<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I think this can happen if in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583434#M202287</link>
    <description>&lt;P&gt;I think this can happen if ASA is listening for connections on&amp;nbsp;port 22 and 443 on outside interface. Probably you have enabled ssh and http server on outside interface.&lt;/P&gt;&lt;P&gt;You can check it by running command sh asp table socket.&lt;/P&gt;&lt;P&gt;You can change port for http server by command http server enable &amp;lt;port&amp;gt;.&lt;/P&gt;&lt;P&gt;Try changing port and then configure NAT.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Rishabh&lt;/P&gt;</description>
    <pubDate>Sat, 13 Dec 2014 19:31:02 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2014-12-13T19:31:02Z</dc:date>
    <item>
      <title>static nat config on ASA 9.1 for port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583429#M202277</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have only single Public IP on ASA outside interface.&lt;/P&gt;&lt;P&gt;Server is connected to inside network of ASA.I want server should be reachable from internet on port 443.&lt;/P&gt;&lt;P&gt;I try the static nat config on ASA&lt;/P&gt;&lt;P&gt;nat (inside,outside) ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; &amp;lt;1-2147483647&amp;gt;&amp;nbsp; Position of NAT rule within before auto section&lt;BR /&gt;&amp;nbsp; after-auto&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Insert NAT rule after auto section&lt;BR /&gt;&amp;nbsp; source&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source NAT parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no static command?&lt;/P&gt;&lt;P&gt;how can i config&amp;nbsp; below config&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ASA_RED"&gt;nat (inside,outside) static interface service tcp http http&amp;nbsp; in ASA 9.1 version?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ASA_RED"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="ASA_RED"&gt;MAhesh&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583429#M202277</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T05:13:42Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh,You can create an</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583430#M202278</link>
      <description>&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;You can create an object nat for this requirement.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; create object for server private ip.&lt;/P&gt;&lt;P&gt;object network SERVER&lt;/P&gt;&lt;P&gt;host x.x.x.x&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 443 443&lt;/P&gt;&lt;P&gt;NOTE: If you are doing translating traffic coming for ASA IP on port 443 to SERVER then you will not be able to run ASDM on port 443. In order to manage ASA on the public IP make sure that you have changed the port for ASDM.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Rishabh&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 17:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583430#M202278</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-13T17:35:54Z</dc:date>
    </item>
    <item>
      <title> Hi Rishabh, Under 9.1 i</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583431#M202280</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Rishabh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under 9.1 i tried this&lt;/P&gt;&lt;P&gt;ASA1(config)# nat (inside,outside) source static ?&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; WORD&amp;nbsp; Specify object or object-group name for real source&lt;BR /&gt;&amp;nbsp; any&amp;nbsp;&amp;nbsp; Abbreviation for source address and mask of 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;There is no option for interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 17:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583431#M202280</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-13T17:45:26Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh, The interface</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583432#M202283</link>
      <description>&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The interface option for:&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; object NAT:-&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;&amp;gt;&amp;gt; create object for server private ip.&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;(config)#object network SERVER&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;(config-network-object)#&amp;nbsp;host x.x.x.x&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;&lt;SPAN style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;(config-network-object)#&amp;nbsp;&lt;/SPAN&gt;nat (inside,outside) static interface service tcp 443 443&lt;/P&gt;&lt;P style="font-size: 14px; background-color: rgb(249, 249, 249);"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; For mannual nat&lt;/P&gt;&lt;P&gt;(config)#nat (outside,inside) source static &amp;lt;real-ip&amp;gt; &amp;lt;mapped-ip&amp;gt;&amp;nbsp;destination static interface &amp;lt;real-ip&amp;gt; service &amp;lt;real-service&amp;gt; &amp;lt;mapped-service&amp;gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Rishabh&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 18:07:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583432#M202283</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-13T18:07:48Z</dc:date>
    </item>
    <item>
      <title> Hi Rishabh, When i do ass</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583433#M202285</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Rishabh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i do ass you said&lt;/P&gt;&lt;P&gt;ASA1(config-network-object)# nat (inside,outside) static interface ser$&lt;BR /&gt;ERROR: NAT unable to reserve ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i try ssh same error&lt;/P&gt;&lt;P&gt;Any idea how can i allow ssh to server or 443 connection from outside?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also ACL is there to allow traffic from outside - any IP&amp;nbsp; to ASA public IP.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 18:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583433#M202285</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-13T18:51:49Z</dc:date>
