<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Simple Port Forwarding Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451799#M269188</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under &lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to add those ports in the class-map for out to in zone pair.. port 3389 is already present whichis why it is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output generate in the CCP is correct. The port map is already setup. &lt;/P&gt;&lt;P&gt;ZBF is setup on this router, &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Feb 2014 07:24:05 GMT</pubDate>
    <dc:creator>IT infra</dc:creator>
    <dc:date>2014-02-27T07:24:05Z</dc:date>
    <item>
      <title>Simple Port Forwarding Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451797#M269182</link>
      <description>&lt;P&gt;Sorry if this has been asked and answered many times before but I I've been at this for hours and I'm getting nowhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a Cisco 861 router.&amp;nbsp; I've taken over the IT responsibilities from someone else and I'm just trying to forward TCP/UDP ports 5899 and 9010 to our server.&amp;nbsp; I can access the server using Remote Desktop so I can see the previous IT person has gotten that far.&amp;nbsp; Below is the output of our "Running Configuration".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the line "ip port-map user-protocol--4 port tcp 3389"&amp;nbsp; but I can't figure out how to add my own 5899 and 9010 lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using the Cisco Configuration Professional UI but I don't have a problem using the command line interface if I'm sure I have the right commands to input.&amp;nbsp; I started adding an extended rule using the ACL Editor in CCP but I'm afraid to deliver the changes to the router because it doesn't look anything like the "ip port-map user-protocol--4 port tcp 3389" line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the information generated from the ACL editor (again, I haven't delivered it to the router):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended user-protocol--05&lt;BR /&gt;remark Radmin5899&lt;BR /&gt;remark CCP_ACL Category=1&lt;BR /&gt;remark Radmin5899&lt;BR /&gt;permit tcp any host 10.10.10.10 eq 5899&lt;BR /&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think the ACL output is correct because I don't see the public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I create a cusom ip port-map like the ones listed in the "Running Configuration"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kevin G&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Running Configuration:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;Current configuration : 10177 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 09:45:33 PCTime Fri Feb 21 2014 by admin&lt;BR /&gt;!&lt;BR /&gt;version 15.0&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;!&lt;BR /&gt;hostname Summit&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging buffered 51200&lt;BR /&gt;logging console critical&lt;BR /&gt;enable secret 5 $1$q6Ct$Wo7VDTQAbAL7BjYEvSXvJ/&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;memory-size iomem 10&lt;BR /&gt;clock timezone PCTime -5&lt;BR /&gt;clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-1582036946&lt;BR /&gt;enrollment selfsigned&lt;BR /&gt;subject-name cn=IOS-Self-Signed-Certificate-1582036946&lt;BR /&gt;revocation-check none&lt;BR /&gt;rsakeypair TP-self-signed-1582036946&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-1582036946&lt;BR /&gt;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 30820249 308201B2 A0030201 02020101 300D0609 2A864886 F70D0101 04050030 &lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 &lt;BR /&gt;&amp;nbsp; 69666963 6174652D 31353832 30333639 3436301E 170D3933 30333031 30303030 &lt;BR /&gt;&amp;nbsp; 34365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 &lt;BR /&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 35383230 &lt;BR /&gt;&amp;nbsp; 33363934 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 &lt;BR /&gt;&amp;nbsp; 8100A98F 75C0DEE6 FA35B0D2 3F42C711 3E622144 312E5DEC 8A721820 1E25EDCB &lt;BR /&gt;&amp;nbsp; A8F10958 4DE48A8D AF5C0297 92526567 DCCCECC8 165C7A66 9CFF76C1 E8083FE2 &lt;BR /&gt;&amp;nbsp; 807FD489 4A8EEF92 5528F079 F069690E 3F3A269B 4D948A32 E9F556B0 5AE8DC1A &lt;BR /&gt;&amp;nbsp; 9F753D60 58E0A298 1D1045C2 641D5976 E857FAE8 C853CF31 24356154 828F98E2 &lt;BR /&gt;&amp;nbsp; 913D0203 010001A3 71306F30 0F060355 1D130101 FF040530 030101FF 301C0603 &lt;BR /&gt;&amp;nbsp; 551D1104 15301382 1153756D 6D69742E 73706D63 2E6C6F63 616C301F 0603551D &lt;BR /&gt;&amp;nbsp; 23041830 16801436 F9B786F7 EB0AE78E DE16D0D8 EED4E8D5 E4679830 1D060355 &lt;BR /&gt;&amp;nbsp; 1D0E0416 041436F9 B786F7EB 0AE78EDE 16D0D8EE D4E8D5E4 6798300D 06092A86 &lt;BR /&gt;&amp;nbsp; 4886F70D 01010405 00038181 007B2A5E E5180062 70FD14E5 A1B9C29D C20C99D4 &lt;BR /&gt;&amp;nbsp; 5897D077 B4F4250E 6788CF79 4640E214 C112724B 7EB04A9D 0754956E 2D5AF34A &lt;BR /&gt;&amp;nbsp; 0C1D1A6E 86AC0E07 FFFBEC66 B8DA4E35 E05B2AA9 F8FD084C A23A2E21 A92C409E &lt;BR /&gt;&amp;nbsp; 9AA9C45A F2B406BC E123869A 2989FBDD 65E96A95 8D6CB6C9 BAF33F75 19999CB3 &lt;BR /&gt;&amp;nbsp; 4F8613BB 40251384 2D30F8A1 82&lt;BR /&gt;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;no ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip port-map user-protocol--2 port tcp 100&lt;BR /&gt;ip port-map user-protocol--1 port tcp 101&lt;BR /&gt;ip port-map user-protocol--4 port tcp 3389&lt;BR /&gt;ip dhcp excluded-address 10.10.10.1 10.10.10.100&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool spmcpool&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 10.10.