<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5512 9.2 port forwarding to inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894096#M26737</link>
    <description>&lt;P&gt;ASA Version 9.12(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5512X&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.10.254 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa9-12-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.2.12&lt;BR /&gt;host 192.168.2.12&lt;BR /&gt;description CEMs-DATA Logging host&lt;BR /&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;BR /&gt;!&lt;BR /&gt;access-list Filter-Route standard permit 10.220.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any object obj-192.168.2.12 eq 8888&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;asdm image disk0:/asdm-7122.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;route-map Filter-Route permit 10&lt;BR /&gt;match ip address Filter-Route&lt;BR /&gt;!&lt;BR /&gt;router ospf 1&lt;BR /&gt;network 10.253.20.0 255.255.255.240 area 0&lt;BR /&gt;area 0&lt;BR /&gt;log-adj-changes&lt;BR /&gt;redistribute static subnets route-map Filter-Route&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.253 1&lt;BR /&gt;route inside 192.168.0.0 255.255.240.0 192.168.0.2 1&lt;BR /&gt;!&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 1344&lt;BR /&gt;crypto ipsec ikev1 transform-set L2TP-IKE1-Transform-Set esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set L2TP-IKE1-Transform-Set mode transport&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map L2TP-MAP 10 set ikev1 transform-set L2TP-IKE1-Transform-Set&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 5&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 1 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;no error-recovery disable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect ipsec-pass-thru&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is my configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you, sir.&lt;/P&gt;</description>
    <pubDate>Sat, 20 Jul 2019 13:14:13 GMT</pubDate>
    <dc:creator>lucifur</dc:creator>
    <dc:date>2019-07-20T13:14:13Z</dc:date>
    <item>
      <title>ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894072#M26698</link>
      <description>&lt;P&gt;how to I configuring the firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;public client ---&amp;gt; ASA5512 ---&amp;gt; c3750x ---&amp;gt; c2960s ---&amp;gt; host (192.168.2.12 tcp 8888)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;detail&lt;BR /&gt;ASA5512&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;outside : 10.10.10.254&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;inside : 192.168.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;c3750x&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;g0/0 : 192.168.0.2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;g0/1 : 192.168.2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;c2960s&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; g0/0 : 192.168.2.254&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;app host 192.168.2.12 tcp 8888&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to connect to the inside host 192.168.2.12 on tcp port 8888 from public client.&lt;/P&gt;&lt;P&gt;I tried to configuring ASA5512 port forwarding to the internal host but can not succeed.&lt;/P&gt;&lt;P&gt;please help me with the correct configuration, how can I did it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;kind regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mano&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 11:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894072#M26698</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-20T11:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894073#M26716</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;How did you configure the ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is an example, this would nat the traffic from the outside interface (you may need to change the the interface names inside/outside to match your names):-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;object network SERVER&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.2.12&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 8888 8888&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Amend your existing access-list, e.g:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list OUTSIDE_IN extended permit tcp any host 192.168.2.12 eq 8888&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group OUTSIDE_IN in interface outside&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this does not work please provide your ASA configuration AND provide the output of the command "show nat".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 11:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894073#M26716</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-20T11:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894096#M26737</link>
      <description>&lt;P&gt;ASA Version 9.12(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5512X&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.10.254 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa9-12-2-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.2.12&lt;BR /&gt;host 192.168.2.12&lt;BR /&gt;description CEMs-DATA Logging host&lt;BR /&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;BR /&gt;!&lt;BR /&gt;access-list Filter-Route standard permit 10.220.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any object obj-192.168.2.12 eq 8888&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;asdm image disk0:/asdm-7122.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;route-map Filter-Route permit 10&lt;BR /&gt;match ip address Filter-Route&lt;BR /&gt;!