<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot port forward 80 443 (ASA 5510 V8) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427481#M269336</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Boian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will never be able to connect to the NATed/PATed (ie: Public IP) from the Inside network of the ASA.&amp;nbsp; This is just how the ASA is designed.&amp;nbsp; If your client is located off the internal interface, then you need to connect to the Real IP of the server.&amp;nbsp; If you want to test your configuration, you must test from a device located on the Outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the syslogs, if an interface ACL was blocking the packet (even the implicit deny at the bottom), you would see syslog messages 106023 or 106100.&amp;nbsp; Syslog 710003 has a different meaning/purpose.&amp;nbsp; It is specific to access attempts to services hosted by the ASA - which essentially tells me your NAT rule is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Feb 2014 16:52:19 GMT</pubDate>
    <dc:creator>David White</dc:creator>
    <dc:date>2014-02-19T16:52:19Z</dc:date>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427471#M269326</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;an internal (inside) server has to be accessible from outside. Following the descriptions here &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;a static nat with PAT for tcp 80+443 as well as appropriate ACLs were created.&lt;/P&gt;&lt;P&gt;Not working.&lt;/P&gt;&lt;P&gt;Checked with packet trace both incoming and outgoing directions:&lt;/P&gt;&lt;P&gt;Without a problem. (ACL allowed, the right NAT translations)&lt;/P&gt;&lt;P&gt;Changed ASDM to port 8080 (was never allowed on outside anyways)&lt;/P&gt;&lt;P&gt;Changed webvpn to port 4433 (was never activated anyways):&lt;/P&gt;&lt;P&gt;Still not working.&lt;/P&gt;&lt;P&gt;Checked the server's firewall as well: the scopes are for "any" Internally accessible on both ports.&lt;/P&gt;&lt;P&gt;Disabled the server's firewall.&lt;/P&gt;&lt;P&gt;No avail.&lt;/P&gt;&lt;P&gt;What could I be missing?&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427471#M269326</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2019-03-12T03:47:29Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427472#M269327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could we see the configurations, the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command used and the output of that/those commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 12:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427472#M269327</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-19T12:19:33Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427473#M269328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi and thanks for the fast reply.&lt;/P&gt;&lt;P&gt;The packet-tracer wasn't having any problems as I configured the nat as "&lt;SPAN style="font-size: 10pt;"&gt;static (inside,outside)" pointing to an additional public IP address. Since there were more services (such as SMTP) connected to outside servers the company told me to nat over the primary public IP that is assigned to the outside interface. The result is even worse, since now the ACL implicit deny is stopping me. I added an explicit deny with log just to get to the desription, but still don't get it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;OK I swapped the external IP for X.X.X.X, truncated sensitive info with [trunc] and send here the console output and the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input outside tcp 8.8.8.8 1056 X.X.X.X 443 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) outside-interface PROBLEM_SERVER netmask 255.255.255.255 norandomseq &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside host PROBLEM_SERVER outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to outside-interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2166, untranslate_hits = 1361&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate outside-interface/0 to PROBLEM_SERVER/0 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; outside-interface 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd5120ed0, priority=0, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3335, user_data=0x9, cs_id=0x0, flags=0x1000, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh access-list | i 0xd5120ed0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA# sh access-list OUTSIDE_IN&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN; 4 elements&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 1 remark allow echo requests&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 2 extended permit icmp any host outside-interface echo log informational interval 300 (hitcnt=0) 0x3d8de1bc &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 3 remark allow web to internal server&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 4 extended permit tcp any host outside-interface eq www (hitcnt=0) 0x3fce57d6 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 5 remark allow https to internal server&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 6 extended permit tcp any host outside-interface eq https (hitcnt=0) 0xf5acf247 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 7 remark default deny with log&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 8 extended deny ip any any log informational interval 300 (hitcnt=2) 0x2dc51227 &lt;/P&gt;&lt;P&gt;ASA# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;########################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;domain-name [trunc]&lt;/P&gt;&lt;P&gt;enable password [trunc] encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.34.0 farm-lan&lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;name 172.16.1.254 asa-mgmgt-interface description Management Interface&lt;/P&gt;&lt;P&gt;name [X.X.X.X] outside-interface description public IP address&lt;/P&gt;&lt;P&gt;name 10.0.1.0 testo-lan&lt;/P&gt;&lt;P&gt;name 192.168.0.0 inside-lan&lt;/P&gt;&lt;P&gt;name 10.0.0.0 labs-lan&lt;/P&gt;&lt;P&gt;name 192.168.52.0 guest-lan&lt;/P&gt;&lt;P&gt;name 172.16.1.0 admin-lan&lt;/P&gt;&lt;P&gt;name 10.0.1.254 ASA-testo-GW&lt;/P&gt;&lt;P&gt;name 10.0.1.10 testo-base&lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;name 192.168.0.2 PROBLEM_SERVER&lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;name 10.0.0.254 ASA-labs-GW&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description network for guests&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.52.