362</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; create a service object for ftp on port 24 (eg service name: ftp-24)&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; edit nat to map real service on port 24 to mapped port 21.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (dmz,Internet) tcp TPG_IP_4 24 ftp-24&amp;nbsp; 172.16.1.7 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; As ftp is working on a different port, so we need to make ASA perform ftp inspection for traffic on&amp;nbsp; port 24 as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ++ create a class map to match traffic on port 24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ciscoasa(config)# class-map ftp-24-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-cmap)#&amp;nbsp; match port tcp eq&amp;nbsp; 24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ++ Use this new class map in policy map and apply inpection for ftp.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config)#&amp;nbsp; policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-pmap)#&amp;nbsp; class ftp-24-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-pmap-c)#&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hope it helps!!! &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jun 2015 07:22:39 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-06-24T07:22:39Z</dc:date>
    <item>
      <title>PAT configuration issue</title>
      <link>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709773#M194361</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;First a little background on what I'm trying to do. I have a webserver in my DMZ running two FTP sites, one on port 21 and one on port 24. The ftp server running on port 21 is working fine, however I am having issues configuring my ASA5505 for PAT on port 24. Basically I want end users to access both sites on port 21, and the firewall to translate based on the incoming IP address.&lt;/P&gt;&lt;P&gt;I have multiple public IP addresses on my external interface, and I have configured my web server to have multiple IP addresses as well.&lt;/P&gt;&lt;P&gt;Static NAT rules are below:&lt;/P&gt;&lt;P&gt;static (dmz,Internet) tcp interface ftp 172.16.1.6 ftp netmask 255.255.255.255&lt;BR /&gt;static (dmz,Internet) tcp TPG_IP_4 24 172.16.1.7 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;However when I attempt to access the ftp server running on port 24 it doesn't connect, with the following error logged (masked IP address with x):&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;Jun 24 2015&lt;/TD&gt;&lt;TD&gt;12:45:02&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;124.168.x.x&lt;/TD&gt;&lt;TD&gt;51903&lt;/TD&gt;&lt;TD&gt;TPG_IP_4&lt;/TD&gt;&lt;TD&gt;21&lt;/TD&gt;&lt;TD&gt;Duplicate TCP SYN from Internet:124.168.x.x/51903 to Internet:TPG_IP_4/21 with different initial sequence number&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone tell me what I'm missing? Or is this configuration not possible? I have many other NAT translations working with different public IP addresses on the external interface, however this is the first one I have tried to configure PAT for. This is my first post so please let me know if I need to provide more information.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709773#M194361</guid>
      <dc:creator>emmaknight</dc:creator>
      <dc:date>2019-03-12T06:10:29Z</dc:date>
    </item>
    <item>
      <title>Hi,&gt;&gt; create a service object</title>
      <link>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709774#M194362</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; create a service object for ftp on port 24 (eg service name: ftp-24)&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; edit nat to map real service on port 24 to mapped port 21.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (dmz,Internet) tcp TPG_IP_4 24 ftp-24&amp;nbsp; 172.16.1.7 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; As ftp is working on a different port, so we need to make ASA perform ftp inspection for traffic on&amp;nbsp; port 24 as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ++ create a class map to match traffic on port 24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;ciscoasa(config)# class-map ftp-24-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-cmap)#&amp;nbsp; match port tcp eq&amp;nbsp; 24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ++ Use this new class map in policy map and apply inpection for ftp.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config)#&amp;nbsp; policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-pmap)#&amp;nbsp; class ftp-24-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-pmap-c)#&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hope it helps!!! &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2015 07:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709774#M194362</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-06-24T07:22:39Z</dc:date>
    </item>
    <item>
      <title>Thanks for the quick reply. I</title>
      <link>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709775#M194364</link>
      <description>&lt;P&gt;Thanks for the quick reply. I'm running ASA 8.2 which doesn't seem to have the option to add a service object, only a service object group which I then can't add to my NAT rule. Is there another way to do this?&lt;/P&gt;&lt;P&gt;I've setup the ftp inspection as described but still experiencing the same issue.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2015 11:01:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709775#M194364</guid>
      <dc:creator>emmaknight</dc:creator>
      <dc:date>2015-06-24T11:01:09Z</dc:date>
    </item>
    <item>
      <title>Try it without the service</title>
      <link>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709776#M194366</link>
      <description>&lt;P&gt;Try it without the service object. I think it is just the missing inspection which is breaking FTP access.&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;static (dmz,Internet) tcp TPG_IP_4 24 172.16.1.7 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; As ftp is working on a different port, so we need to make ASA perform ftp inspection for traffic on&amp;nbsp; port 24 as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ++ create a class map to match traffic on port 24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config)# class-map ftp-24-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-cmap)#&amp;nbsp; match port tcp eq&amp;nbsp; 24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ++ Use this new class map in policy map and apply inpection for ftp.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config)#&amp;nbsp; policy-map global_policy&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-pmap)#&amp;nbsp; class ftp-24-class&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ciscoasa(config-pmap-c)#&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2015 18:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-configuration-issue/m-p/2709776#M194366</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-06-24T18:56:48Z</dc:date>
    </item>
  </channel>
</rss>

