<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,This is a NAT example for in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569669#M199469</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This is a NAT example for the port forwarding requirement:-&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.174&lt;/P&gt;&lt;P&gt;host 192.168.1.174&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 8080 8080&lt;/P&gt;&lt;P&gt;On the Outside interface apply this ACL:-&lt;/P&gt;&lt;P&gt;access-list Out-In permit tcp any obj-192.168.1.174 eq 8080&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the other issue , for the VPN access to the internal resources:-&lt;/P&gt;&lt;P&gt;Check if you have all these networks in Split Tunnel policy and you have NAT statement for the VPN pool and internal Subnets between the Inside and Outside interface.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
    <pubDate>Wed, 24 Dec 2014 12:10:55 GMT</pubDate>
    <dc:creator>Vibhor Amrodia</dc:creator>
    <dc:date>2014-12-24T12:10:55Z</dc:date>
    <item>
      <title>Cisco ASA port forwarding and vpn issues</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569667#M199467</link>
      <description>&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;Hi,&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;I am new to cisco asa. First of all model is cisco ASA 5515. ASA is in routing mode.&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;There is some issues i need to make port forwarding from external network KabelBW to internal network LAN ip 192.168.1.174 for example port 8080.&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;I am not sure if i did all the necessary steps.&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;Second issue is that when i am connected from different networks through vpn, i cannot access internal LAN servers, no ping no access at all. I only can access network which connected like site to site.&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 14px; line-height: normal; font-family: Arial; color: rgb(50, 51, 51);"&gt;The config is like this:&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica; color: rgb(50, 51, 51);"&gt;Result of the command: "show config" attached.&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica; color: rgb(50, 51, 51);"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; font-size: 12px; line-height: normal; font-family: Helvetica; color: rgb(50, 51, 51);"&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569667#M199467</guid>
      <dc:creator>Tomas K</dc:creator>
      <dc:date>2019-03-12T05:15:44Z</dc:date>
    </item>
    <item>
      <title>Need urgent help.Thanks.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569668#M199468</link>
      <description>&lt;P&gt;Need urgent help.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2014 08:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569668#M199468</guid>
      <dc:creator>Tomas K</dc:creator>
      <dc:date>2014-12-24T08:38:34Z</dc:date>
    </item>
    <item>
      <title>Hi,This is a NAT example for</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569669#M199469</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This is a NAT example for the port forwarding requirement:-&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.174&lt;/P&gt;&lt;P&gt;host 192.168.1.174&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 8080 8080&lt;/P&gt;&lt;P&gt;On the Outside interface apply this ACL:-&lt;/P&gt;&lt;P&gt;access-list Out-In permit tcp any obj-192.168.1.174 eq 8080&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the other issue , for the VPN access to the internal resources:-&lt;/P&gt;&lt;P&gt;Check if you have all these networks in Split Tunnel policy and you have NAT statement for the VPN pool and internal Subnets between the Inside and Outside interface.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2014 12:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569669#M199469</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-24T12:10:55Z</dc:date>
    </item>
    <item>
      <title>Hi, regarding port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569670#M199470</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;regarding port forwarding it is already done in that way You suggested.&lt;/P&gt;&lt;P&gt;See config file in first post.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Dec 2014 16:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569670#M199470</guid>
      <dc:creator>Tomas K</dc:creator>
      <dc:date>2014-12-24T16:10:49Z</dc:date>
    </item>
    <item>
      <title>Hi,So , is it not working ?</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569671#M199471</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;So , is it not working ? If no , can you send me this output:-&lt;/P&gt;&lt;P&gt;packet trace input outside tcp 4.2.2.2 34456 &amp;lt;Outside Interface IP&amp;gt; 8080 det&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 25 Dec 2014 09:41:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569671#M199471</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-25T09:41:07Z</dc:date>
    </item>
    <item>
      <title>Merry Christmas.Here's the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569672#M199472</link>
      <description>&lt;P&gt;Merry Christmas.&lt;/P&gt;&lt;P&gt;Here's the output:&lt;/P&gt;&lt;P&gt;Result of the command: "packet input KabelBW tcp 4.2.2.2 34456 external_ip 8080 det"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; external_ip &amp;nbsp;255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff29b7d5b0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=241387, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&amp;nbsp;&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a5f96f0, priority=0, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;hits=94800, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;input_ifc=KabelBW, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: KabelBW&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's also acess-group and acess-list&lt;/P&gt;&lt;P&gt;Result of the command: "show run access-group"&lt;/P&gt;&lt;P&gt;access-group KabelBW_access_in_1 in interface KabelBW control-plane&lt;BR /&gt;access-group KabelBW_access_in in interface KabelBW&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group Servers_access_in in interface Servers&lt;BR /&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "show run access-list"&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit object-group DM_INLINE_PROTOCOL_1 192.168.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list LAN_access_in extended permit icmp 192.168.