&lt;BR /&gt;router ospf 1&lt;BR /&gt;network 10.253.20.0 255.255.255.240 area 0&lt;BR /&gt;area 0&lt;BR /&gt;log-adj-changes&lt;BR /&gt;redistribute static subnets route-map Filter-Route&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.253 1&lt;BR /&gt;route inside 192.168.0.0 255.255.240.0 192.168.0.2 1&lt;BR /&gt;!&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 1344&lt;BR /&gt;crypto ipsec ikev1 transform-set L2TP-IKE1-Transform-Set esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set L2TP-IKE1-Transform-Set mode transport&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map L2TP-MAP 10 set ikev1 transform-set L2TP-IKE1-Transform-Set&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 5&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 1 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;no error-recovery disable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect ipsec-pass-thru&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is my configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you, sir.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 13:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894096#M26737</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-20T13:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894102#M26754</link>
      <description>&lt;P&gt;You didn't provide the output of "show nat" but I assume the traffic is actually hitting your existing nat rule "nat (inside,outside) source dynamic any interface"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remove that rule using "&lt;EM&gt;no nat (inside,outside) source dynamic any interface&lt;/EM&gt;" and then re-add using the command "&lt;EM&gt;nat (inside,outside) &lt;STRONG&gt;after-auto&lt;/STRONG&gt; source dynamic any interface&lt;/EM&gt;".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The difference between the different syntax being after-auto. This will move the dynamic rule to the bottom of the nat rules and will allow your static nat rule to be processed first.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 13:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894102#M26754</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-20T13:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894137#M26776</link>
      <description>&lt;P&gt;Thank you for you're responded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;after I edited a configuration look like below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;ASA Version 9.12(2) &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;interface GigabitEthernet0/0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;nameif outside&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;security-level 0&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;ip address 118.174.147.254 255.255.255.252 &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;interface GigabitEthernet0/1&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;nameif inside&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;security-level 100&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;ip address 192.168.0.1 255.255.255.0&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;object network obj-192.168.2.12&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;host 192.168.2.12&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;description CEMs-DATA Logging host&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;access-list outside_access_in extended permit tcp any object obj-192.168.2.12 eq 8888&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;access-list Filter-Route standard permit 10.220.1.0 255.255.255.0 &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;...&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;access-group outside_access_in in interface outside&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;..&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;..&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;route-map Filter-Route permit 10&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#99CCFF"&gt;&lt;EM&gt;match ip address Filter-Route&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;+++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA5512X# &lt;FONT color="#0000FF"&gt;sh nat&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Manual NAT Policies (Section 1)&lt;/FONT&gt;&lt;BR /&gt;1 (inside) to (VPN-2) source static inside-obj iEngineer destination static Depo Depo&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2 (inside) to (VPN-5) source static inside-obj iEngineer destination static Depo Depo&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;3 (outside) to (VPN-2) source static L2TP-Subnet iEngineer destination static Depo Depo no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;4 (outside) to (VPN-5) source static L2TP-Subnet iEngineer destination static Depo Depo no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;5 (inside) to (outside) source static Enginer-Server Enginer-Server&lt;BR /&gt;translate_hits = 5, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;6 (outside) to (inside) source static L2TP-Subnet L2TP-Subnet destination static inside-obj-1 inside-obj-1 no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;7 (inside) to (outside) source static Energy-Minitry Energy-Minitry&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;8 (inside) to (outside) source dynamic inside-obj interface&lt;BR /&gt;translate_hits = 351, untranslate_hits = 27&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Auto NAT Policies (Section 2)&lt;/FONT&gt;&lt;BR /&gt;1 (inside) to (outside) source static obj-192.168.2.12 interface service tcp 8888 8888&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Manual NAT Policies (Section 3)&lt;/FONT&gt;&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 15:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894137#M26776</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-20T15:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894308#M26790</link>