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description internal VLAN trunk&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.3&lt;/P&gt;&lt;P&gt; description labs-lan&lt;/P&gt;&lt;P&gt; vlan 3&lt;/P&gt;&lt;P&gt; nameif labs&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address ASA-labs-GW 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.4&lt;/P&gt;&lt;P&gt; description testo-lan&lt;/P&gt;&lt;P&gt; vlan 4&lt;/P&gt;&lt;P&gt; nameif testo&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address ASA-testo-GW 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.7&lt;/P&gt;&lt;P&gt; description inside-lan&lt;/P&gt;&lt;P&gt; vlan 7&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description WAN&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address outside-interface 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address asa-mgmgt-interface 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd [trunc] encrypted&lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name [trunc]&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 993&lt;/P&gt;&lt;P&gt; port-object eq imap4&lt;/P&gt;&lt;P&gt; port-object eq 5223&lt;/P&gt;&lt;P&gt; port-object eq 587&lt;/P&gt;&lt;P&gt;object-group network ASA-LAN-interface&lt;/P&gt;&lt;P&gt; description inside interface from router&lt;/P&gt;&lt;P&gt; network-object host 192.168.0.254&lt;/P&gt;&lt;P&gt;object-group network Private-IP-Range&lt;/P&gt;&lt;P&gt; description RFC 1918&lt;/P&gt;&lt;P&gt; network-object labs-lan 255.0.0.0&lt;/P&gt;&lt;P&gt; network-object 172.16.0.0 255.240.0.0&lt;/P&gt;&lt;P&gt; network-object inside-lan 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group network admin-stations&lt;/P&gt;&lt;P&gt; [trunc]&lt;/P&gt;&lt;P&gt;object-group network Servers&lt;/P&gt;&lt;P&gt; network-object host PROBLEM_SERVER&lt;/P&gt;&lt;P&gt;object-group service imapssl tcp&lt;/P&gt;&lt;P&gt; description encrypted imap&lt;/P&gt;&lt;P&gt; port-object eq 993&lt;/P&gt;&lt;P&gt;object-group service authsmtp tcp&lt;/P&gt;&lt;P&gt; description iCloud authenticated SMTP&lt;/P&gt;&lt;P&gt; port-object eq 587&lt;/P&gt;&lt;P&gt;object-group service iclouddav tcp&lt;/P&gt;&lt;P&gt; description iCloud DAV sync for calender etc&lt;/P&gt;&lt;P&gt; port-object eq 5223&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark permits ip access to ASA LAN interface&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit ip inside-lan 255.255.255.0 object-group ASA-LAN-interface log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark permit snmp access from LAN to ASA&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit udp inside-lan 255.255.255.0 object-group ASA-LAN-interface eq snmp log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark permits ping access to ASA LAN interface&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit icmp inside-lan 255.255.255.0 object-group ASA-LAN-interface echo log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark allow network testing for all&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit icmp inside-lan 255.255.255.0 any log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark testing workstations&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit ip object-group admin-stations any log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark DNS lookup&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit object-group TCPUDP object-group Servers any eq domain log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark time sync with outside world&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit udp host PROBLEM_SERVER any eq ntp log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark allow PROBLEM_SERVER SMTP outside&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit tcp host PROBLEM_SERVER any eq smtp log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark allow PROBLEM_SERVER any traffic testing&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit tcp host PROBLEM_SERVER any &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark permits web access&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended permit tcp inside-lan 255.255.255.0 any object-group DM_INLINE_TCP_1 log disable &lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT remark default deny with log&lt;/P&gt;&lt;P&gt;access-list INSIDE_OUT extended deny ip any any log &lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN remark allow echo requests&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit icmp any host outside-interface echo log &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN remark allow web to internal server&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any host outside-interface eq www &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN remark allow https to internal server&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended permit tcp any host outside-interface eq https&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN remark default deny with log&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN extended deny ip any any log informational interval 300&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging host inside [trunc]&lt;/P&gt;&lt;P&gt;logging debug-trace&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu labs 1500&lt;/P&gt;&lt;P&gt;mtu testo 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN_IP_Pool 192.168.0.210-192.168.0.220 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-602.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 [trunc] netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (guest) 2 guest-lan 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 inside-lan 255.255.255.0&lt;/P&gt;&lt;P&gt;static (labs,inside) labs-lan labs-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;static (testo,inside) testo-lan testo-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;static (inside,outside) outside-interface PROBLEM_SERVER netmask 255.255.255.255 norandomseq &lt;/P&gt;&lt;P&gt;static (inside,testo) inside-lan inside-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;static (inside,labs) inside-lan inside-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;access-group INSIDE_OUT in interface inside&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_IN in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 [trunc] 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable 8080&lt;/P&gt;&lt;P&gt;http admin-lan 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http inside-lan 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;snmp-server host inside excalibur community public&lt;/P&gt;&lt;P&gt;snmp-server location Germany&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;snmp-server contact &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:admin@febit.de"&gt;admin@febit.de&lt;/A&gt;&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet