<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco port forwarding not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481578#M269941</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi JouniForss,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; thank you for your reply. I will add the default routes currently in here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route outside 0.0.0.0 0.0.0.0 a.b.c.d 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there any more configurations that I need to append to the firewall besides your suggested route? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Feb 2014 09:22:35 GMT</pubDate>
    <dc:creator>Marcus Peck</dc:creator>
    <dc:date>2014-02-10T09:22:35Z</dc:date>
    <item>
      <title>Cisco port forwarding not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481576#M269939</link>
      <description>&lt;P&gt;Dear experts, I got a production firewall (Cisco Pix 515e 6.3(1)) and I have got to configure to allow outside access to a server (SSH only).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LAN server is 10.0.5.200.&lt;/P&gt;&lt;P&gt;The outside IP address is a.b.c.d. (should I use the FW outside interface IP address?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are the sanitized output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 100full&lt;/P&gt;&lt;P&gt;interface ethernet4 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet5 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 vendor security4&lt;/P&gt;&lt;P&gt;nameif ethernet3 dmz security99&lt;/P&gt;&lt;P&gt;nameif ethernet4 intf4 security8&lt;/P&gt;&lt;P&gt;nameif ethernet5 intf5 security10&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;ip address outside a.b.c.d 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 10.0.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address vendor X.X.X.X 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address dmz X.X.X.X 255.255.255.0&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.1.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;ntp server 192.43.244.18 source outside prefer&lt;/P&gt;&lt;P&gt;ntp server 128.102.16.2 source outside&lt;/P&gt;&lt;P&gt;http server enable&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 100full&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;interface ethernet3 100full&lt;/P&gt;&lt;P&gt;interface ethernet4 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet5 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 vendor security4&lt;/P&gt;&lt;P&gt;nameif ethernet3 dmz security99&lt;/P&gt;&lt;P&gt;nameif ethernet4 intf4 security8&lt;/P&gt;&lt;P&gt;nameif ethernet5 intf5 security10&lt;/P&gt;&lt;P&gt;enable password pnxJXWf9kU.x7YfY encrypted&lt;/P&gt;&lt;P&gt;passwd WL6KtWnsAjAQS2yI encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside-access-in permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;ip address outside &lt;SPAN style="color: #333333; text-decoration: underline;"&gt;a.b.c.d&lt;/SPAN&gt; 255.255.255.240&lt;BR /&gt;ip address inside 10.0.1.254 255.255.255.0&lt;BR /&gt;ip address vendor X.X.X.X 255.255.255.0&lt;BR /&gt;ip address dmz X.X.X.X 255.255.255.0&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 10.0.1.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+ &lt;BR /&gt;aaa-server RADIUS protocol radius &lt;BR /&gt;aaa-server LOCAL protocol local &lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;ntp server 192.43.244.18 source outside prefer&lt;BR /&gt;ntp server 128.102.16.2 source outside&lt;BR /&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those in bold are the commands I added:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp a.b.c.d 2022 10.0.5.200 ssh netmask 255.255.255.255 0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 100 permit tcp any host a.b.c.d eq 2022&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 101 permit tcp 10.0.5.200 eq 22 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group 100 in interface ouside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group 101 in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When accessing from the WAN, I used putty to SSH into the IP a.b.c.d port 2022 and it gave me timeouts. I used the:&lt;/P&gt;&lt;P&gt;capture capo interface outside access-group 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The results were (what i can remember as I am not at the site):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My WAN IP -&amp;gt; a.b.c.d (R)&lt;/P&gt;&lt;P&gt;My WAN IP -&amp;gt; a.b.c.d (S) &amp;lt;nop, nop sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;My WAN IP -&amp;gt; a.b.c.d (S) &amp;lt;nop, nop sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;My WAN IP -&amp;gt; a.b.c.d (S) &amp;lt;nop, nop sackOK&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server's access from the internal LAN is great and I can access the port 22 on the server from the LAN (note: there is a L3 switch in the environment and the inside IP segments are 10.0.1.0/24 and 10.0.5.0/24 both routable.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I have done thus far and would like more insights on this issue that I am currently facing. Thank you!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481576#M269939</guid>
      <dc:creator>Marcus Peck</dc:creator>
      <dc:date>2019-03-12T03:43:27Z</dc:date>
    </item>
    <item>