      <description>You didn't provide the full configuration initially, as there appears to be other nat rules. Remove this nat rule:-&lt;BR /&gt;&lt;BR /&gt;8 (inside) to (outside) source dynamic inside-obj interface&lt;BR /&gt;translate_hits = 351, untranslate_hits = 27&lt;BR /&gt;&lt;BR /&gt;and re-add with after-auto to move to NAT Section 3 as you did previously.</description>
      <pubDate>Sun, 21 Jul 2019 09:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3894308#M26790</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-21T09:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897202#M26806</link>
      <description>&lt;P&gt;I tried to reconfig again but no luck&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA5512X&lt;BR /&gt;names&lt;BR /&gt;ip local pool L2TP-Pool 192.168.12.1-192.168.12.10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.10.254 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;nameif VPN5&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.253.20.14 255.255.255.252&lt;BR /&gt;ospf cost 20&lt;BR /&gt;ospf authentication null&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;nameif VPN3&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.253.20.10 255.255.255.252&lt;BR /&gt;ospf cost 10&lt;BR /&gt;ospf authentication null&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa912-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;!&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;object network CEMs-DATA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;host 192.168.2.12&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;description CEMs-DATA Logging host&lt;/FONT&gt;&lt;BR /&gt;!&lt;BR /&gt;object network inside-obj&lt;BR /&gt;subnet 192.168.0.0 255.255.240.0&lt;BR /&gt;!&lt;BR /&gt;object network ENG-MAX&lt;BR /&gt;subnet 10.232.217.128 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;object network inside-Maximo&lt;BR /&gt;subnet 10.220.1.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network PPTP-Server&lt;BR /&gt;host 192.168.2.5&lt;BR /&gt;!&lt;BR /&gt;object network L2TP-Subnet&lt;BR /&gt;subnet 192.168.12.0 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;object network inside-obj-1&lt;BR /&gt;subnet 192.168.0.0 255.255.128.0&lt;BR /&gt;!&lt;BR /&gt;object network Energy&lt;BR /&gt;host 192.168.11.2&lt;BR /&gt;!&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;object-group service CEMs-Port tcp&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;port-object eq 888&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;port-object eq 8888&lt;/FONT&gt;&lt;BR /&gt;!&lt;BR /&gt;access-list Filter-Route standard permit 10.220.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object PPTP-Server eq ssh&lt;BR /&gt;access-list outside_access_in extended permit udp any4 object PPTP-Server eq isakmp&lt;BR /&gt;access-list outside_access_in extended permit udp any4 object PPTP-Server eq 4500&lt;BR /&gt;access-list outside_access_in extended permit esp any4 object PPTP-Server&lt;BR /&gt;access-list outside_access_in extended permit ah any4 object PPTP-Server&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object Energy eq 8000&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;access-list outside_access_in extended permit tcp any4 object-group CEMs-Port object CEMs-DATA object-group CEMs-Port&lt;/FONT&gt;&lt;BR /&gt;access-list Split-Tunnel-ACL standard permit 192.168.100.0 255.255.255.0&lt;BR /&gt;access-list Split-Tunnel-ACL standard permit 192.168.20.0 255.255.255.0&lt;BR /&gt;access-list Split-Tunnel-ACL standard permit 10.232.217.128 255.255.255.224&lt;BR /&gt;access-list Split-Tunnel-ACL standard permit 192.168.0.0 255.255.240.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu VPN5 1500&lt;BR /&gt;mtu VPN3 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any VPN5&lt;BR /&gt;icmp permit any VPN3&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;nat (inside,VPN3) source static inside-obj IN-MAXdestination static ENG-MAX ENG-MAX&lt;BR /&gt;nat (inside,VPN5) source static inside-obj IN-MAXdestination static ENG-MAX ENG-MAX&lt;BR /&gt;nat (outside,VPN3) source static L2TP-Subnet IN-MAXdestination static ENG-MAX ENG-MAX no-proxy-arp&lt;BR /&gt;nat (outside,VPN5) source static L2TP-Subnet IN-MAXdestination static ENG-MAX ENG-MAX no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static PPTP-Server PPTP-Server&lt;BR /&gt;nat (outside,inside) source static L2TP-Subnet L2TP-Subnet destination static inside-obj-1 inside-obj-1 no-proxy-arp&lt;BR /&gt;nat (inside,outside) source static Energy Energy&lt;BR /&gt;!&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;object network CEMs-DATA&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;/FONT&gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;FONT color="#333399"&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/FONT&gt;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;route-map Filter-Route permit 10&lt;BR /&gt;match ip address Filter-Route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;router ospf 1&lt;BR /&gt;network 10.253.20.0 255.255.255.240 area 0&lt;BR /&gt;area 0&lt;BR /&gt;log-adj-changes&lt;BR /&gt;redistribute static subnets route-map Filter-Route&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.253 1&lt;BR /&gt;route inside 10.220.1.0 255.255.255.0 192.168.0.2 1&lt;BR /&gt;route inside 192.168.0.0 255.255.240.0 192.168.0.2 1&lt;BR /&gt;route inside 192.168.20.0 255.255.255.0 192.168.0.2 1&lt;BR /&gt;route inside 192.168.100.0 255.255.255.0 192.168.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;sysopt connection tcpmss 1344&lt;BR /&gt;crypto ipsec ikev1 transform-set L2TP-IKE1-Transform-Set esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set L2TP-IKE1-Transform-Set mode transport&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map L2TP-MAP 10 set ikev1 transform-set L2TP-IKE1-Transform-Set&lt;BR /&gt;crypto map L2TP-VPN-MAP 20 ipsec-isakmp dynamic L2TP-MAP&lt;BR /&gt;crypto map L2TP-VPN-MAP interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 5&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet 192.168.0.0 255.255.240.0 inside&lt;BR /&gt;telnet 192.168.12.0 255.255.255.0 inside&lt;BR /&gt;telnet 10.232.217.151 255.255.255.255 VPN3&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 223.25.216.40 255.255.255.248 outside&lt;BR /&gt;ssh 14.207.128.231 255.255.255.255 outside&lt;BR /&gt;ssh 112.142.0.0 255.255.0.0 outside&lt;BR /&gt;ssh 223.25.203.113 255.255.255.255 outside&lt;BR /&gt;ssh 192.168.0.0 255.255.240.0 inside&lt;BR /&gt;ssh 192.168.12.