<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I am assuming the you want to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499331#M238012</link>
    <description>&lt;P&gt;I am assuming the you want to allow access from the outside interface to the inside interface (where 1.2.3.4 is the address on the outside interface you want to access 192.168.1.20 from):&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host 192.168.1.20 any eq 11350&lt;/P&gt;&lt;P&gt;object network PC&lt;BR /&gt;&amp;nbsp; host 192.168.1.20&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static 1.2.3.4 service tcp 11350 11350&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jun 2014 13:18:47 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-06-02T13:18:47Z</dc:date>
    <item>
      <title>Allow TCP Port from outside in</title>
      <link>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499330#M238011</link>
      <description>&lt;P&gt;Hi all. I have a Cisco 5510 I am learning, but I need some assistance. I have a laptop behind a router behind the ASA5510 that I am trying to allow an application to accept requests on TCP port 11350. I just don't get enough time to bash this stuff into my head (Too many hats). I appreciate the help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.1(4)&lt;BR /&gt;Device Manager Version 7.1(5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone point out the steps to allow Port 11350 access to a specific IP? That LAPTOP is IP 192.168.1.20 Subnet 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is my existing config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5510# show running-config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5510&lt;BR /&gt;domain-name maladomini.int&lt;BR /&gt;enable password REDACTED encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd REDACTED encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description LAN Interface&lt;BR /&gt;&amp;nbsp;nameif Inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.1.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;description WAN Interface&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 199.195.XXX.XXX 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;description DMZ&lt;BR /&gt;&amp;nbsp;nameif DMZ&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.0.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;description VOIP&lt;BR /&gt;&amp;nbsp;nameif VOIP&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.2.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa914-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup Inside&lt;BR /&gt;dns domain-lookup Outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 199.195.XXX.X&lt;BR /&gt;&amp;nbsp;name-server 205.171.2.65&lt;BR /&gt;&amp;nbsp;name-server 205.171.3.65&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;name-server 8.8.4.4&lt;BR /&gt;&amp;nbsp;domain-name maladomini.int&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network ROUTER-2811&lt;BR /&gt;&amp;nbsp;host 10.10.1.2&lt;BR /&gt;object network ROUTER-2821&lt;BR /&gt;&amp;nbsp;host 10.10.0.2&lt;BR /&gt;object network WEBCAM-01&lt;BR /&gt;&amp;nbsp;host 192.168.1.5&lt;BR /&gt;object network DNS-SERVER&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;object network ROUTER-3745&lt;BR /&gt;&amp;nbsp;host 10.10.2.2&lt;BR /&gt;object network RDP-DC1&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;object network BLUE&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;&amp;nbsp;description Blue Iris Server&lt;BR /&gt;object-group network PAT-SOURCE&lt;BR /&gt;&amp;nbsp;network-object 10.10.1.0 255.255.255.252&lt;BR /&gt;&amp;nbsp;network-object 10.10.0.0 255.255.255.252&lt;BR /&gt;&amp;nbsp;network-object 10.10.2.0 255.255.255.252&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 128.162.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 128.162.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 128.162.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 162.128.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 162.128.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 162.128.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 142.16.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 142.16.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 142.16.20.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object host 98.22.xxx.x&lt;BR /&gt;object-group network Outside_access_in&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object gre&lt;BR /&gt;access-list USERS standard permit 10.10.1.0 255.255.255.0&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.x object ROUTER-2811 eq ssh&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.x object ROUTER-2821 eq ssh&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.x interface Outside eq https&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.x object WEBCAM-01 eq www&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.x object RDP-DC1 eq xxxx&lt;BR /&gt;access-list Outside_access_in extended permit tcp host 98.22.xxx.x object BLUE eq xxxx&lt;BR /&gt;access-list dmz-access-vlan1 extended permit ip 128.162.1.0 255.255.255.0 any&lt;BR /&gt;access-list dmz-access remark Permit all traffic to DC1&lt;BR /&gt;access-list dmz-access extended permit ip 128.162.1.0 255.255.255.0 host 192.168.1.2&lt;BR /&gt;access-list dmz-access remark Permit only DNS traffic to DNS server&lt;BR /&gt;access-list dmz-access extended permit udp 128.162.1.0 255.255.255.0 host 192.168.1.2 eq domain&lt;BR /&gt;access-list dmz-access remark Permit ICMP to all devices in DC&lt;BR /&gt;access-list dmz-access extended permit icmp 128.162.1.