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; domain-name spmc.local&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 10.10.10.10 8.8.8.8 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 10.10.10.1 &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip bootp server&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name spmc.local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid CISCO861-K9 sn FTX1446810J&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username admin privilege 15 secret 5 $1$W2UZ$IvcuhFV2mkG0u/RI.XwUN0&lt;BR /&gt;username spmc privilege 15 secret 5 $1$P88u$ZEG5RuEVxxAaTXW3BQ1q3/&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any SDM_BOOTPC&lt;BR /&gt;match access-group name SDM_BOOTPC&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--4-1&lt;BR /&gt;match access-group 102&lt;BR /&gt;match protocol user-protocol--4&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--2-1&lt;BR /&gt;match access-group 104&lt;BR /&gt;match protocol user-protocol--2&lt;BR /&gt;class-map type inspect match-all sdm-nat-http-1&lt;BR /&gt;match access-group 102&lt;BR /&gt;match protocol http&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-2&lt;BR /&gt;match access-group 103&lt;BR /&gt;match protocol user-protocol--1&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-1&lt;BR /&gt;match access-group 102&lt;BR /&gt;class-map type inspect match-any SDM_DHCP_CLIENT_PT&lt;BR /&gt;match class-map SDM_BOOTPC&lt;BR /&gt;class-map type inspect match-all sdm-nat-smtp-1&lt;BR /&gt;match access-group 102&lt;BR /&gt;match protocol smtp&lt;BR /&gt;class-map type inspect match-any sdm-cls-bootps&lt;BR /&gt;match protocol bootps&lt;BR /&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt;match protocol cuseeme&lt;BR /&gt;match protocol dns&lt;BR /&gt;match protocol ftp&lt;BR /&gt;match protocol h323&lt;BR /&gt;match protocol https&lt;BR /&gt;match protocol icmp&lt;BR /&gt;match protocol imap&lt;BR /&gt;match protocol pop3&lt;BR /&gt;match protocol shell&lt;BR /&gt;match protocol realmedia&lt;BR /&gt;match protocol rtsp&lt;BR /&gt;match protocol smtp&lt;BR /&gt;match protocol sql-net&lt;BR /&gt;match protocol streamworks&lt;BR /&gt;match protocol tftp&lt;BR /&gt;match protocol vdolive&lt;BR /&gt;match protocol tcp&lt;BR /&gt;match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt;match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt;match protocol icmp&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt;match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt;match access-group 100&lt;BR /&gt;class-map type inspect match-all sdm-nat-https-1&lt;BR /&gt;match access-group 102&lt;BR /&gt;match protocol https&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt;match protocol http&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt;class type inspect sdm-cls-bootps&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt;class type inspect sdm-nat-http-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class type inspect sdm-nat-smtp-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class type inspect sdm-nat-user-protocol--4-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class type inspect sdm-nat-https-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class type inspect sdm-nat-user-protocol--1-2&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class type inspect sdm-nat-user-protocol--2-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt;class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt;class type inspect SDM_DHCP_CLIENT_PT&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;!&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt;service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt;service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt;service-policy type inspect ccp-permit&lt;BR /&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;BR /&gt;service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;description Internet$FW_OUTSIDE$$ES_WAN$$ETH-WAN$&lt;BR /&gt;ip address 66.x.x.x 255.255.255.248&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip flow ingress&lt;BR /&gt;ip flow egress&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;zone-member security out-zone&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;description LAN$FW_INSIDE$$ES_LAN$$ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$&lt;BR /&gt;ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip flow ingress&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly&lt;BR /&gt;zone-member security in-zone&lt;BR /&gt;ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 66.x.x.x&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;ip flow-top-talkers&lt;BR /&gt;top 20&lt;BR /&gt;sort-by bytes&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 3 interface FastEthernet4 overload&lt;BR /&gt;ip nat inside source static tcp 10.10.10.100 100 66.x.x.x 100 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.101 101 66.x.x.x 101 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.10 25 66.x.x.x 25 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.10 80 66.x.x.x 80 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.10 443 66.x.x.x 443 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.10 3389 66.x.x.x 3389 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.10 5899 66.x.x.x 5899 extendable&lt;BR /&gt;ip nat inside source static tcp 10.10.10.10 9010 66.x.x.x 9010 extendable&lt;BR /&gt;ip nat inside source static udp 10.10.10.10 9010 66.x.x.x 9010 extendable&lt;BR /&gt;ip nat inside source static 10.10.10.10 66.x.x.x&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 FastEthernet4 66.x.x.x&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended SDM_BOOTPC&lt;BR /&gt;remark CCP_ACL Category=0&lt;BR /&gt;permit udp any any eq bootpc&lt;BR /&gt;!