<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Port Forwarding Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005643#M23335</link>
    <description>&lt;P&gt;The ACL-picture does not show the relevant part. Did you use the internal Host as the destination in your ACL? That is what has to be done. And what is the output of packet-tracer? "it fails" is not a problem-description. It could be the wrong order of NAT-statements, but you also don't show them. Hard to help without this information...&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jan 2020 16:26:47 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2020-01-02T16:26:47Z</dc:date>
    <item>
      <title>ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005596#M23332</link>
      <description>&lt;P&gt;Hi, Im looking for a bit of assistance, Im pretty sure im making a silly mistake somewhere.&amp;nbsp; I am trying to allow port 3389 through ASA to a host for RDP.&amp;nbsp; I will eventually tie it down so it can only be accessed from one location.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.8(2)38&lt;/P&gt;&lt;P&gt;ASDM Version 7.8(1)&lt;/P&gt;&lt;P&gt;Screenshots of NAT and ACL rules attached.&amp;nbsp; It is failing the packet tracer on the ASA at the NAT section.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help appreciated.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 15:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005596#M23332</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-02T15:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005598#M23333</link>
      <description />
      <pubDate>Thu, 02 Jan 2020 15:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005598#M23333</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-02T15:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005643#M23335</link>
      <description>&lt;P&gt;The ACL-picture does not show the relevant part. Did you use the internal Host as the destination in your ACL? That is what has to be done. And what is the output of packet-tracer? "it fails" is not a problem-description. It could be the wrong order of NAT-statements, but you also don't show them. Hard to help without this information...&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2020 16:26:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005643#M23335</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-02T16:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005953#M23337</link>
      <description>&lt;P&gt;Sorry about that,&amp;nbsp; Too quick editing screencaps,&amp;nbsp; New ones below, as well as the relevant lines from show run&lt;/P&gt;&lt;P&gt;object service RDP&lt;BR /&gt;service tcp destination eq 3389&lt;BR /&gt;description RDP&lt;BR /&gt;object network RDP_HOST&lt;BR /&gt;host 192.168.50.50&lt;BR /&gt;access-list OUTSIDE_access_in extended permit object RDP any object RDP_HOST&lt;/P&gt;&lt;P&gt;object network RDP_HOST&lt;BR /&gt;nat (INSIDE,OUTSIDE) static interface service tcp 3389 3389&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL1.jpg" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/64361iB9782773E5A11A9A/image-size/small?v=v2&amp;amp;px=200" role="button" title="ACL1.jpg" alt="ACL1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ACL2.jpg" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/64363i42151711DD5B0550/image-size/small?v=v2&amp;amp;px=200" role="button" title="ACL2.jpg" alt="ACL2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT1.jpg" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/64362iFA8A544E14838A1A/image-size/small?v=v2&amp;amp;px=200" role="button" title="NAT1.jpg" alt="NAT1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT2.jpg" style="width: 166px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/64364iA1BFFDD406AD1804/image-size/small?v=v2&amp;amp;px=200" role="button" title="NAT2.jpg" alt="NAT2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Packet trace.jpg" style="width: 200px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/64365iD3E76B6DCAEC9063/image-size/small?v=v2&amp;amp;px=200" role="button" title="Packet trace.jpg" alt="Packet trace.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 10:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005953#M23337</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T10:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005960#M23339</link>
      <description>&lt;P&gt;At least the config looks fine. What is your packet-tracer command? Did you also test real traffic? Perhaps it is working but you only did a mistake in packet-tracer?&lt;/P&gt;
&lt;P&gt;The correct packet-tracer command would be:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input OUTSIDE tcp 1.2.3.4 1234 IP-OF-YOUR-OUTSIDE-INTERFACE 3389&lt;/PRE&gt;</description>
      <pubDate>Fri, 03 Jan 2020 10:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005960#M23339</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-03T10:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005963#M23341</link>
      <description>&lt;P&gt;Hi,&amp;nbsp; thanks for that.&amp;nbsp; I thought I was doing something stupid.&amp;nbsp; I ran the packet tracer through ASDM GUI in the example before.&amp;nbsp; However the example below seems to be different&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input OUTSIDE tcp 192.168.50.50 3389 OUTSIDEINTERFACEIP 3389"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop OUTSIDEINTERFACEIP using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 11:04:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005963#M23341</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T11:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005981#M23344</link>
      <description>&lt;P&gt;Again, your packet-tracer command is wrong. The source MUST be an IP that is located (based on the routing-table) on the outside interface. Because of that I always use 1.2.3.4 as the source.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 12:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005981#M23344</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-03T12:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005986#M23346</link>
