<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Port forwarding UDP ranges to multiple internal IP addr in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430956#M270396</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration itself seems good to me except that the ACL is not attached to the external interface yet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, when you look at the routing table of the ASA with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should see both the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface network there and you should also see the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the output of the following when the ASA is connected to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that when you are switching 2 different devices with the same public IP address (but different MAC address) your ISP gateway might not always update and therefore traffic might not work. This should not prevent the routes from showing on the ASA but would rather mean that traffic wouldnt flow unless the ISP gateway updated with the new MAC address. You also have the option to configure the SonicWall external interface MAC address on the ASA Vlan2 interface if ARP is part of the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Feb 2014 17:27:28 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-02-04T17:27:28Z</dc:date>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430947#M270373</link>
      <description>&lt;P&gt;I'm setting up a 5505 to connect our phone system to SIP trunking.&amp;nbsp; The phone system is the only thing that will be behind the 5505, however there are multiple IP's associated with the phone system and I need to port forward based on specific port ranges.&amp;nbsp; The following is what I want/need to accomplish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside udp traffic on UDP5060-5061 and UPD 16384-17383 needs to be delivered to internal IP 192.168.1.26&lt;/P&gt;&lt;P&gt;outside udp traffic on UDP 17384-17639 needs to be delivered to internal IP 192.168.1.28&lt;/P&gt;&lt;P&gt;outside udp traffic on UDP 17640-17895 needs to be delivered to internal IP 192.168.1.27&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than this i want traffic blocked except what is initiated internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created object groups for the host objects and for the port ranges. and set nat rules .&amp;nbsp;&amp;nbsp; am I missing anything?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my running config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help/confirmation/critical analysis&amp;nbsp; appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="word-wrap: break-word; font-variant: normal; white-space: pre-wrap; text-transform: none; font-weight: normal; color: #000000; font-style: normal; letter-spacing: normal; line-height: normal;"&gt;: Saved
:
ASA Version 8.4(6) 
!
hostname wavefc
domain-name center
enable password 8EBQPyIGHYB9jy6X encrypted
passwd 8EBQPyIGHYB9jy6X encrypted
names
name 192.168.1.28 MRMA description Wave MRMA IP
name 192.168.1.27 MRMB description Wave MRMB IP
name 192.168.1.26 vam description WAVE VAM IP
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.30 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 108.174.110.110 255.255.255.0 
!
boot system disk0:/asa846-k8.bin
ftp mode passive
dns server-group DefaultDNS
 domain-name center
object network vam
 host 192.168.1.26
 description Created during name migration
object network MRMB_1
 host 192.168.1.27
 description Created during name migration
object network MRMA_1
 host 192.168.1.28
 description MRMB
object service VAM1
 service udp source range sip 5061 destination range sip 5061 
 description VAM Ports
object service VAM2
 service udp source range 16384 17383 destination range 16384 17383 
 description VAM SIP PORTS
object service MRMA
 service udp source range 17384 17639 destination range 17384 17639 
 description MRM A PORTS
object service MRMB
 service udp source range 17640 17895 destination range 17640 17895 
 description MRM B PORTS
object network Dynamic_NAT
 subnet 192.168.1.0 255.255.255.0
object network vamIP
 host 192.168.1.26
object network MRMAIP
 host 192.168.1.28
object network MRMBIP
 host 192.168.1.27
object service vamIP1
 service udp source range 16384 17383 
object service SIP
 service udp source range sip 5061 
object service mrmaUDP
 service udp source range 17384 17639 
object service mrmbUDP
 service udp source range 17640 17895 
object service vam5060
 service udp source range sip 5061 
object-group service VAM_PORTS
 service-object object VAM1 
 service-object object VAM2 
access-list outside_access_in extended permit object-group VAM_PORTS interface outside interface inside 
access-list outside_access_in extended permit object MRMA interface outside interface inside 
access-list outside_access_in extended permit object MRMB interface outside 192.168.1.0 255.255.255.0 
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-715-100.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static vamIP interface service vamIP1 vamIP1
nat (inside,outside) source static MRMA_1 interface service mrmaUDP mrmaUDP
nat (inside,outside) source static MRMB_1 interface service mrmbUDP mrmbUDP
nat (inside,outside) source static vamIP interface service vam5060 vam5060
access-group outside_access_in in interface outside
route inside 0.0.0.0 255.255.255.255 108.174.110.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL 
http server enable
http 192.168.1.0 255.255.255.0 inside
http authentication-certificate inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
management-access inside

dhcpd auto_config outside
!
