<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I managed to redirect port in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592701#M202822</link>
    <description>&lt;P&gt;I managed to redirect port 8000 with below settings but still I cannot redirect any other port. There is no problem with access rules, there is a problem with NAT.&lt;/P&gt;&lt;P&gt;object network CCTV&lt;BR /&gt;host 192.168.144.80&lt;BR /&gt;nat (inside,outside) static interface service tcp 8000 8000&lt;/P&gt;&lt;P&gt;access-list Outside_access_in line 1 remark CCTV&lt;BR /&gt;access-list Outside_access_in line 2 permit tcp any object CCTV eq 8000&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Dec 2014 07:26:35 GMT</pubDate>
    <dc:creator>Izac ICT</dc:creator>
    <dc:date>2014-12-11T07:26:35Z</dc:date>
    <item>
      <title>Port forwarding ASDM</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592692#M202811</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have ASA 5510, FW:8.4 and ASDM 6.4.&lt;/P&gt;&lt;P&gt;I`m trying to forward port 2222 to my Synology NAS but not successful. I added access rule, created NAT but no success. Please check attached file to see how I created. Should I add static route, too?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also want to map outside port to different inside port. I tried but I couldn`t manage. Please help. You can send me screenshots or commands, both good to me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592692#M202811</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2019-03-12T05:10:57Z</dc:date>
    </item>
    <item>
      <title>Hi, I pretty much only use</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592693#M202812</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I pretty much only use the CLI so I might miss something.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks strange to me that the ACL rules section &lt;STRONG&gt;"Service"&lt;/STRONG&gt; only lists &lt;STRONG&gt;"2222"&lt;/STRONG&gt; instead of &lt;STRONG&gt;"tcp/2222".&lt;/STRONG&gt; Though I would imagine that the ASDM should not accept that rule if it wasnt specified as TCP or UDP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also what I am wondering is does your device really listen on port TCP/2222 in the local subnet or are we talking perhaps about TCP/22 (SSH) listening on the local NAS and you want to access it with mapped port TCP/2222? In that case I would change the &lt;STRONG&gt;"Real Port" &lt;/STRONG&gt;section to &lt;STRONG&gt;"22"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that this would also mean that you would have to allow the traffic to the local/real port TCP/22 (instead of TCP/2222). This is because the newer softwares require you to always permit (or deny) the connections towards the local/real IP and local/real port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Notice that for connections incoming from the external networs you WON'T have to add a rule to the internal interfaces ACL as the ASA has already allowed the connection and the return traffic will be allowed on the basis of connection information already present on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 10:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592693#M202812</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-12-04T10:55:25Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni,Thank for the</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592694#M202813</link>
      <description>&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Thank for the comment. I changed the port 22 to 2222 in NAS device. You see 2222 on ASA not TCP since I created TCP 2222 service&amp;nbsp; named "2222". You can see also from NAT configuration that it is TCP 2222.&lt;/P&gt;&lt;P&gt;I can use also CLI since I`m old CCNA R&amp;amp;Sw.&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 11:03:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592694#M202813</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-04T11:03:34Z</dc:date>
    </item>
    <item>
      <title>Hi, I guess from the CLI you</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592695#M202815</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess from the CLI you could list the following&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run object id &amp;lt;nat object name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-list&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Naturally if the configuration aint large you can share the whole configurations. In either case remember to remove any references to actual public IP addresses or other sensitive information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 11:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592695#M202815</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-12-04T11:14:55Z</dc:date>
    </item>
    <item>
      <title>Thanks for prompt answer</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592696#M202817</link>
      <description>&lt;P&gt;Thanks for prompt answer.&lt;/P&gt;&lt;P&gt;Please see responses for the commands in the attached file.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 11:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592696#M202817</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-04T11:29:24Z</dc:date>
    </item>
    <item>
      <title>All Running Config </title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592697#M202818</link>
      <description>&lt;P&gt;All Running Config&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 11:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592697#M202818</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-04T11:38:38Z</dc:date>
    </item>
    <item>
