<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I would like to post the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667423#M194903</link>
    <description>&lt;P&gt;I would like to post the exact commands I entered although I could not have gotten them right without the help of Marvin Rhoades - Many thanks sir!&lt;/P&gt;&lt;P&gt;Using Marvin's examples with my environment variables:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 22&amp;nbsp;192.168.72.104 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp host 8.8.8.8 host 4.4.4.4 eq 22&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;Very good my friend!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Apr 2015 20:52:48 GMT</pubDate>
    <dc:creator>jgarcia44</dc:creator>
    <dc:date>2015-04-17T20:52:48Z</dc:date>
    <item>
      <title>Struggling and Under The Gun - Halp</title>
      <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667418#M194895</link>
      <description>&lt;P&gt;I have a Cisco ASA 5505 Firewall with version 8.0(3). &amp;nbsp;I am trying to allow an external network SSH access into an internal host.&lt;/P&gt;&lt;P&gt;I am seriously struggling with this seemingly easy scenario.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For protection I will use fake IP's - but here is what I want to see happen.&lt;/P&gt;&lt;P&gt;External network: 8.8.8.8 wants to be able to SSH (using putty) to&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internal private IP 192.168.72.104 behind my firewall. &amp;nbsp;I am only allowed 1 public IP from the ISP, which we will call: 4.4.4.4&lt;/P&gt;&lt;P&gt;I believe I need to use NAT'ing and ACL, but I'm just not getting it to work : /&lt;/P&gt;&lt;P&gt;I appreciate the feedback greatly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667418#M194895</guid>
      <dc:creator>jgarcia44</dc:creator>
      <dc:date>2019-03-12T05:47:53Z</dc:date>
    </item>
    <item>
      <title>Since the ASA itself listens</title>
      <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667419#M194896</link>
      <description>&lt;P&gt;Since the ASA itself listens&amp;nbsp;on tcp/22 (used by ssh) and you only have the ASA's outside interface address to work with, you need to use port address translation (PAT).&lt;/P&gt;
&lt;P&gt;The outside user would then come into the ASA on the translated port. In the following example I used port 2200 as the NAT for port 22:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
static (inside,outside) tcp 4.4.4.4 2200 192.168.72.104 22 netmask 255.255.255.255

access-list outside_in extended permit tcp 8.8.8.8 host 4.4.4.4 eq 2200

access-group outside_in in interface outside&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Apr 2015 19:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667419#M194896</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-04-17T19:47:27Z</dc:date>
    </item>
    <item>
      <title>Marvin - Thank you very much</title>
      <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667420#M194898</link>
      <description>&lt;P&gt;Marvin - Thank you very much for the information. &amp;nbsp;I am getting this error while running this command from within the ASDM GUI command line (I know I should use CLI):&amp;nbsp;&lt;/P&gt;&lt;P&gt;"ERROR: Static PAT using the interface requires the use of the 'interface' keyword instead of the interface IP address".&lt;/P&gt;&lt;P&gt;Suggestion?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 20:06:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667420#M194898</guid>
      <dc:creator>jgarcia44</dc:creator>
      <dc:date>2015-04-17T20:06:06Z</dc:date>
    </item>
    <item>
      <title>Sorry - I was working from</title>
      <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667421#M194900</link>
      <description>&lt;P&gt;Sorry - I&amp;nbsp;was working from memory on the syntax of this old ASA version. Try this instead for the first line:&lt;/P&gt;

