<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Jouni,Thanks for the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612478#M197530</link>
    <description>&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;Thanks for the response. So if I'm understanding correctly it will only work if I use the following commands?&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 21 21&lt;BR /&gt;access-list NASFTP-in permit tcp any object NAS eq 21&lt;/P&gt;&lt;P&gt;So the ASA is no longer capable of doing port forwarding rule for certain services?&lt;/P&gt;</description>
    <pubDate>Fri, 30 Jan 2015 07:12:31 GMT</pubDate>
    <dc:creator>Frazer Johnson Jr</dc:creator>
    <dc:date>2015-01-30T07:12:31Z</dc:date>
    <item>
      <title>ASA 5505 how to create a port forwarding rule</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612476#M197527</link>
      <description>&lt;P&gt;ASA 5505 IOS ver 9.2.3&lt;/P&gt;&lt;P&gt;I need to create a firewall rule that will allow internal services to be accessed externally, but using port forwarding. For example I'd like to enable access to our NAS via ftp external on port 1545 and then have the ASA forward the request to the NAS internally on port 21.&lt;/P&gt;&lt;P&gt;I tried these commands but they didn't work:&lt;/P&gt;&lt;P&gt;object network NAS&lt;BR /&gt;host 192.168.2.8&lt;BR /&gt;nat (inside,outside) static interface service tcp 21 1545&lt;BR /&gt;access-list NASFTP-in permit tcp any object NAS eq 1545&lt;BR /&gt;conf t&lt;BR /&gt;int vlan 2&lt;BR /&gt;access-group NASFTP-in permit tcp any object NAS eq 1545&lt;/P&gt;&lt;P&gt;I really appreciate the help everyone.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612476#M197527</guid>
      <dc:creator>Frazer Johnson Jr</dc:creator>
      <dc:date>2019-03-12T05:24:37Z</dc:date>
    </item>
    <item>
      <title>Hi, The NAT configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612477#M197528</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The NAT configuration itself is fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice though that since we talking about a software level that is 8.3+ it means that the ACLs will always use the local/real IP address and port in the rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in your case you should allow the connections to the real port TCP/21. This is because when the connection attempt comes to the ASA it will first untranslate the public destination address and port to the real destination address and port and only after that it will check the packet against the interface ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2015 08:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612477#M197528</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2015-01-28T08:11:15Z</dc:date>
    </item>
    <item>
      <title>Hello Jouni,Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612478#M197530</link>
      <description>&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;Thanks for the response. So if I'm understanding correctly it will only work if I use the following commands?&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 21 21&lt;BR /&gt;access-list NASFTP-in permit tcp any object NAS eq 21&lt;/P&gt;&lt;P&gt;So the ASA is no longer capable of doing port forwarding rule for certain services?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2015 07:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612478#M197530</guid>
      <dc:creator>Frazer Johnson Jr</dc:creator>
      <dc:date>2015-01-30T07:12:31Z</dc:date>
    </item>
    <item>
      <title>try this, it worked for me,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612479#M197532</link>
      <description>&lt;P&gt;try this, it worked for me, here is an example of adding a webserver with a ip of 10.10.50.60 &amp;nbsp;and naming it with a object named www-server and forwarding port 80 , the way it works is you need to do three things, u need to "nat it" "foward it" and allow it in "acl"&lt;/P&gt;&lt;P&gt;object network obj-10.10.50.60-1&lt;/P&gt;&lt;P&gt;host 10.10.50.60&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network INSIDE&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network WWW-SERVER&lt;BR /&gt;nat (inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object WWW-SERVER eq 80&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2015 16:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-how-to-create-a-port-forwarding-rule/m-p/2612479#M197532</guid>
      <dc:creator>davidechen</dc:creator>
      <dc:date>2015-01-30T16:07:36Z</dc:date>
    </item>
  </channel>
</rss>