&lt;BR /&gt;logging trap debugging&lt;BR /&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 10.10.10.0 0.0.0.255&lt;BR /&gt;access-list 2 remark CCP_ACL Category=2&lt;BR /&gt;access-list 2 permit 10.10.10.0 0.0.0.255&lt;BR /&gt;access-list 3 remark CCP_ACL Category=2&lt;BR /&gt;access-list 3 permit 10.10.10.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 101 remark CCP_ACL Category=16&lt;BR /&gt;access-list 101 permit ip 10.10.10.0 0.0.0.255 any&lt;BR /&gt;access-list 102 remark CCP_ACL Category=0&lt;BR /&gt;access-list 102 permit ip any host 10.10.10.10&lt;BR /&gt;access-list 103 remark CCP_ACL Category=0&lt;BR /&gt;access-list 103 permit ip any host 10.10.10.101&lt;BR /&gt;access-list 104 remark CCP_ACL Category=0&lt;BR /&gt;access-list 104 permit ip any host 10.10.10.100&lt;BR /&gt;no cdp run&lt;/P&gt;&lt;P&gt;snmp-server community agsl RO&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;% Password expiration warning.&lt;BR /&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Configuration Professional (Cisco CP) is installed on this device &lt;BR /&gt;and it provides the default username "cisco" for&amp;nbsp; one-time use. If you have &lt;BR /&gt;already used the username "cisco" to login to the router and your IOS image &lt;BR /&gt;supports the "one-time" user option, then this username has already expired. &lt;BR /&gt;You will not be able to login to the router with this username after you exit &lt;BR /&gt;this session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is strongly suggested that you create a new username with a privilege level &lt;BR /&gt;of 15 using the following command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username &amp;lt;myuser&amp;gt; privilege 15 secret 0 &amp;lt;mypassword&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace &amp;lt;myuser&amp;gt; and &amp;lt;mypassword&amp;gt; with the username and password you &lt;BR /&gt;want to use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;BR /&gt;^C&lt;BR /&gt;banner login ^CAuthorized access only!&lt;BR /&gt;Disconnect IMMEDIATELY if you are not an authorized user!^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;login local&lt;BR /&gt;no modem enable&lt;BR /&gt;transport output telnet&lt;BR /&gt;line aux 0&lt;BR /&gt;login local&lt;BR /&gt;transport output telnet&lt;BR /&gt;line vty 0 4&lt;BR /&gt;privilege level 15&lt;BR /&gt;login local&lt;BR /&gt;transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;scheduler allocate 4000 1000&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451797#M269182</guid>
      <dc:creator>keving9898</dc:creator>
      <dc:date>2019-03-12T03:48:50Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451798#M269185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any takers?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Feb 2014 22:40:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451798#M269185</guid>
      <dc:creator>keving9898</dc:creator>
      <dc:date>2014-02-26T22:40:21Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451799#M269188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under &lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to add those ports in the class-map for out to in zone pair.. port 3389 is already present whichis why it is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output generate in the CCP is correct. The port map is already setup. &lt;/P&gt;&lt;P&gt;ZBF is setup on this router, &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Feb 2014 07:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451799#M269188</guid>
      <dc:creator>IT infra</dc:creator>
      <dc:date>2014-02-27T07:24:05Z</dc:date>
    </item>
    <item>
      <title>Turns out, through some quirk</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451800#M269190</link>
      <description>&lt;P&gt;Turns out, through some quirk of either Java, IE or CCP, the "Port to Application Mappings" page was blank.&amp;nbsp; I added the necessary application protocol and it worked for opening a port I needed open on the server.&amp;nbsp; Even with the screen blank I could click on the blank area in different spots and the "Edit..." button would become available.&amp;nbsp; For whatever reason, whenever I go into CCP now, the page is no longer blank.&lt;/P&gt;&lt;P&gt;I'm having a different problem now with opening ports for our camera DVR.&amp;nbsp; I'll start a new thread for that.&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Mar 2014 23:48:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-question/m-p/2451800#M269190</guid>
      <dc:creator>keving9898</dc:creator>
      <dc:date>2014-03-23T23:48:39Z</dc:date>
    </item>
  </channel>
</rss>

