<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks again for all your in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582367#M225360</link>
    <description>&lt;P&gt;Thanks again for all your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason why port forwarding was not working was because my dynamic nat rule for my inside network was in Section 1. I moved it to section 3 and port forwarding started working.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Nat Order" class="image-style-none media-element file-default" data-file_info="%7B%22fid%22:%221057541%22,%22view_mode%22:%22default%22,%22fields%22:%7B%22format%22:%22default%22,%22field_file_image_alt_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22Nat%20Order%22,%22field_file_image_title_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22Nat%20Order%22,%22field_media_description%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22Nat%20Order%22%7D,%22type%22:%22media%22%7D" src="https://community.cisco.com/legacyfs/online/media/nat_order.png" title="Nat Order" typeof="foaf:Image" /&gt;&lt;/P&gt;&lt;P&gt;Aqueeb&lt;/P&gt;</description>
    <pubDate>Sun, 19 Oct 2014 15:36:12 GMT</pubDate>
    <dc:creator>aqueebqadri</dc:creator>
    <dc:date>2014-10-19T15:36:12Z</dc:date>
    <item>
      <title>UDP Port forward on ASA 5510 9.0 (4) causes "ERROR: NAT unable to reserve ports."</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582359#M225345</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I am trying for forward UDP port 43139 to an IP on the inside, but whenever I do the forward, I get the error "ERROR: NAT unable to reserve ports."&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The commands I enter are as follows:-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network AQUEEB_UTORRENT_UDP_43139&lt;/P&gt;&lt;P&gt;host 10.55.17.2&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service udp 43139 43139&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;As soon as I hit enter on the above nat statement, I get "ERROR: NAT unable to reserve ports." Copy and paste of the way I enter commands is:-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-5510-FW-02(config)# object network AQUEEB_UTORRENT_UDP_43139&lt;BR /&gt;ASA-5510-FW-02(config-network-object)# host 10.55.17.2&lt;BR /&gt;ASA-5510-FW-02(config-network-object)# nat (inside,outside) static interface service udp 43139 43139&lt;BR /&gt;ERROR: NAT unable to reserve ports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My show ver :-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-5510-FW-02(config-network-object)# show ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.0(4)&amp;nbsp;&lt;BR /&gt;Device Manager Version 7.3(1)&lt;/P&gt;&lt;P&gt;Compiled on Wed 04-Dec-13 08:33 by builders&lt;BR /&gt;System image file is "disk0:/asa904-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ASA-5510-FW-02 up 2 days 17 hours&lt;/P&gt;&lt;P&gt;Hardware: &amp;nbsp; ASA5510, 1280 MB RAM, CPU Pentium 4 Celeron 1600 MHz,&lt;BR /&gt;Internal ATA Compact Flash, 256MB&lt;BR /&gt;BIOS Flash AT49LW080 @ 0xfff00000, 1024KB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any help is appreciated. My config below.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-5510-FW-02# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.0(4)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;terminal width 200&lt;BR /&gt;hostname ASA-5510-FW-02&lt;BR /&gt;enable password XXXXXXXXXXXXXX&lt;BR /&gt;passwd XXXXXXXXXXXXXXX encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool 10.55.17.180-199_POOL 10.55.17.180-10.55.17.199 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.55.17.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.16.6 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;banner motd &amp;nbsp;&amp;nbsp;&lt;BR /&gt;banner motd &amp;nbsp;&amp;nbsp;&lt;BR /&gt;banner motd *********************************************************&lt;BR /&gt;banner motd * &amp;nbsp; &amp;nbsp;This system is for authorized personnel ONLY. &amp;nbsp; &amp;nbsp; &amp;nbsp;*&lt;BR /&gt;banner motd * &amp;nbsp; &amp;nbsp; &amp;nbsp; Only specifically authorized personnel &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;*&lt;BR /&gt;banner motd * &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; may log into and use this system. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; *&lt;BR /&gt;banner motd *********************************************************&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;name-server 8.8.4.4&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network vpn_nat&lt;BR /&gt;&amp;nbsp;range 10.55.17.180 10.55.17.199&lt;BR /&gt;object network AQUEEB_UTORRENT_UDP_43139&lt;BR /&gt;&amp;nbsp;host 10.55.17.2&lt;BR /&gt;object-group network HOME-NETWORKS&lt;BR /&gt;&amp;nbsp;description THIS GROUP DEFINES ALL NETWORKS THAT ARE AT HOME&lt;BR /&gt;&amp;nbsp;network-object 10.55.17.0 255.255.255.0&lt;BR /&gt;object-group network DC-NETWORKS&lt;BR /&gt;&amp;nbsp;description THIS GROUP DEFINES ALL NETWORKS THAT I WANT TO ACCESS AT THE DC&lt;BR /&gt;&amp;nbsp;network-object 10.55.151.0 255.255.255.128&lt;BR /&gt;&amp;nbsp;network-object 10.55.151.128 255.255.255.128&lt;BR /&gt;&amp;nbsp;network-object 10.55.24.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.55.12.128 255.255.255.128&lt;BR /&gt;&amp;nbsp;network-object 10.55.12.0 255.255.255.128&lt;BR /&gt;&amp;nbsp;network-object 10.16.32.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.55.10.30 255.255.255.255&lt;BR /&gt;&amp;nbsp;network-object 10.55.10.0 255.255.255.248&lt;BR /&gt;&amp;nbsp;network-object 10.55.16.0 255.255.255.0&lt;BR /&gt;object-group service TCP_54325 tcp&lt;BR /&gt;&amp;nbsp;description THIS DEFINES TCP PORT FOR VNC FORWARDING&lt;BR /&gt;&amp;nbsp;port-object eq 54325&lt;BR /&gt;access-list CRYPTOMAP-ACL-MATCH-FROM-HOME-TO-DC extended permit ip object-group HOME-NETWORKS object-group DC-NETWORKS&amp;nbsp;&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip object-group HOME-NETWORKS object-group DC-NETWORKS&amp;nbsp;&lt;BR /&gt;access-list HOME_WIRED_NETWORK_ACL standard permit 10.55.17.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list HOME_WIRED_NETWORK_ACL standard permit host 10.55.151.140&amp;nbsp;&lt;BR /&gt;access-list HOME_WIRED_NETWORK_ACL standard permit host 192.186.208.231&amp;nbsp;&lt;BR /&gt;access-list outside_in extended permit tcp any host 10.55.17.2 eq 43139 log&amp;nbsp;&lt;BR /&gt;access-list outside_in extended permit udp any host 10.55.17.2 eq 43139 log&amp;nbsp;&lt;BR /&gt;access-list outside_in extended permit tcp any host 10.55.17.2 eq 54325 log&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 65550&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,any) source static HOME-NETWORKS HOME-NETWORKS destination static DC-NETWORKS DC-NETWORKS&lt;BR /&gt;nat (inside,outside) source dynamic HOME-NETWORKS interface description Nat ONLY INSIDE IP's&lt;BR /&gt;nat (inside,outside) source static HOME-NETWORKS HOME-NETWORKS destination static HOME-NETWORKS HOME-NETWORKS no-proxy-arp route-lookup&lt;BR /&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;object network vpn_nat&lt;BR /&gt;&amp;nbsp;nat (outside,outside) dynamic interface&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.16.0 255.255.255.0 management&lt;BR /&gt;http 10.55.17.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&amp;nbsp;&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map CRYPTOMAP-MAP-TO-CREATE-TUNNEL-TO-DC 1 match address CRYPTOMAP-ACL-MATCH-FROM-HOME-TO-DC&lt;BR /&gt;crypto map CRYPTOMAP-MAP-TO-CREATE-TUNNEL-TO-DC 1 set peer PUBLIC_IP&amp;nbsp;&lt;BR /&gt;crypto map CRYPTOMAP-MAP-TO-CREATE-TUNNEL-TO-DC 1 set ikev1 phase1-mode aggressive&amp;nbsp;&lt;BR /&gt;crypto map CRYPTOMAP-MAP-TO-CREATE-TUNNEL-TO-DC 1 set ikev1 transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map CRYPTOMAP-MAP-TO-CREATE-TUNNEL-TO-DC interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=172.16.16.6,CN=ASA-5510-FW-02&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpoint AnyConnect_Trustpoint_CA&lt;BR /&gt;&amp;nbsp;enrollment self&lt;BR /&gt;&amp;nbsp;subject-name CN=ASA_5510_FW02,OU=HOME,C=CA,St=ON,L=MISSISSAUGA,EA=MYEMAIL@gmail.com&lt;BR /&gt;&amp;nbsp;keypair RSA_2048_KeyPairName&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_0&lt;BR /&gt;&amp;nbsp;certificate e52f123e&lt;BR /&gt;&amp;nbsp; &amp;nbsp; DELETED&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain AnyConnect_Trustpoint_CA&lt;BR /&gt;&amp;nbsp;certificate a8abf253&lt;BR /&gt;&amp;nbsp; &amp;nbsp; DELETED&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp identity address&amp;nbsp;&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 am-disable&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.55.17.