&lt;PRE&gt;
static (inside,outside) tcp interface 2200 192.168.72.104 22 netmask 255.255.255.255&lt;/PRE&gt;</description>
      <pubDate>Fri, 17 Apr 2015 20:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667421#M194900</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-04-17T20:10:39Z</dc:date>
    </item>
    <item>
      <title>I still was unable to</title>
      <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667422#M194901</link>
      <description>&lt;P&gt;I still was unable to establish an ssh session to the host, here is my config if it helps. &amp;nbsp;I can provide anything else helpful:&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(3)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname pbwksmadisonave&lt;BR /&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;name 192.168.72.101&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.72.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;&amp;nbsp;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 4.4.4.4 255.255.255.252&amp;nbsp;&lt;BR /&gt;&amp;nbsp;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa803-k8.bin&lt;BR /&gt;boot system disk0:/asa723-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name default.domain.invalid&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object 192.168.44.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.52.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object host&amp;nbsp;&lt;BR /&gt;object-group service OpenVPN-1194 tcp-udp&lt;BR /&gt;&amp;nbsp;description TCP and UDP Port Group for OpenVPN&lt;BR /&gt;&amp;nbsp;port-object eq 1194&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq 5900&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;group-object OpenVPN-1194&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;group-object OpenVPN-1194&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;group-object OpenVPN-1194&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;group-object OpenVPN-1194&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service ServerPort96009800 tcp-udp&lt;BR /&gt;&amp;nbsp;description UDP and TCP Ports&lt;BR /&gt;&amp;nbsp;port-object eq 9600&lt;BR /&gt;&amp;nbsp;port-object eq 9800&lt;BR /&gt;object-group service DM_INLINE_TCP_7 tcp&lt;BR /&gt;&amp;nbsp;group-object OpenVPN-1194&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.72.0 255.255.255.0 object-group DM_INLINE_NETWORK_1&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.72.0 255.255.255.0 192.168.0.0 255.255.0.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 172.16.32.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.72.0 255.255.255.0 192.168.64.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.72.0 255.255.255.0 192.168.92.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.72.0 255.255.255.0 192.168.56.0 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp 172.16.32.0 255.255.255.0 host Server101 object-group DM_INLINE_TCP_1&amp;nbsp;&lt;BR /&gt;access-list outside_in extended permit tcp host 8.8.8.8 host 4.4.4.4 eq ssh&amp;nbsp;&lt;BR /&gt;access-list outside_in extended permit tcp host *.*.*.* host 4.4.4.4 eq ssh&amp;nbsp;&lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.72.0 255.255.255.0 192.168.64.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.72.0 255.255.255.0 192.168.92.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark Allow SMTP traffic (scanned PDF images)&lt;BR /&gt;access-list inside_access_in remark All Servers to send SMTP&lt;BR /&gt;access-list inside_access_in extended permit tcp host Server101 any eq smtp&amp;nbsp;&lt;BR /&gt;access-list inside_access_in remark ACL to prevent rogue SMTP from 72.X to anywhere outbound&lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip any any&amp;nbsp;&lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.72.0 255.255.255.0 192.168.56.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool VPN-NETWORK 172.16.32.0-172.16.32.100 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface ssh 192.168.72.104 ssh netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (inside,outside) 192.168.72.0 192.168.72.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 4.4.4.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 192.168.72.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 5&lt;/P&gt;&lt;P&gt;I hope this helps and I appreciate your time!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 20:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667422#M194901</guid>
      <dc:creator>jgarcia44</dc:creator>
      <dc:date>2015-04-17T20:43:25Z</dc:date>
    </item>
    <item>
      <title>I would like to post the</title>
      <link>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667423#M194903</link>
      <description>&lt;P&gt;I would like to post the exact commands I entered although I could not have gotten them right without the help of Marvin Rhoades - Many thanks sir!&lt;/P&gt;&lt;P&gt;Using Marvin's examples with my environment variables:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 22&amp;nbsp;192.168.72.104 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp host 8.8.8.8 host 4.4.4.4 eq 22&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;Very good my friend!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 20:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/struggling-and-under-the-gun-halp/m-p/2667423#M194903</guid>
      <dc:creator>jgarcia44</dc:creator>
      <dc:date>2015-04-17T20:52:48Z</dc:date>
    </item>
  </channel>
</rss>