    </item>
    <item>
      <title>I think this can happen if</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583434#M202287</link>
      <description>&lt;P&gt;I think this can happen if ASA is listening for connections on&amp;nbsp;port 22 and 443 on outside interface. Probably you have enabled ssh and http server on outside interface.&lt;/P&gt;&lt;P&gt;You can check it by running command sh asp table socket.&lt;/P&gt;&lt;P&gt;You can change port for http server by command http server enable &amp;lt;port&amp;gt;.&lt;/P&gt;&lt;P&gt;Try changing port and then configure NAT.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Rishabh&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 19:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583434#M202287</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-13T19:31:02Z</dc:date>
    </item>
    <item>
      <title>For ssh I haven't seen any</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583435#M202289</link>
      <description>&lt;P&gt;For ssh I haven't seen any command that would make as a listen on any other port than 22.&lt;/P&gt;&lt;P&gt;So to ssh to your server you can use mapped service port as some random port (say 22222)and then real port as 22 in your NAT.&lt;/P&gt;&lt;P&gt;And then ssh to public IP port 22222&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 19:42:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583435#M202289</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-13T19:42:26Z</dc:date>
    </item>
    <item>
      <title> For testing purposes i am</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583436#M202290</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For testing purposes i am only allowing telnet connection to server as SSH&lt;/P&gt;&lt;P&gt;and https is used by ASA itself.&lt;/P&gt;&lt;P&gt;When i try telnet from outside world to server IP&lt;/P&gt;&lt;P&gt;i see logs in ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;%ASA-3-710003: TCP access denied by ACL from 70.75.x.x/49966 to outside:96.51.x.x/23&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have ACL that shows no hit counters&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object server eq telnet&lt;/P&gt;&lt;P&gt;pri/act/ASA1#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sh run access-group&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current NAT config&lt;/P&gt;&lt;P&gt;sh run nat&lt;BR /&gt;nat (outside,any) source static vpn_pool_ip vpn_pool_ip destination static inside inside description Allow Ping and SSH to 10.0.0.1 using Anyconnect with Full Tunnel&lt;BR /&gt;nat (inside,outside) source static inside inside destination static vpn_pool_ip vpn_pool_ip&lt;BR /&gt;nat (inside,outside) source static inside inside destination static inside inside&lt;BR /&gt;nat (outside,outside) source dynamic vpn_pool_ip interface description Allow Access to Internet using Anyconnect VPN&lt;BR /&gt;nat (sales,outside) source static Sales Sales destination static Sales Sales&lt;BR /&gt;nat (inside,outside) source dynamic inside interface description Allow R1 to ping to Internet Sites&lt;BR /&gt;nat (sales,outside) source dynamic Sales interface description Allow 2950 to Pint to Internet Sites&lt;BR /&gt;nat (sales,outside) source static Sales Sales destination static vpn_pool_ip vpn_pool_ip description Allow Ping to 2950 Switch while connected Via Anyconnect Full tunnel&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;object network server&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp telnet telnet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2014 23:17:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583436#M202290</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-13T23:17:21Z</dc:date>
    </item>
    <item>
      <title>When you are testing telnet</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583437#M202292</link>
      <description>&lt;P&gt;When you are testing telnet traffic, check NAT counter for the object NAT you have created.&lt;/P&gt;&lt;P&gt;Make sure the traffic is not hitting any Manual NAT which you have.&lt;/P&gt;&lt;P&gt;If it is hitting some manual NAT then place that NAT after object NAT using the command "after-auto" in that manual NAT statement.&lt;/P&gt;&lt;P&gt;Also check what packet tracer shows.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 09:16:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583437#M202292</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-14T09:16:39Z</dc:date>
    </item>
    <item>
      <title> I do not see any hit</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583438#M202294</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do not see any hit counters on object NAT.&lt;/P&gt;&lt;P&gt;Also i have 2 manual NAT statements as below&lt;/P&gt;&lt;P&gt;2 (inside) to (outside) source static inside inside&amp;nbsp;&amp;nbsp; destination static vpn_pool_ip vpn_pool_ip&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;6 (inside) to (outside) source dynamic inside interface&amp;nbsp;&amp;nbsp; description Allow R1 to ping to Internet Sites&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7204, untranslate_hits = 2578&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Can you please tell me command via CLI which i can use to put below commands after Object NAT?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 14:58:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583438#M202294</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-14T14:58:37Z</dc:date>
    </item>
    <item>
      <title>I think all your traffic is</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583439#M202296</link>