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcp-client client-id interface outside&lt;BR /&gt;dhcpd option 150 ip 10.55.151.140&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.55.17.200-10.55.17.254 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 206.108.0.131 source outside prefer&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 management&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_0 management vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;anyconnect-essentials&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-3.1.05178-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;group-policy AQUEEB_GROUP_POLICY internal&lt;BR /&gt;group-policy AQUEEB_GROUP_POLICY attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ssl-client&amp;nbsp;&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value HOME_WIRED_NETWORK_ACL&lt;BR /&gt;&amp;nbsp;default-domain none&lt;BR /&gt;&amp;nbsp;address-pools value 10.55.17.180-199_POOL&lt;BR /&gt;username aqueeb password XXXXXXXX encrypted privilege 15&lt;BR /&gt;username aqueeb attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy AQUEEB_GROUP_POLICY&lt;BR /&gt;tunnel-group PUBLIC_IP type ipsec-l2l&lt;BR /&gt;tunnel-group PUBLIC_IP ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;&amp;nbsp;isakmp keepalive threshold 10 retry 3&lt;BR /&gt;tunnel-group AQUEEB_TUNNEL_GROUP type remote-access&lt;BR /&gt;tunnel-group AQUEEB_TUNNEL_GROUP general-attributes&lt;BR /&gt;&amp;nbsp;default-group-policy AQUEEB_GROUP_POLICY&lt;BR /&gt;tunnel-group AQUEEB_TUNNEL_GROUP webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias AQUEEB_TUNNEL_GROUP_ALIAS enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect icmp error&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:6d17588980876334558e568c0dde3ba7&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582359#M225345</guid>
      <dc:creator>aqueebqadri</dc:creator>
      <dc:date>2019-03-12T04:56:30Z</dc:date>
    </item>
    <item>
      <title>Hi,It seems that there is</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582360#M225348</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;It seems that there is already a connection built on this port and that's why the you are not able to port forward this port.&lt;/P&gt;&lt;P&gt;You can check that using:-&lt;/P&gt;&lt;P&gt;show conn port 43139-43140&lt;/P&gt;&lt;P&gt;Also , is there any specific reason why we are forwarding this port ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 02:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582360#M225348</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T02:14:13Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor, Thank you for your</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582361#M225349</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply. You are right, I just checked and there are connections to port 43139. Can you please tell me in which part of my config I have configured port forwarding???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Aqueeb.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 03:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582361#M225349</guid>
      <dc:creator>aqueebqadri</dc:creator>
      <dc:date>2014-10-16T03:17:08Z</dc:date>
    </item>
    <item>
      <title>Hi,You don't have any port</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582362#M225352</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You don't have any port forwarding configured on the ASA device at this moment but this NAT statement might be using this port(43139) on the Interface Ip for traffic going to the internet using the NAT statement:-&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic HOME-NETWORKS interface description Nat ONLY INSIDE IP's&lt;/P&gt;&lt;P&gt;If you check:-&lt;/P&gt;&lt;P&gt;show xlate global &amp;lt;IP Address of Outside interface&amp;gt;&lt;/P&gt;&lt;P&gt;You would see an entry present for this port(43139).&lt;/P&gt;&lt;P&gt;To use the Static PAT , you would have to clear the Xlate first and then apply this NAT.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 04:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582362#M225352</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T04:29:30Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor, Again, you nailed</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582363#M225355</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, you nailed the issue. I am able to enter the NAT statement now, I just have to be a little quick about it. As soon as I do the clear xlate command I need to enter the nat statement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But port forwarding is still not working, attached screenshot.&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/port_forward_fail.png" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Aqueeb.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 10:43:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582363#M225355</guid>
