<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Eddy, Thanks for reply. I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588091#M202881</link>
    <description>&lt;P&gt;Hi Eddy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reply. I tried the above command&amp;nbsp;but it's not working...do i have to add any acl?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;pppoe client vpdn group gcmjp&lt;BR /&gt;&amp;nbsp;ip address pppoe setroute (1.1.1.1)&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif WiFi&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif Phoneline&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 192.168.4.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa912-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network JP_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network SG_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Synology1&lt;BR /&gt;&amp;nbsp;host 192.168.2.155&lt;BR /&gt;object network Synology2&lt;BR /&gt;&amp;nbsp;host 192.168.2.243&lt;BR /&gt;object network BackupServer&lt;BR /&gt;&amp;nbsp;host 192.168.2.11&lt;BR /&gt;object network JP&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network WiFi&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network NAS5006&lt;BR /&gt;&amp;nbsp;host 192.168.2.155&lt;BR /&gt;object network Server3389&lt;BR /&gt;&amp;nbsp;host 192.168.2.11&lt;BR /&gt;object service RDP3389&lt;BR /&gt;&amp;nbsp;service tcp source eq 3389 destination eq 3389&amp;nbsp;&lt;BR /&gt;object service NAS5003&lt;BR /&gt;&amp;nbsp;service tcp source eq 5003 destination eq 5003&amp;nbsp;&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu WiFi 1500&lt;BR /&gt;mtu Phoneline 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static JP_LAN JP_LAN destination static SG_LAN SG_LAN no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic JP_LAN interface&lt;BR /&gt;nat (WiFi,outside) source dynamic WiFi interface&lt;BR /&gt;!&lt;BR /&gt;object network Synology1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 5003 5003&amp;nbsp;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1&amp;nbsp;1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;</description>
    <pubDate>Wed, 03 Dec 2014 17:05:57 GMT</pubDate>
    <dc:creator>wayne loh</dc:creator>
    <dc:date>2014-12-03T17:05:57Z</dc:date>
    <item>
      <title>Cisco 5512-x v9.1 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588089#M202879</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need some help/advise on the configuration below. As I want to configuration port forwarding to separate devices internally to serve external parties. I have only one WAN IP which already assigned to the firewall outside interface...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;External User ----&amp;gt;ASA------&amp;gt;Server, NAS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Pls help i having difficulties to make it working..&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:10:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588089#M202879</guid>
      <dc:creator>wayne loh</dc:creator>
      <dc:date>2019-03-12T05:10:25Z</dc:date>
    </item>
    <item>
      <title>Hello Wayne, Its something</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588090#M202880</link>
      <description>&lt;P&gt;Hello Wayne,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its something that can be done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use the following configuration&amp;nbsp;as an example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network server&lt;/P&gt;&lt;P&gt;host 192.168.1.1&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) &amp;nbsp;static interface service tcp 80 80&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network NAS&lt;/P&gt;&lt;P&gt;host 192.168.1.10&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) &amp;nbsp;static interface service tcp 443 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you have any doubt or question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Eddy Duran&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2014 16:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588090#M202880</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2014-12-03T16:50:05Z</dc:date>
    </item>
    <item>
      <title>Hi Eddy, Thanks for reply. I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588091#M202881</link>
      <description>&lt;P&gt;Hi Eddy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reply. I tried the above command&amp;nbsp;but it's not working...do i have to add any acl?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;pppoe client vpdn group gcmjp&lt;BR /&gt;&amp;nbsp;ip address pppoe setroute (1.1.1.1)&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;nameif WiFi&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;nameif Phoneline&lt;BR /&gt;&amp;nbsp;security-level 90&lt;BR /&gt;&amp;nbsp;ip address 192.168.4.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa912-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network JP_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network SG_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Synology1&lt;BR /&gt;&amp;nbsp;host 192.168.2.155&lt;BR /&gt;object network Synology2&lt;BR /&gt;&amp;nbsp;host 192.168.2.243&lt;BR /&gt;object network BackupServer&lt;BR /&gt;&amp;nbsp;host 192.168.2.11&lt;BR /&gt;object network JP&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network WiFi&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;BR /&gt;object network NAS5006&lt;BR /&gt;&amp;nbsp;host 192.168.2.155&lt;BR /&gt;object network Server3389&lt;BR /&gt;&amp;nbsp;host 192.168.2.11&lt;BR /&gt;object service RDP3389&lt;BR /&gt;&amp;nbsp;service tcp source eq 3389 destination eq 3389&amp;nbsp;&lt;BR /&gt;object service NAS5003&lt;BR /&gt;&amp;nbsp;service tcp source eq 5003 destination eq 5003&amp;nbsp;&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu WiFi 1500&lt;BR /&gt;mtu Phoneline 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static JP_LAN JP_LAN destination static SG_LAN SG_LAN no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic JP_LAN interface&lt;BR /&gt;nat (WiFi,outside) source dynamic WiFi interface&lt;BR /&gt;!&lt;BR /&gt;object network Synology1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 5003 5003&amp;nbsp;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1&amp;nbsp;1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&amp;nbsp;&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2014 17:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588091#M202881</guid>