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;group-policy temp01 internal&lt;BR /&gt;group-policy temp01 attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-clientless&lt;BR /&gt;webvpn&lt;BR /&gt;url-list none&lt;BR /&gt;group-policy L2TP-Policy internal&lt;BR /&gt;group-policy L2TP-Policy attributes&lt;BR /&gt;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Split-Tunnel-ACL&lt;BR /&gt;intercept-dhcp enable&lt;BR /&gt;!&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;address-pool L2TP-Pool&lt;BR /&gt;default-group-policy L2TP-Policy&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key ****&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt;authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect ipsec-pass-thru&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:***&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\Users\engineer&amp;gt;telnet 10.10.10.254 8888&lt;BR /&gt;Connecting To 10.10.10.254...Could not open connection to the host, on port 8888: Connect failed&lt;/P&gt;&lt;P&gt;+++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;ASA5512X# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (InterLink-VPN3112) source static inside-obj IN-MAX destination static ENG-MAX ENG-MAX&lt;BR /&gt;translate_hits = 162, untranslate_hits = 181&lt;BR /&gt;2 (inside) to (True-i52599B) source static inside-obj IN-MAX destination static ENG-MAX ENG-MAX&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (outside) to (InterLink-VPN3112) source static L2TP-Subnet IN-MAX destination static ENG-MAX ENG-MAX no-proxy-arp&lt;BR /&gt;translate_hits = 8, untranslate_hits = 8&lt;BR /&gt;4 (outside) to (True-i52599B) source static L2TP-Subnet IN-MAX destination static ENG-MAX ENG-MAX no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (inside) to (outside) source static PPTP-Server PPTP-Server&lt;BR /&gt;translate_hits = 282, untranslate_hits = 125&lt;BR /&gt;6 (outside) to (inside) source static L2TP-Subnet L2TP-Subnet destination static inside-obj-1 inside-obj-1 no-proxy-arp&lt;BR /&gt;translate_hits = 450, untranslate_hits = 603&lt;BR /&gt;7 (inside) to (outside) source static Energy Energy&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Auto NAT Policies (Section 2)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;1 (inside) to (outside) source static CEMs-DATA interface service tcp 8888 8888 &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;translate_hits = 0, untranslate_hits = 10&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt;translate_hits = 190311, untranslate_hits = 25408&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+++++++++++++&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;no translate hit&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you sir.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 03:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897202#M26806</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-25T03:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897623#M26825</link>
      <description>Run packet-tracer and provide the output for review. E.g:-&lt;BR /&gt;&lt;BR /&gt;packet-tracer input outside tcp 9.9.9.9 1024 &amp;lt;your outside interface ip&amp;gt; 8888</description>
      <pubDate>Thu, 25 Jul 2019 14:11:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897623#M26825</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-25T14:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897663#M26835</link>
      <description>&lt;P&gt;Thank you for your advice.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;ASA5512X#&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;packet-tracer input outside tcp 9.9.9.9 1024 10.10.10.254 8888&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CEMs-DATA&lt;BR /&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 118.174.147.254/8888 to 192.168.2.12/8888&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;+++++++++++++++++&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000FF"&gt;ASA5512X#&lt;/FONT&gt; &lt;FONT color="#FF0000"&gt;packet-tracer input outside tcp 9.9.9.9 1024 10.10.10.254 8888 detial&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CEMs-DATA&lt;BR /&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 10.10.10.254/8888 to 192.168.2.12/8888&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9f7455a0, priority=11, domain=permit, deny=true&lt;BR /&gt;hits=448, user_data=0x5, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;best regards,&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;STRONG&gt;Lucifur&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 15:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897663#M26835</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-25T15:00:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897671#M26838</link>
      <description>Is the source port of the connection going to be 8888 or 888? In which case you'd need to modify the packet-tracer source port of 1024 to 8888 and re-run the test.&lt;BR /&gt;&lt;BR /&gt;If the port is random, you'll need to modify your ACL. E.g:-&lt;BR /&gt;&lt;BR /&gt;"access-list OUTSIDE_IN extended permit tcp any4 object CEMs-DATA object-group CEMs-Port"&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Jul 2019 15:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897671#M26838</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-25T15:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897678#M26843</link>