      <dc:creator>aqueebqadri</dc:creator>
      <dc:date>2014-10-16T10:43:58Z</dc:date>
    </item>
    <item>
      <title>Hi,So , you have the rule on</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582364#M225357</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;So , you have the rule on the ASA device that you need to get the traffic working ?&lt;/P&gt;&lt;P&gt;If yes , check the packet tracer if you see the flow as per the requirement.&lt;/P&gt;&lt;P&gt;If yes , move to capturing the real time traffic.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 11:58:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582364#M225357</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-16T11:58:46Z</dc:date>
    </item>
    <item>
      <title>The rule that I have on the</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582365#M225358</link>
      <description>&lt;P&gt;The rule that I have on the ASA device to get the traffic working is the access-list applied to the interface outside. Basically the following two lines.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;access-group outside_in in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;access-list outside_in extended permit udp any host 10.55.17.2 eq 43139 log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I check the packet tracer??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I capture data in real time what do I check for?&lt;/P&gt;&lt;P&gt;Thanks once again!&lt;/P&gt;&lt;P&gt;Aqueeb.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 20:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582365#M225358</guid>
      <dc:creator>aqueebqadri</dc:creator>
      <dc:date>2014-10-16T20:19:41Z</dc:date>
    </item>
    <item>
      <title>Hi,You can try this packet</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582366#M225359</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can try this packet Tracer:-&lt;/P&gt;&lt;P&gt;packet input outside udp &amp;lt;External Source Ip on the internet&amp;gt;&amp;nbsp; 45657 &amp;lt;Outside interface IP&amp;gt; &lt;SPAN style="font-size:14px"&gt;43139 &lt;/SPAN&gt;det&lt;/P&gt;&lt;P&gt;For the captures , you just need to verify that the ASA device is passing the traffic through as this is UDP traffic , we would not be able to find much.&lt;/P&gt;&lt;P&gt;For more information on captures:-&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/document/69281/asa-using-packet-capture-troubleshoot-asa-firewall-configuration-and-scenarios&lt;/P&gt;&lt;P&gt;Let me know if you have any further queries.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2014 10:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582366#M225359</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-17T10:49:15Z</dc:date>
    </item>
    <item>
      <title>Thanks again for all your</title>
      <link>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582367#M225360</link>
      <description>&lt;P&gt;Thanks again for all your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason why port forwarding was not working was because my dynamic nat rule for my inside network was in Section 1. I moved it to section 3 and port forwarding started working.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Nat Order" class="image-style-none media-element file-default" data-file_info="%7B%22fid%22:%221057541%22,%22view_mode%22:%22default%22,%22fields%22:%7B%22format%22:%22default%22,%22field_file_image_alt_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22Nat%20Order%22,%22field_file_image_title_text%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22Nat%20Order%22,%22field_media_description%5Bund%5D%5B0%5D%5Bvalue%5D%22:%22Nat%20Order%22%7D,%22type%22:%22media%22%7D" src="https://community.cisco.com/legacyfs/online/media/nat_order.png" title="Nat Order" typeof="foaf:Image" /&gt;&lt;/P&gt;&lt;P&gt;Aqueeb&lt;/P&gt;</description>
      <pubDate>Sun, 19 Oct 2014 15:36:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/udp-port-forward-on-asa-5510-9-0-4-causes-quot-error-nat-unable/m-p/2582367#M225360</guid>
      <dc:creator>aqueebqadri</dc:creator>
      <dc:date>2014-10-19T15:36:12Z</dc:date>
    </item>
  </channel>
</rss>