      <dc:creator>wayne loh</dc:creator>
      <dc:date>2014-12-03T17:05:57Z</dc:date>
    </item>
    <item>
      <title>Wayne, Correct, you also need</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588092#M202882</link>
      <description>&lt;P&gt;Wayne,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Correct, you also need to create an ACL to permit the inbound traffic from a low to a high security level.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access-list outside_in extended permit tcp any host &amp;lt;Private IP&amp;gt; eq &amp;lt;Port&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using the following NAT&amp;nbsp;as an example:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;object network Synology1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;nat (inside,outside) static interface service tcp 5003 5003&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access-list outside_in extended permit tcp any host&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;192.168.2.155 eq 5003&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Access-group outside_in in int outside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Let me know how it goes.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;-Eddy Duran&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2014 17:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588092#M202882</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2014-12-03T17:30:21Z</dc:date>
    </item>
    <item>
      <title>Hi Eddy, Thanks once again.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588093#M202885</link>
      <description>&lt;P&gt;Hi Eddy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks once again. No luck after i command in...Pls help..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object Synology1 eq 5003&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Synology2 eq 5007&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object BackupServer eq 3389&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object BackupServer eq 6050&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit udp any object BackupServer eq 6050&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Synology2 eq 5005&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Synology2 eq ftp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Synology2 eq 5000&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Synology1 eq 5002&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Synology1 eq 5006&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu WiFi 1500&lt;BR /&gt;mtu Phoneline 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static JP_LAN JP_LAN destination static SG_LAN SG_LAN no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic JP_LAN interface&lt;BR /&gt;nat (WiFi,outside) source dynamic WiFi interface&lt;BR /&gt;!&lt;BR /&gt;object network Synology1&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 5003 5003&amp;nbsp;&lt;BR /&gt;object network Synology2&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 5007 5007&amp;nbsp;&lt;BR /&gt;object network BackupServer&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network BackupServer_6050_tcp&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 6050 6050&amp;nbsp;&lt;BR /&gt;object network Synology2_ftp&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp ftp ftp&amp;nbsp;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;</description>
      <pubDate>Wed, 03 Dec 2014 23:42:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588093#M202885</guid>
      <dc:creator>wayne loh</dc:creator>
      <dc:date>2014-12-03T23:42:54Z</dc:date>
    </item>
    <item>
      <title>Pls anyone can help???</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588094#M202889</link>
      <description>&lt;P&gt;Pls anyone can help???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apreciated!&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 05:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588094#M202889</guid>
      <dc:creator>wayne loh</dc:creator>
      <dc:date>2014-12-04T05:03:22Z</dc:date>
    </item>
    <item>
      <title>Hello Wayne, What are you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588095#M202890</link>
      <description>&lt;P&gt;Hello Wayne,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are you doing for testing the connection?&lt;/P&gt;&lt;P&gt;Can you run the following command?&lt;/P&gt;&lt;P&gt;Packet input outside tcp 4.2.2.2 13254 &amp;lt;Outside IP address&amp;gt; 5003&lt;/P&gt;&lt;P&gt;If you are getting a flow control, captures will be needed in order to determine the problem.&lt;/P&gt;&lt;P&gt;capture out int&amp;nbsp; outside match tcp any host &amp;lt;Outside IP address&amp;gt; eq 5003&lt;/P&gt;&lt;P&gt;cap in int inside match tcp any host 192.168.2.155 eq 5003&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can verify the output by using show cap out and show cap in.&lt;/P&gt;&lt;P&gt;-Eddy Duran&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 14:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-5512-x-v9-1-help/m-p/2588095#M202890</guid>
      <dc:creator>Eddy Duran</dc:creator>
      <dc:date>2014-12-04T14:41:19Z</dc:date>
    </item>
  </channel>
</rss>