      <description>&lt;P&gt;Apologies, and thanks again,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input OUTSIDE tcp 1.2.3.4 1234 OUTSIDEIP 3389"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 12:10:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4005986#M23346</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T12:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006005#M23348</link>
      <description>&lt;P&gt;Again, something goes wrong here as the ASA thinks that the destination is also outside (should be the interface where the host 192.168.50.50 is located) and it does not match a NAT rule. Double-check the OUTSIDEIP in the packet-tracer.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 12:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006005#M23348</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-03T12:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006008#M23350</link>
      <description>Forgive me if I’m mistaken here, should outsideip, not be the public address on the ASA, at least that’s what I took from the original description. If that’s the case, then it is.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;</description>
      <pubDate>Fri, 03 Jan 2020 12:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006008#M23350</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T12:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006028#M23352</link>
      <description>&lt;P&gt;Yes, it has to be the IP of the outside interface of the ASA as that is the IP for which the translation is configured. But the output of the packet-tracer says it is not ...&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 13:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006028#M23352</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-03T13:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006035#M23354</link>
      <description>&lt;P&gt;Hi,&amp;nbsp; Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that case there must be another misconfiguration issue somewhere, as the command was definitely run using the public IP address of the ASA.&amp;nbsp; I have run it again and got the same output, to check.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 13:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006035#M23354</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T13:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006039#M23357</link>
      <description>&lt;P&gt;Result of the command: "packet-tracer input OUTSIDE tcp 1.2.3.4 1234 x.x.x.x 3389"&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop x.x.x.x using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 14:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006039#M23357</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T14:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006062#M23360</link>
      <description>&lt;P&gt;Is your NAT-command still in the config or have you removed it accidentally?&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 14:56:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006062#M23360</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-03T14:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006066#M23363</link>
      <description>&lt;P&gt;It is still there and I can see the XLATE in the table&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result of the command: "show xlate | i 192.168.50.50"&lt;/P&gt;&lt;P&gt;TCP PAT from any:192.168.50.50 3389-3389 to OUTSIDE:217.39.144.61 3389-3389&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 14:59:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006066#M23363</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T14:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006121#M23366</link>
      <description>&lt;P&gt;so the translation seems to be in place. But not in a way that corresponds to your above config. In your nat-statement you have&lt;/P&gt;
&lt;PRE&gt;nat (INSIDE,OUTSIDE) ...&lt;/PRE&gt;
&lt;P&gt;and the XLATE should read&lt;/P&gt;
&lt;PRE&gt;TCP PAT from &lt;STRONG&gt;INSIDE&lt;/STRONG&gt;:192.168.50.50 3389-3389 to OUTSIDE:217.39.144.61 3389-3389&lt;/PRE&gt;
&lt;P&gt;And the packet-tracer should list the UN-NAT in Phase 2 (an example from my ASA):&lt;/P&gt;
&lt;PRE&gt;Phase: 2
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
object network WIN-SERVER
 nat (inside,outside) static interface service tcp 3389 3389
Additional Information:
NAT divert to egress interface inside
Untranslate 192.0.2.100/3389 to 10.1.1.21/3389&lt;/PRE&gt;
&lt;P&gt;In this working scenario, my NAT-statement, XLATE, and packet-tracer-command are the following. Compare that to your config and testing:&lt;/P&gt;
&lt;PRE&gt;object network WIN-SERVER
 host 10.1.1.21
object network WIN-SERVER
 nat (inside,outside) static interface service tcp 3389 3389
&lt;/PRE&gt;
&lt;PRE&gt;TCP PAT from inside:10.1.1.21 3389-3389 to outside:192.0.2.100 3389-3389&lt;/PRE&gt;
&lt;PRE&gt;packet-tracer input outside tcp 1.2.3.4 1234 192.0.2.100 3389&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 16:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006121#M23366</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-01-03T16:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Port Forwarding Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006188#M23369</link>
      <description>&lt;P&gt;TCP PAT from INSIDE:192.168.50.50 3389-3389 to OUTSIDE:X.X.X.X 3389-3389&lt;/P&gt;&lt;P&gt;is now how the XLATE presents,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, when running the packet trace, still no change, and no UN-NAT at phase 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop X.X.X.X using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current relevant config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object service RDP&lt;BR /&gt;service tcp destination eq 3389&lt;BR /&gt;description RDP&lt;BR /&gt;object network RDP_HOST&lt;BR /&gt;host 192.168.50.50&lt;BR /&gt;!&lt;BR /&gt;object network RDP_HOST&lt;BR /&gt;nat (INSIDE,OUTSIDE) static interface service tcp 3389 3389&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2020 18:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-forwarding-issue/m-p/4006188#M23369</guid>
      <dc:creator>robert3kennedy</dc:creator>
      <dc:date>2020-01-03T18:35:19Z</dc:date>
    </item>
  </channel>
</rss>