dhcpd address 192.168.1.99-192.168.1.100 inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username wave password 7dzE8CxoLKj5NbvA encrypted
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
&amp;nbsp; message-length maximum client auto
&amp;nbsp; message-length maximum 512
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns preset_dns_map 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect skinny&amp;nbsp; 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect xdmcp 
&amp;nbsp; inspect sip&amp;nbsp; 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect tftp 
&amp;nbsp; inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:c8602fd7e5eca94f54c4ae20296b28bc
: end
asdm image disk0:/asdm-715-100.bin
no asdm history enable&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430947#M270373</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2019-03-12T03:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Port forwarding UDP ranges to multiple internal IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430948#M270380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configurations seem fine for the Static PAT (Port Forward) configurations. Notice though that you will probably want to configure Dynamic PAT for any internal host even if you only had the single host behind ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can accomplish that with the following command for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the ACL seems to be a bit off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First thing you should confirm is that are the connections truly coming from the same source ports as their destination port will be? If not then I would suggest only using the &lt;STRONG&gt;"destination"&lt;/STRONG&gt; port in the &lt;STRONG&gt;"object service"&lt;/STRONG&gt;. This is since usually the source port of the connection can be random and only the destination port is usually some known port or range of ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, since we are talking about the new ASA software and its NAT/ACL configuration you wont be allowing the traffic towards the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface public IP address. You always allow the traffic to the real IP address of the NATed host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it would seem to me that you would have to have these configurations for the ACL portion (part of it simply modified from the above configuration)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service VAM1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service udp destination range sip 5061 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description VAM Ports&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service VAM2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service udp destination range 16384 17383 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description VAM SIP PORTS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service MRMA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service udp destination range 17384 17639 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description MRM A PORTS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service MRMB&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service udp destination range 17640 17895 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description MRM B PORTS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service VAM_PORTS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object object VAM1 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object object VAM2 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network vamIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.26&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network MRMAIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.28&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network MRMBIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.27&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in remark Allow ports for Phone System&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit object-group VAM_PORTS any object vamIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit object MRMA any object MRMAIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit object MRMB any object MRMBIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can naturally limit the connections from certain source networks/IPs if you want/can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it works out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2014 22:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430948#M270380</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-03T22:49:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430949#M270382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the input.&amp;nbsp; I'm a n00b with cisco.&amp;nbsp; It all makes sense in my head but putting it into practicefor the first few times is always an experience.&amp;nbsp; I'll be putting this live tomorrow, I'll let you know how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 03:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430949#M270382</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T03:02:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430950#M270387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; OK,&amp;nbsp; I made the changes you suggested.&amp;nbsp; I'll attach my running config.&amp;nbsp;&amp;nbsp; I'm not able to get to the internet from the phone system (its basically a server2003 box) I can ping from the asa successfully, but not from the phone system.&amp;nbsp; I am resolving DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;: Saved
:
ASA Version 8.4(6) 
!
hostname wavefc
domain-name center
enable password 8EBQPyIGHYB9jy6X encrypted
passwd 8EBQPyIGHYB9jy6X encrypted
names
name 192.168.1.28 MRMA description Wave MRMA IP
name 192.168.1.27 MRMB description Wave MRMB IP
name 192.168.1.26 vam description WAVE VAM IP
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.30 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 108.174.110.110 255.255.255.0 
!
