<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi,What you need is a static in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659119#M200801</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What you need is a static NAT configuration and the ACL applied on the outside interface should permit access to the ports you want.&lt;/P&gt;&lt;P&gt;If you were using another IP address apart from the ASA's WAN IP, then a simple configuration like this will work:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network DMZ-SERVER-MAPPED&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;host 1.1.1.51&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network DMZ-SERVER-REAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;host 10.0.50.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;nat (LAN,WAN) static DMZ-SERVER-MAPPED&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;access-list WAN-IN permit udp any host 10.0.50.10 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;access-list WAN-IN permit icmp any host 10.0.50.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;access-group WAN-IN in interface WAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Post ASA version 8.3, you need to use the real IP address in your access-list, not the mapped one.&lt;/P&gt;&lt;P&gt;If you are bent of using the ASA's IP address for the NAT, then you will have to use Twice-NAT, else the ASA will not be accessible (for other services) on that WAN interface.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network DMZ-SERVER-REAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;host 10.0.50.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object service DNS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;service udp source eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object service FTP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;service tcp source eq 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;nat (LAN,WAN) source static DMZ-SERVER-REAL interface service DNS DNS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;nat (LAN,WAN) source static DMZ-SERVER-REAL interface service FTP FTP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list WAN-IN permit udp any host 10.0.50.10 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list WAN-IN permit tcp any host 10.0.50.10 eq 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-group WAN-IN in interface WAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This one will not allow ICMP though as you can only do static-NAT-port-translation for TCP or UDP ports.&lt;/P&gt;&lt;P&gt;More information available here:&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_overview.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Mar 2015 20:58:19 GMT</pubDate>
    <dc:creator>Adeolu Owokade</dc:creator>
    <dc:date>2015-03-19T20:58:19Z</dc:date>
    <item>
      <title>ASA 8.4.2 Port forwarding outside interface to DMZ server</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659118#M200754</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm a student and could use some guidance.&lt;/P&gt;&lt;P&gt;I have a test lab setup to test WAN - DMZ capabilities&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My setup is very simple :&lt;/P&gt;&lt;P&gt;* WAN internet if 1.1.1.50&lt;/P&gt;&lt;P&gt;* DMZ Server 10.0.50.10 real ip that needs to be icmp reachable when I ping on the outside interface of the ASA 1.1.1.50&lt;/P&gt;&lt;P&gt;* DMZ Server needs to be reachable on udp 53 on 1.1.1.50 outside address ( In the future I would like to add a rule like TCP 22, 21, 80,443)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm struggling a lot to get this working and would like some assistance from the experts &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;* Right now I can ping from DMZ to outside but my source address doesn't get translated from 10.0.50.10 to 1.1.1.50&lt;/P&gt;&lt;P&gt;* I can not reach udp 53 from an external server, an nmap shows me port 53 is filteren, a packet tracer shows me the ACL is blocking it but I configured any any so I don't see the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my config :&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;mac-address a4b5.a5b5.a5b5&lt;BR /&gt;&amp;nbsp;nameif WAN&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.50 255.255.255.0&lt;BR /&gt;&amp;nbsp;ipv6 address 2001:6a8:2940:101::50/64&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.0.50.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ipv6 address 2001:6a8:2940:1b5::1/64&lt;BR /&gt;&amp;nbsp;ipv6 address 2001:6a8:2940:1b5::50/64&lt;BR /&gt;&amp;nbsp;ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;nameif LAN&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.50.1 255.255.255.0&lt;BR /&gt;&amp;nbsp;ipv6 address 2001:6a8:2940:1a5::1/64&lt;BR /&gt;&amp;nbsp;ipv6 enable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.16.0.