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu VOIP 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any Outside&lt;BR /&gt;asdm image disk0:/asdm-715.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network ROUTER-2811&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static interface service tcp ssh XXX&lt;BR /&gt;object network ROUTER-2821&lt;BR /&gt;&amp;nbsp;nat (DMZ,Outside) static interface service tcp ssh XXXX&lt;BR /&gt;object network WEBCAM-01&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static interface service tcp www xxxx&lt;BR /&gt;object network ROUTER-3745&lt;BR /&gt;&amp;nbsp;nat (VOIP,Outside) static interface service tcp ssh XXXX&lt;BR /&gt;object network RDP-DC1&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static interface service tcp xxxx xxxx&lt;BR /&gt;object network BLUE&lt;BR /&gt;&amp;nbsp;nat (Inside,Outside) static interface service tcp xxxx xxxx&lt;BR /&gt;!&lt;BR /&gt;nat (any,Outside) after-auto source dynamic any interface&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 199.195.XXX.XXX 1&lt;BR /&gt;route DMZ 128.162.1.0 255.255.255.0 10.10.0.2 1&lt;BR /&gt;route DMZ 128.162.10.0 255.255.255.0 10.10.0.2 1&lt;BR /&gt;route DMZ 128.162.20.0 255.255.255.0 10.10.0.2 1&lt;BR /&gt;route VOIP 142.16.1.0 255.255.255.0 10.10.2.2 1&lt;BR /&gt;route VOIP 142.16.10.0 255.255.255.0 10.10.2.2 1&lt;BR /&gt;route VOIP 142.16.20.0 255.255.255.0 10.10.2.2 1&lt;BR /&gt;route Inside 172.16.10.0 255.255.255.0 10.10.1.2 1&lt;BR /&gt;route Inside 172.16.20.0 255.255.255.0 10.10.1.2 1&lt;BR /&gt;route Inside 192.168.1.0 255.255.255.0 10.10.1.2 1&lt;BR /&gt;route Inside 192.168.10.0 255.255.255.0 10.10.1.2 1&lt;BR /&gt;route Inside 192.168.20.0 255.255.255.0 10.10.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 Inside&lt;BR /&gt;http 98.22.xxx.x 255.255.255.255 Outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Inside&lt;BR /&gt;ssh 98.22.xxx.x 255.255.255.255 Outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 24.56.178.140 source Outside prefer&lt;BR /&gt;username REDACTED password vj4PdtfGNFrB.Ksz encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;password encryption aes&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:8b44b8e0616a87bd31026b1c6ec06c41&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499330#M238011</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2019-03-12T04:16:14Z</dc:date>
    </item>
    <item>
      <title>I am assuming the you want to</title>
      <link>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499331#M238012</link>
      <description>&lt;P&gt;I am assuming the you want to allow access from the outside interface to the inside interface (where 1.2.3.4 is the address on the outside interface you want to access 192.168.1.20 from):&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host 192.168.1.20 any eq 11350&lt;/P&gt;&lt;P&gt;object network PC&lt;BR /&gt;&amp;nbsp; host 192.168.1.20&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static 1.2.3.4 service tcp 11350 11350&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2014 13:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499331#M238012</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-02T13:18:47Z</dc:date>
    </item>
    <item>
      <title>Thanks, I did everything</title>
      <link>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499332#M238013</link>
      <description>&lt;P&gt;Thanks, I did everything except use service for the object network! Thanks! Would it be different is I wanted it any to 11350?&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2014 14:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499332#M238013</guid>
      <dc:creator>Mitchell Tuckness</dc:creator>
      <dc:date>2014-06-02T14:21:53Z</dc:date>
    </item>
    <item>
      <title>If you are refering to the</title>
      <link>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499333#M238015</link>
      <description>If you are refering to the second any in the ACL i posted, that is a typo.

--
Please remember to select a correct answer and rate helpful posts</description>
      <pubDate>Mon, 02 Jun 2014 14:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-tcp-port-from-outside-in/m-p/2499333#M238015</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-02T14:42:18Z</dc:date>
    </item>
  </channel>
</rss>