      <description>&lt;P&gt;&lt;BR /&gt;ASA5512X# &lt;FONT color="#FF0000"&gt;packet-tracer input outside tcp 9.9.9.9 &lt;FONT color="#0000FF"&gt;8888&lt;/FONT&gt; 10.10.10.254 &lt;FONT color="#0000FF"&gt;8888&lt;/FONT&gt; detail&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CEMs-DATA&lt;BR /&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 10.10.10.254/8888 to 192.168.2.12/8888&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group CEMs-Port object CEMs-DATA object-group CEMs-Port&lt;BR /&gt;object-group service CEMs-Port tcp&lt;BR /&gt;port-object eq 888&lt;BR /&gt;port-object eq 8888&lt;BR /&gt;object-group service CEMs-Port tcp&lt;BR /&gt;port-object eq 888&lt;BR /&gt;port-object eq 8888&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9f744390, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=0, user_data=0x7fff9b7f1f00, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=8888, tag=0&lt;BR /&gt;dst ip/id=192.168.2.12, mask=255.255.255.255, port=8888, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9f756d80, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x7fff9f641010, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=10.10.10.254, mask=255.255.255.255, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=inside&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9ec00e40, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=9087, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9f5cffe0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=5598, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fffa0161440, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;hits=22, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network CEMs-DATA&lt;BR /&gt;nat (inside,outside) static interface service tcp 8888 8888&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x7fff9f779610, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x7fff9f772850, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=192.168.2.12, mask=255.255.255.255, port=8888, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=inside&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9ec00e40, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=9089, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fff9f627870, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=5927, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 5945, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 15:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897678#M26843</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-25T15:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897685#M26846</link>
      <description>&lt;P&gt;C:\Users\engineer&amp;gt;telnet 10.10.10.254 8888&lt;BR /&gt;Connecting To 10.10.10.254...Could not open connection to the host, on port 8888: Connect failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;++++++++++++++++&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Auto NAT Policies (Section 2)&lt;/FONT&gt;&lt;BR /&gt;1 (inside) to (outside) source static CEMs-DATA interface service tcp 8888 8888&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;translate_hits = 0&lt;/FONT&gt;, untranslate_hits = 19&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 15:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897685#M26846</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-25T15:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897696#M26850</link>
      <description>You are telnetting to the destination port 8888 but the source port will not be either 8888 or 888, which are the only ports you are permitting to connect to the server on.&lt;BR /&gt;&lt;BR /&gt;The packet-tracer output was "allow" because you specified the source port.&lt;BR /&gt;&lt;BR /&gt;If you want the telnet to work, change the ACL as I provided in a previous response, this will allow traffic from any source port.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 25 Jul 2019 15:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3897696#M26850</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-25T15:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3900814#M26853</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="ss.jpg" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/42237i1A7F753BF10EA81C/image-size/large?v=v2&amp;amp;px=999" role="button" title="ss.jpg" alt="ss.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;one more question sir.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how do I wrote a configuration file: connect from area A, B, C to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;192.168.2.5 eq ssh&lt;BR /&gt;192.168.2.5 eq isakmp&lt;BR /&gt;192.168.2.5 eq 4500&lt;BR /&gt;esp -&amp;gt; 192.168.2.5&lt;BR /&gt;ah -&amp;gt; 192.168.2.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;&lt;P&gt;Lucifur&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 15:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3900814#M26853</guid>
      <dc:creator>lucifur</dc:creator>
      <dc:date>2019-07-31T15:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512 9.2 port forwarding to inside</title>
      <link>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3900841#M26854</link>
      <description>So you want to create setup a NAT on the device 118.174.4.54, which I assume is an ASA? If the ASA has only 1 public IP address and that is assigned to the outside interface, you cannot create a nat entry for isakmp/nat-t etc as those ports are reserved. &lt;BR /&gt;&lt;BR /&gt;You would need another public IP address on the ASA and then you could create the NAT entries. Alternatively you could create a VPN tunnel terminating on the ASA itself.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 31 Jul 2019 16:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512-9-2-port-forwarding-to-inside/m-p/3900841#M26854</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-31T16:09:26Z</dc:date>
    </item>
  </channel>
</rss>