admin-lan 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh inside-lan 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh admin-lan 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 15&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access management&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.52.10-192.168.52.30 guest&lt;/P&gt;&lt;P&gt;dhcpd dns [trunc] interface guest&lt;/P&gt;&lt;P&gt;dhcpd lease 14400 interface guest&lt;/P&gt;&lt;P&gt;dhcpd enable guest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map internal_routing_map&lt;/P&gt;&lt;P&gt; description disables SYN randomization for internal routes&lt;/P&gt;&lt;P&gt; match access-list internal_routing_acl&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 4096&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;policy-map internal_routing_policy&lt;/P&gt;&lt;P&gt; class internal_routing_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection random-sequence-number disable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy internal_routing_policy interface inside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; port 4433&lt;/P&gt;&lt;P&gt; dtls port 4433&lt;/P&gt;&lt;P&gt;[trunc]&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 13:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427473#M269328</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T13:56:32Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427474#M269329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Boian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, you have a few problems - but all with the same root issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you overload on an Interface IP, you need to leverage the keyword "interface" in both the static and ACL statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, if you want to allow users to connect to the outside interface on TCP/80 and have that PATed to an internal web server on port 80, you must use the syntax:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&amp;nbsp;&amp;nbsp; static (inside,outside) tcp interface www 192.168.2.2 www netmask 255.255.255.255&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally, when you permit the traffic inbound to the outside interface, you need to leverage the 'interface' keyword:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list OUTSIDE_IN extended permit tcp any interface outside eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 14:29:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427474#M269329</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T14:29:22Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427475#M269330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David, thank you very much for the prompt reaction!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still cannot make this thing work, even with your advise. Somehow I cannot get a single hitcount on the WWW and HTTPS rules, every time I (or other external PCs) try to connect they land on line 8 of the ACL. VERY WEIRD!&lt;/P&gt;&lt;P&gt;I tried with browser and tried even telnet IP... 80 / 433 respectively. No way to get through!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh run | i static&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www PROBLEM_SERVER www netmask 255.255.255.255&amp;nbsp; norandomseq&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https PROBLEM_SERVER https netmask 255.255.255.255&amp;nbsp; norandomseq&lt;/P&gt;&lt;P&gt;static (labs,inside) labs-lan labs-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;static (testo,inside) testo-lan testo-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;static (inside,testo) inside-lan inside-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;static (inside,labs) inside-lan inside-lan netmask 255.255.255.0 norandomseq &lt;/P&gt;&lt;P&gt;ASA# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh access-list OUTSIDE_IN&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN; 4 elements&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 1 remark allow echo requests&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 2 extended permit icmp any interface outside echo log informational interval 300 (hitcnt=0) 0xe2af2171 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 3 remark allow web to internal server&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 4 extended permit tcp any interface outside eq www log informational interval 300 (hitcnt=0) 0x7c40f258 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 5 remark allow https to internal server&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 6 extended permit tcp any interface outside eq https log informational interval 300 (hitcnt=0) 0x503e0f80 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 7 remark default deny with log&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_IN line 8 extended deny ip any any log informational interval 300 (hitcnt=876) 0x2dc51227 &lt;/P&gt;&lt;P&gt;ASA# sh xlate&lt;/P&gt;&lt;P&gt;287 in use, 949 most used&lt;/P&gt;&lt;P&gt;PAT Global outside-interface(80) Local PROBLEM_SERVER(80) &lt;/P&gt;&lt;P&gt;PAT Global outside-interface(443) Local PROBLEM_SERVER(443) &lt;/P&gt;&lt;P&gt;[etc....]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 15:46:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427475#M269330</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T15:46:41Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427476#M269331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you capture the syslogs (at level 6) when you attempt to access the web server from the outside?&amp;nbsp; That should help clear things up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also try running packet-tracer sourced from the outside client, destined to the outside interface IP on tcp/80 to see what it shows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 15:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427476#M269331</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T15:56:53Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427477#M269332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello David, the syslog obviously records "&lt;SPAN style="font-size: 10pt;"&gt;TCP access denied by ACL". But I still cannot what is wron with mine...