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network DMZ_Host_IPV6&lt;BR /&gt;&amp;nbsp;host 2001:6a8:2940:1b5::51&lt;BR /&gt;object network DMZ_int&lt;BR /&gt;&amp;nbsp;host 2001:6a8:2940:1b5::50&lt;BR /&gt;object network DMZ-Host&lt;BR /&gt;&amp;nbsp;host 10.0.50.10&lt;BR /&gt;object service ssh&lt;BR /&gt;&amp;nbsp;service tcp source eq ssh&lt;BR /&gt;object service dns_udp&lt;BR /&gt;&amp;nbsp;service udp source eq domain&lt;BR /&gt;object network DMZ-network&lt;BR /&gt;object network dmzdnsserver&lt;BR /&gt;&amp;nbsp;host 10.0.50.10&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;access-list DMZ_access_in extended permit ip any any&lt;BR /&gt;access-list LAN_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ipv6 icmp permit any DMZ&lt;BR /&gt;ipv6 route WAN ::/0 2001:6a8:2940:101::1&lt;BR /&gt;ipv6 access-list global_access_ipv6 permit ip any any&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any WAN&lt;BR /&gt;icmp permit any DMZ&lt;BR /&gt;icmp permit any LAN&lt;BR /&gt;icmp permit any management&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (LAN,WAN) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network dmzdnsserver&lt;BR /&gt;&amp;nbsp;nat (DMZ,WAN) static interface service udp domain domain&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group global_access global&lt;BR /&gt;access-group global_access_ipv6 global&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.0.1 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.50.2-192.168.50.10 LAN&lt;BR /&gt;dhcpd dns 10.0.50.10 interface LAN&lt;BR /&gt;dhcpd option 3 ip 192.168.50.1 interface LAN&lt;BR /&gt;dhcpd enable LAN&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;crashinfo save disable&lt;BR /&gt;Cryptochecksum:1d2732a8216a162ebeee6727703e40ed&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks a bunch for your guidance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:39:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659118#M200754</guid>
      <dc:creator>bennethos1982</dc:creator>
      <dc:date>2019-03-12T05:39:12Z</dc:date>
    </item>
    <item>
      <title>Hi,What you need is a static</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659119#M200801</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;What you need is a static NAT configuration and the ACL applied on the outside interface should permit access to the ports you want.&lt;/P&gt;&lt;P&gt;If you were using another IP address apart from the ASA's WAN IP, then a simple configuration like this will work:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network DMZ-SERVER-MAPPED&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;host 1.1.1.51&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network DMZ-SERVER-REAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;host 10.0.50.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;nat (LAN,WAN) static DMZ-SERVER-MAPPED&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;access-list WAN-IN permit udp any host 10.0.50.10 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;access-list WAN-IN permit icmp any host 10.0.50.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;access-group WAN-IN in interface WAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: Post ASA version 8.3, you need to use the real IP address in your access-list, not the mapped one.&lt;/P&gt;&lt;P&gt;If you are bent of using the ASA's IP address for the NAT, then you will have to use Twice-NAT, else the ASA will not be accessible (for other services) on that WAN interface.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network DMZ-SERVER-REAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;host 10.0.50.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object service DNS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;service udp source eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object service FTP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;service tcp source eq 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;nat (LAN,WAN) source static DMZ-SERVER-REAL interface service DNS DNS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;nat (LAN,WAN) source static DMZ-SERVER-REAL interface service FTP FTP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list WAN-IN permit udp any host 10.0.50.10 eq 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-list WAN-IN permit tcp any host 10.0.50.10 eq 21&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;access-group WAN-IN in interface WAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This one will not allow ICMP though as you can only do static-NAT-port-translation for TCP or UDP ports.&lt;/P&gt;&lt;P&gt;More information available here:&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_overview.html"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/nat_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 20:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659119#M200801</guid>
      <dc:creator>Adeolu Owokade</dc:creator>
      <dc:date>2015-03-19T20:58:19Z</dc:date>
    </item>
    <item>
      <title>Thank you kind sir, it's</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659120#M200818</link>
      <description>&lt;P&gt;Thank you kind sir, it's working and I can continue my studies &amp;amp; homework.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will have to read up on the difference between ICMP &amp;amp; TCP , I had questions about natting &amp;amp; icmp but you made that clear now, ICMP is not nattable with static nat.&lt;/P&gt;&lt;P&gt;I will read up on the link you provided me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;have a nice day&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2015 12:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659120#M200818</guid>
      <dc:creator>bennethos1982</dc:creator>
      <dc:date>2015-03-20T12:05:44Z</dc:date>
    </item>
    <item>
      <title>You are welcome.ICMP and Port</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659121#M200835</link>
      <description>&lt;P&gt;You are welcome.&lt;/P&gt;&lt;P&gt;ICMP and &lt;STRONG&gt;Port Translation&lt;/STRONG&gt; is not possible on the Cisco ASA. If you do a normal static NAT like the first one I sent to you, then ICMP will work.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2015 13:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-2-port-forwarding-outside-interface-to-dmz-server/m-p/2659121#M200835</guid>
      <dc:creator>Adeolu Owokade</dc:creator>
      <dc:date>2015-03-20T13:07:03Z</dc:date>
    </item>
  </channel>
</rss>

