<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Assuming your interfaces are in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483706#M267526</link>
    <description>Assuming your interfaces are named inside and outside and your public ip is 1.2.3.4 it would be

static (inside,outside)  tcp 1.2.3.4 443 10.0.0.10 443 netmask 255.255.255.255


Then permit tcp any host 1.2.3.4 eq 443 on your outside access list.</description>
    <pubDate>Thu, 17 Apr 2014 21:49:50 GMT</pubDate>
    <dc:creator>jj27</dc:creator>
    <dc:date>2014-04-17T21:49:50Z</dc:date>
    <item>
      <title>Cisco ASA Port Foward Question</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483701#M267515</link>
      <description>&lt;P&gt;My client has 1 public IP. They already have a port forward for HTTPS for Exchange. They also want to allow access to another HTTPS website on a different server. My question is ...is it possible to have 2 internal websites on different servers 10.0.0.9 and 10.0.0.10 (HTTPS) with one Public IP? How would I write that ACL??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:04:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483701#M267515</guid>
      <dc:creator>nickbarber</dc:creator>
      <dc:date>2019-03-12T04:04:52Z</dc:date>
    </item>
    <item>
      <title>You can only port-forward</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483702#M267516</link>
      <description>&lt;P&gt;You can only port-forward external port 443 to one internal IP address. &amp;nbsp;You could use a different external port, say 4443 and direct it towards your second server at port 443, but that would require end-user education to include the port in their URL.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 17:36:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483702#M267516</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-04-15T17:36:36Z</dc:date>
    </item>
    <item>
      <title>So I now have a second public</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483703#M267517</link>
      <description>&lt;P&gt;So I now have a second public IP that I can use for the other webserver. How do I add that to the ASA config? I have never done that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2014 21:35:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483703#M267517</guid>
      <dc:creator>nickbarber</dc:creator>
      <dc:date>2014-04-17T21:35:09Z</dc:date>
    </item>
    <item>
      <title>What version of code is your</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483704#M267522</link>
      <description>What version of code is your ASA running?</description>
      <pubDate>Thu, 17 Apr 2014 21:41:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483704#M267522</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-04-17T21:41:52Z</dc:date>
    </item>
    <item>
      <title>8.2 (5)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483705#M267524</link>
      <description>&lt;P&gt;8.2 (5)&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2014 21:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483705#M267524</guid>
      <dc:creator>nickbarber</dc:creator>
      <dc:date>2014-04-17T21:42:53Z</dc:date>
    </item>
    <item>
      <title>Assuming your interfaces are</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483706#M267526</link>
      <description>Assuming your interfaces are named inside and outside and your public ip is 1.2.3.4 it would be

static (inside,outside)  tcp 1.2.3.4 443 10.0.0.10 443 netmask 255.255.255.255


Then permit tcp any host 1.2.3.4 eq 443 on your outside access list.</description>
      <pubDate>Thu, 17 Apr 2014 21:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-port-foward-question/m-p/2483706#M267526</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-04-17T21:49:50Z</dc:date>
    </item>
  </channel>
</rss>