&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427477#M269332</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T16:07:24Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427478#M269333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Boian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that I CAN SOLVE YOUR PROBLEM, but only if you supply the information I request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the syslog includes the text, "TCP access denied by ACL", then I must assume that this is syslog 710003, in which case you are not hitting the interface ACL, but instead an implicit ACL which is applied to traffic destined "to-us" for services the ASA hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, this shouldn't be happening, as a static PAT statement will override locally hosted services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check the output of "show nat"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427478#M269333</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T16:34:57Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427479#M269334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the bad language, David, already tired.&lt;/P&gt;&lt;P&gt;The packet-tracer (see above) is not correct. Believe it or not I called an external partner and he could actually connect to the server. What is this? I was trying to test from the internal LAN behind the inside interface and I could not do that, I could not even ping the public IP, that's why i thought the packet tracer was "judging" correct!&lt;/P&gt;&lt;P&gt;Why?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427479#M269334</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T16:39:49Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427480#M269335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David, sorry, my output was shortened: you are correct: &lt;/P&gt;&lt;P&gt;%ASA-3-710003: TCP access denied by ACL from ZZZZ/65344 to inside:XXXX/443&lt;/P&gt;&lt;P&gt;Yes, this was implicit ACL: look at the dump above that I provided:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Phase: 4&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Subtype:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Result: DROP&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Config:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Implicit Rule&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Additional Information:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;in&amp;nbsp; id=0xd5120ed0, priority=0, domain=permit, deny=true&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3335, user_data=0x9, cs_id=0x0, flags=0x1000, protocol=0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can imagine this ID=&lt;SPAN style="font-size: 10pt;"&gt;0xd5120ed0 does not belong to my configured ACLs&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:43:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427480#M269335</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T16:43:59Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427481#M269336</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Boian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will never be able to connect to the NATed/PATed (ie: Public IP) from the Inside network of the ASA.&amp;nbsp; This is just how the ASA is designed.&amp;nbsp; If your client is located off the internal interface, then you need to connect to the Real IP of the server.&amp;nbsp; If you want to test your configuration, you must test from a device located on the Outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the syslogs, if an interface ACL was blocking the packet (even the implicit deny at the bottom), you would see syslog messages 106023 or 106100.&amp;nbsp; Syslog 710003 has a different meaning/purpose.&amp;nbsp; It is specific to access attempts to services hosted by the ASA - which essentially tells me your NAT rule is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:52:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427481#M269336</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T16:52:19Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427482#M269337</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Contd. relevant excerpt of sh nat:&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host PROBLEM_SERVER eq 80 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to outside-interface/80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host PROBLEM_SERVER eq 443 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to outside-interface/443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside inside-lan 255.255.255.0 inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside inside-lan 255.255.255.0 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (outside-interface [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 49192, untranslate_hits = 2850&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427482#M269337</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T16:54:32Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427483#M269338</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, but what else services can be hosted on ports 80 &amp;amp; 443. OK I have to go now, so thanks a lot and will update&amp;amp;feedback tomorrow!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 16:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427483#M269338</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T16:58:03Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427484#M269339</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Boian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm that the server is accessible externally?&amp;nbsp; Since you said a partner was able to access it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: You cannot access the server by it's NATed/PATed IP from the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 18:13:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427484#M269339</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T18:13:39Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427485#M269340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;yes, I can confirm that with the "interface" settings the server is accessible now. I marked your first answer as correct.&lt;/P&gt;&lt;P&gt;Thanks a million!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 19:20:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427485#M269340</guid>
      <dc:creator>Boian Soloviov</dc:creator>
      <dc:date>2014-02-19T19:20:38Z</dc:date>
    </item>
    <item>
      <title>Cannot port forward 80 443 (ASA 5510 V8)</title>
      <link>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427486#M269341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great, glad to hear everything is working for you now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Feb 2014 19:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-port-forward-80-443-asa-5510-v8/m-p/2427486#M269341</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-19T19:33:43Z</dc:date>
    </item>
  </channel>
</rss>