      <title>Cisco port forwarding not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481577#M269940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First regarding the configurations you have attempted. It seems to me that according to your above existing firewall configuration you have no ACLs attached yet with the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is true then I would &lt;STRONG&gt;NOT&lt;/STRONG&gt; suggest adding the ACL 101 you mention as it only allows traffic that will probably never be matched against it and it will &lt;STRONG&gt;BLOCK ALL&lt;/STRONG&gt; of the rest of the traffic essentially stopping all new connections from the LAN. Also you naturally wont need to allow the return traffic of a connection since the firewall is a statefull device and keeps track of the connections formed through it and will allow return traffic through also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Presuming that you don't have any ACL attached yet to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface then this configuration would seem correct&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp a.b.c.d 2022 10.0.5.200 ssh netmask 255.255.255.255 0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 100 permit tcp any host a.b.c.d eq 2022&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group 100 in interface ouside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its the same configuration you have above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the problem in the configuration I see that there is no &lt;STRONG&gt;"route"&lt;/STRONG&gt; command for the subnet 10.0.5.0/24 where the host 10.0.5.200 resides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route inside 10.0.5.0 255.255.255.0 x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then again I dont even see a default route in your configuration so seems to me that we are looking at a partial configuration. Lacking the route for the LAN network would certain explain SYN Timeouts for the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 08:43:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481577#M269940</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-10T08:43:54Z</dc:date>
    </item>
    <item>
      <title>Cisco port forwarding not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481578#M269941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi JouniForss,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; thank you for your reply. I will add the default routes currently in here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route outside 0.0.0.0 0.0.0.0 a.b.c.d 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Is there any more configurations that I need to append to the firewall besides your suggested route? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 09:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481578#M269941</guid>
      <dc:creator>Marcus Peck</dc:creator>
      <dc:date>2014-02-10T09:22:35Z</dc:date>
    </item>
    <item>
      <title>Cisco port forwarding not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481579#M269943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Static PAT (Port Forward) configuration seemed correct to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you use the interface IP address of &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface then you would usually configure the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; parameter rather than the IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 2022 10.0.5.200 22 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you can/want to spare a public IP address for this server alone then you could configure Static NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) &lt;PUBLIC ip=""&gt; 10.0.5.200 netmask 255.255.255.255&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which would essentially bind these 2 IP addresses and you could allow the services that are needed to the actual server. Naturally you would also have to allow the traffic in the external ACL to the new public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it should work also with your configurations. If you are going to use the interface IP address or a separate public IP address is up to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are missing the &lt;STRONG&gt;"route"&lt;/STRONG&gt; for the subnet 10.0.5.0/24 in your PIX configuration then that is one clear problem in why the server can't be reached from the Internet. So I would start by adding the required &lt;STRONG&gt;"route"&lt;/STRONG&gt; and testing it again. If it doesnt work then would be good to check that all the routing between the server and the PIX is fine. For example that there is a route to the server all the way from PIX and the server has a default route taking the traffic to the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 09:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481579#M269943</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-10T09:35:05Z</dc:date>
    </item>
    <item>
      <title>Cisco port forwarding not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481580#M269945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Journi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you! I will test this tomorrow again and will update this space. Thank you once again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 09:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481580#M269945</guid>
      <dc:creator>Marcus Peck</dc:creator>
      <dc:date>2014-02-10T09:53:16Z</dc:date>
    </item>
    <item>
      <title>Cisco port forwarding not working</title>
      <link>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481581#M269946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Journi, thank you for your help! The missing command is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route 10.0.5.0 255.255.255.0 a.b.c.d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This enabled static PAT access from the WAN. Thank you so much! It works! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Feb 2014 06:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-port-forwarding-not-working/m-p/2481581#M269946</guid>
      <dc:creator>Marcus Peck</dc:creator>
      <dc:date>2014-02-12T06:52:45Z</dc:date>
    </item>
  </channel>
</rss>