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list LAN_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any eq sip&amp;nbsp;&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.0.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Split-Tunnel remark access to hidden_net&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.244.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap_1 extended permit ip 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_2&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap_2 extended permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list KabelBW_access_in extended permit tcp any eq 8080 object STATIC-PAT eq 8080 log debugging&amp;nbsp;&lt;BR /&gt;access-list KabelBW_access_in remark Starface Portweiterleitung extern an Starface&lt;BR /&gt;access-list KabelBW_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any host 192.168.1.5 eq sip&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap extended permit object-group DM_INLINE_PROTOCOL_1 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Servers_access_in extended permit ip 192.168.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap_3 extended permit object-group DM_INLINE_PROTOCOL_2 192.168.1.0 255.255.255.0 object hidden_net1&lt;BR /&gt;access-list KabelBW_access_in_1 extended permit tcp any eq 8080 object STATIC-PAT eq 8080&amp;nbsp;&lt;BR /&gt;access-list KabelBW_access_in_1 extended permit ip object-group VPN any&amp;nbsp;&lt;BR /&gt;access-list global_access extended permit ip any any log debugging&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Dec 2014 16:42:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569672#M199472</guid>
      <dc:creator>Tomas K</dc:creator>
      <dc:date>2014-12-25T16:42:05Z</dc:date>
    </item>
    <item>
      <title>Hi,This is the issue:-nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569673#M199473</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This is the issue:-&lt;/P&gt;&lt;P&gt;nat (LAN,KabelBW) source dynamic any interface&lt;/P&gt;&lt;P&gt;NAT Statement is not even being hit for this traffic.&lt;/P&gt;&lt;P&gt;I would recommend you to change this NAT to the Auto NAT section and that should resolve this issue.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 26 Dec 2014 03:37:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569673#M199473</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-26T03:37:07Z</dc:date>
    </item>
    <item>
      <title>I agree with Vibhor. Your NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569674#M199474</link>
      <description>&lt;P&gt;I agree with Vibhor. Your NAT order of operations is incorrect.&lt;/P&gt;&lt;P&gt;They are processed "top down" and first match will end NAT processing.&lt;/P&gt;&lt;P&gt;The one Vibhor cited is your second statement and will effectively catch all traffic from the LAN to KabelBW interface.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Dec 2014 14:18:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569674#M199474</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-12-26T14:18:42Z</dc:date>
    </item>
    <item>
      <title>Ok. I did tried your</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569675#M199475</link>
      <description>&lt;P&gt;Ok. I did tried your suggested configuration, but then i added auto static nat rule instead of dynamic, vpn started not to be accessible, i mean i can't even connect to vpn. Though port forwarding was working, but i need both, port forwarding and vpn working.&lt;/P&gt;&lt;P&gt;Maybe you can suggest that was wrong, or i missed something.&lt;/P&gt;&lt;P&gt;I reverted back to original configuration.&lt;/P&gt;&lt;P&gt;Result of the command: "show run nat"&lt;/P&gt;&lt;P&gt;nat (LAN,KabelBW) source static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 destination static VPN VPN&lt;BR /&gt;nat (LAN,KabelBW) source dynamic any interface&lt;BR /&gt;nat (LAN,KabelBW) source static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp&lt;BR /&gt;nat (any,KabelBW) source static any any destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp&lt;BR /&gt;nat (KabelBW,KabelBW) source static any any destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp&lt;BR /&gt;nat (LAN,KabelBW) source static any any destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "show run access-list"&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit object-group DM_INLINE_PROTOCOL_1 192.168.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list LAN_access_in extended permit icmp 192.168.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list LAN_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any eq sip&amp;nbsp;&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.0.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Split-Tunnel remark access to hidden_net&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.244.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap_1 extended permit ip 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_2&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap_2 extended permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list KabelBW_access_in&lt;BR /&gt;access-list KabelBW_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any host 192.168.1.5 eq sip&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap extended permit object-group DM_INLINE_PROTOCOL_1 192.168.1.0 255.255.255.0 192.168.0.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list Servers_access_in extended permit ip 192.168.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list KabelBW_cryptomap_3 extended permit object-group DM_INLINE_PROTOCOL_2 192.168.1.0 255.255.255.0 object hidden_network&lt;BR /&gt;access-list KabelBW_access_in_1 extended permit ip object-group VPN any&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Dec 2014 19:23:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569675#M199475</guid>
      <dc:creator>Tomas K</dc:creator>
      <dc:date>2014-12-27T19:23:23Z</dc:date>
    </item>
    <item>
      <title>Hi,Did you add something like</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569676#M199476</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Did you add something like this on the ASA device:-&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN,KabelBW) static any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If not , what is the NAT you added. I am sure that port forward with the VPN will work but we need to verify the actual configuration when you saw the issue.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Dec 2014 11:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-forwarding-and-vpn-issues/m-p/2569676#M199476</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-28T11:29:34Z</dc:date>
    </item>
  </channel>
</rss>