      <title>Hi, I can't see any rule that</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592698#M202819</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't see any rule that would allow the traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would need to add&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Outside_access_in line 1 remark NAS&lt;BR /&gt;access-list Outside_access_in line 2 permit tcp any object Syno-192.168.144.81 eq 2222&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These should add the &lt;STRONG&gt;"remark"&lt;/STRONG&gt; line and the actual ACL rule to the top of the current ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you were planning on using the &lt;STRONG&gt;"object service 2222"&lt;/STRONG&gt; in the ACL rules then that probably wont work. You have specified in side the &lt;STRONG&gt;"object"&lt;/STRONG&gt; both the &lt;STRONG&gt;"source"&lt;/STRONG&gt; and &lt;STRONG&gt;"destination"&lt;/STRONG&gt; as TCP/2222. This will mean that only a connection source from the port TCP/2222 and heading to port TCP/2222 will be allowed and that is probably not the case as the clients source port for the TCP connection is typically totally random port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 13:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592698#M202819</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-12-04T13:28:03Z</dc:date>
    </item>
    <item>
      <title>Thanks, I entered these two</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592699#M202820</link>
      <description>&lt;P&gt;Thanks, I entered these two lines but I think I`m making mistake while configuring NAT. Could you please send me also NAT examples for those two lines? (For example outside port is 222, LAN port is 22)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Dec 2014 07:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592699#M202820</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-05T07:14:33Z</dc:date>
    </item>
    <item>
      <title>I forwarded ports before via</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592700#M202821</link>
      <description>&lt;P&gt;I forwarded ports before via ASDM but now I can not forward any port, it always gives NAT error. Please see packet tracer error in attached file. What am I doing wrong?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Dec 2014 12:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592700#M202821</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-08T12:11:39Z</dc:date>
    </item>
    <item>
      <title>I managed to redirect port</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592701#M202822</link>
      <description>&lt;P&gt;I managed to redirect port 8000 with below settings but still I cannot redirect any other port. There is no problem with access rules, there is a problem with NAT.&lt;/P&gt;&lt;P&gt;object network CCTV&lt;BR /&gt;host 192.168.144.80&lt;BR /&gt;nat (inside,outside) static interface service tcp 8000 8000&lt;/P&gt;&lt;P&gt;access-list Outside_access_in line 1 remark CCTV&lt;BR /&gt;access-list Outside_access_in line 2 permit tcp any object CCTV eq 8000&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 07:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592701#M202822</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-11T07:26:35Z</dc:date>
    </item>
    <item>
      <title>Hi,I think the easiest way to</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592702#M202823</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I think the easiest way to find the issue with the configuration would be to use the Packet Trace:-&lt;/P&gt;&lt;P&gt;Refer:-&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/document/29601/troubleshooting-access-problems-using-packet-tracer&lt;/P&gt;&lt;P&gt;Paste the outputs for the ports which are not working.&lt;/P&gt;&lt;P&gt;take the trace from the any outside internet IP to the Natted GLobal IP on that specific port which you have forwarded.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 10:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592702#M202823</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-12-11T10:15:18Z</dc:date>
    </item>
    <item>
      <title>Thanks for the advice. I used</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592703#M202824</link>
      <description>&lt;P&gt;Thanks for the advice. I used package tracer, result is attached. I check the ports with canyouseeme.org or yougetsignal.com but result is negative.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I use below commands;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network 9100Alrm&lt;BR /&gt;host 192.168.144.80&lt;BR /&gt;nat (inside,outside) static interface service tcp 9500 9500&lt;/P&gt;
&lt;P&gt;access-list Outside_access_in line 1 remark NAS&lt;BR /&gt;access-list Outside_access_in line 2 permit tcp any object 9100Alrm eq 9100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
object network PC01(webservices)
 nat (Inside,Outside) static interface service tcp 789 789 
object network PC02(imap)
 nat (Inside,Outside) static interface service tcp imap4 imap4 
object network PC02(POP)
 nat (Inside,Outside) static interface service tcp pop3 pop3 
object network PC01(webservices)(udp)
 nat (Inside,Outside) static interface service udp 789 789 
object network https
 nat (Inside,Outside) static interface service tcp https https 
object network exchange_smtp
 nat (Inside,Outside) static interface service tcp smtp smtp 
object network 873
 nat (Inside,Outside) static interface service tcp 873 873 
object network CCTVGr-8000
 nat (Inside,Outside) static interface service tcp 8000 8000 
object network CCTVGr554
 nat (any,Outside) static interface service tcp rtsp rtsp 
object network 9100Alrm
 nat (Inside,Outside) static interface service tcp 9100 9100 
!
nat (WLAN,Outside) after-auto source dynamic any interface
nat (Inside,Outside) after-auto source dynamic any interface&lt;/PRE&gt;</description>
      <pubDate>Thu, 11 Dec 2014 12:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asdm/m-p/2592703#M202824</guid>
      <dc:creator>Izac ICT</dc:creator>
      <dc:date>2014-12-11T12:27:33Z</dc:date>
    </item>
  </channel>
</rss>