      <description>&lt;P&gt;I think all your traffic is hitting this NAT statement :&lt;/P&gt;&lt;P&gt;(inside) to (outside) source dynamic inside interface&amp;nbsp;&amp;nbsp; description Allow R1 to ping to Internet Sites&lt;/P&gt;&lt;P&gt;Remove this NAT statement and place it after object nat by using after-auto command.&lt;/P&gt;&lt;P&gt;eg:&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic inside interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 16:04:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583439#M202296</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-14T16:04:24Z</dc:date>
    </item>
    <item>
      <title> i moved the nat config below</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583440#M202297</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i moved the nat config below as you said here is packet tracer output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;pri/act/ASA1# packet-tracer input outside tcp 70.75.x.x. 23 10.0.0.4&amp;nbsp; 23&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object server eq telnet&lt;/STRONG&gt;&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;&lt;STRONG&gt;object network server&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp telnet telnet&lt;/STRONG&gt;&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;seems it is denied by object NAT rule?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 16:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583440#M202297</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-14T16:47:55Z</dc:date>
    </item>
    <item>
      <title>As per your requirement you</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583441#M202298</link>
      <description>&lt;P&gt;As per your requirement you will be sending traffic on public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check IP addresses in packet tracer.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;packet-tracer input outside tcp &amp;lt;source-ip&amp;gt; &amp;lt;any port&amp;gt; &amp;lt;asa outside ip&amp;gt; &amp;lt;23&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 16:58:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583441#M202298</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-14T16:58:37Z</dc:date>
    </item>
    <item>
      <title> Here is output ASA1# packet</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583442#M202299</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA1# packet-tracer input outside tcp 70.75.x.x 1023&amp;nbsp; 96.51.x.x&amp;nbsp; 23&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 96.51.x.x &amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 17:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583442#M202299</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-14T17:05:33Z</dc:date>
    </item>
    <item>
      <title>refer this article:https:/</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583443#M202300</link>
      <description>&lt;P&gt;refer this article:&lt;/P&gt;&lt;P&gt;https://rowell.dionicio.net/configuring-nat-for-a-public-server-using-same-outside-interface/&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 17:55:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583443#M202300</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-14T17:55:13Z</dc:date>
    </item>
    <item>
      <title> I tried as per above website</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583444#M202301</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried as per above website seems some NAT issue which i need to fix&lt;/P&gt;&lt;P&gt;Logs shows&lt;/P&gt;&lt;P&gt;&amp;nbsp;%ASA-3-710003: TCP access denied by ACL from 70.75.x.x/52948 to outside:96.51.x.x/443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA1# sh run nat&lt;BR /&gt;nat (outside,any) source static vpn_pool_ip vpn_pool_ip destination static inside inside description Allow Ping and SSH to 10.0.0.1 using Anyconnect with Full Tunnel&lt;BR /&gt;nat (inside,outside) source static inside inside destination static vpn_pool_ip vpn_pool_ip&lt;BR /&gt;nat (outside,outside) source dynamic vpn_pool_ip interface description Allow Access to Internet using Anyconnect VPN&lt;BR /&gt;nat (sales,outside) source static Sales Sales destination static Sales Sales&lt;BR /&gt;nat (sales,outside) source dynamic Sales interface description Allow 2950 to Pint to Internet Sites&lt;BR /&gt;nat (sales,outside) source static Sales Sales destination static vpn_pool_ip vpn_pool_ip description Allow Ping to 2950 Switch while connected Via Anyconnect Full tunnel&lt;BR /&gt;!&lt;BR /&gt;object network server&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp https https&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source static inside inside destination static inside inside&lt;BR /&gt;nat (inside,outside) after-auto source dynamic inside interface description Allow R1 to ping to Internet Sites&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2014 19:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583444#M202301</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-14T19:15:04Z</dc:date>
    </item>
    <item>
      <title>For testing you can try to</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583445#M202302</link>
      <description>&lt;P&gt;For testing you can try to put all your manual nat after object NAT (using after auto command). So that you can confirm that there is no other NAT getting hit for the server traffic.&lt;/P&gt;&lt;P&gt;And also make sure that your ACL for this traffic has UN NATed (private IP address) of the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Dec 2014 00:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583445#M202302</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2014-12-15T00:06:41Z</dc:date>
    </item>
    <item>
      <title> I put this object NAT</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583446#M202303</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I put this object NAT statement at top of all the NATs.&lt;/P&gt;&lt;P&gt;Now i can telnet to server.&lt;/P&gt;&lt;P&gt;Many thanks for helping all the way.&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2014 01:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-on-asa-9-1-for-port-forwarding/m-p/2583446#M202303</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-16T01:03:10Z</dc:date>
    </item>
  </channel>
</rss>