boot system disk0:/asa846-k8.bin
ftp mode passive
dns server-group DefaultDNS
 domain-name center
object network vam
 host 192.168.1.26
 description Created during name migration
object network MRMB_1
 host 192.168.1.27
 description Created during name migration
object network MRMA_1
 host 192.168.1.28
 description MRMB
object service VAM1
 service udp destination range sip 5061 
 description VAM ports
object service VAM2
 service udp destination range 16384 17383 
 description VAM SIP PORTS
object service MRMA
 service udp destination range 17640 17895 
 description MRM A PORTS
object service MRMB
 service udp destination range 17640 17895 
 description MRM B PORTS
object network Dynamic_NAT
 subnet 192.168.1.0 255.255.255.0
object network vamIP
 host 192.168.1.26
object network MRMAIP
 host 192.168.1.27
object network MRMBIP
 host 192.168.1.27
object service vamIP1
 service udp source range 16384 17383 
object service SIP
 service udp source range sip 5061 
object service mrmaUDP
 service udp source range 17384 17639 
object service mrmbUDP
 service udp source range 17640 17895 
object service vam5060
 service udp source range sip 5061 
object-group service VAM_PORTS
 service-object object VAM1 
 service-object object VAM2 
access-list outside_access_in remark Allow ports for phone system
access-list outside_access_in extended permit object-group VAM_PORTS any object vamIP 
access-list outside_access_in extended permit object MRMA any object MRMAIP 
access-list outside_access_in extended permit object MRMB any object MRMBIP 
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-715-100.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static vamIP interface service vamIP1 vamIP1
nat (inside,outside) source static MRMA_1 interface service mrmaUDP mrmaUDP
nat (inside,outside) source static MRMB_1 interface service mrmbUDP mrmbUDP
nat (inside,outside) source static vamIP interface service vam5060 vam5060
!
nat (inside,outside) after-auto source dynamic any interface
route outside 0.0.0.0 0.0.0.0 108.174.110.1 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL 
http server enable
http 192.168.1.0 255.255.255.0 inside
http authentication-certificate inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
telnet timeout 5
ssh 192.168.1.0 255.255.255.0 inside
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
management-access inside

dhcpd auto_config outside
!
dhcpd address 192.168.1.99-192.168.1.100 inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username wave password 7dzE8CxoLKj5NbvA encrypted
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
&amp;nbsp; message-length maximum client auto
&amp;nbsp; message-length maximum 512
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns preset_dns_map 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect skinny&amp;nbsp; 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect xdmcp 
&amp;nbsp; inspect sip&amp;nbsp; 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect tftp 
&amp;nbsp; inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:f1c2682304b634248f80c2cbccf90928
: end
asdm image disk0:/asdm-715-100.bin
no asdm history enable
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 16:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430950#M270387</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T16:32:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430951#M270389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that you cannot ICMP/PING to the Internet from the server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see any problem with the ASA configurations for normal TCP/UDP connectivity towards Internet but for ICMP to work you must add these.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 16:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430951#M270389</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T16:38:12Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430952#M270392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i've put in a static route for the gateway. . . but when I run the sh route command it doesn't show up there?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wavefc(config)# route outside 0.0.0.0 0.0.0.0 108.174.110.1 1&lt;BR /&gt;wavefc(config)# sh rou&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is not set&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;wavefc(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 16:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430952#M270392</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T16:55:05Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430953#M270393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; correct, I can't ping,&amp;nbsp; but I also can't browse to websites, and my SIP trunk isn't connecting.&amp;nbsp;&amp;nbsp; I'll add in the policy map command and test it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 16:56:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430953#M270393</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T16:56:40Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430954#M270394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would usually indicate that the interface itself is down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you confirmed that the ASA port &lt;STRONG&gt;Ethernet0/0&lt;/STRONG&gt; is connected to the external network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 16:57:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430954#M270394</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T16:57:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430955#M270395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; e0/0 is physically connected to the external network&lt;/P&gt;&lt;P&gt;I am replacing a sonic wall with this ASA5505&lt;/P&gt;&lt;P&gt;I am moving the cable from the sonic wall wan port to the e0/0 interface on the ASA5505&lt;/P&gt;&lt;P&gt;I am moving the cable from the sonic wall lan0/1 port to the e0/1 interface on the ASA5505&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the sonicwall the settings are &lt;/P&gt;&lt;P&gt;lan IP 192.168.1.30&lt;/P&gt;&lt;P&gt;wan IP 108.174.110.110&lt;/P&gt;&lt;P&gt;gateway 108.174.110.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the sonic wall is functional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so on the cisco I set vlan2 to 108.174.110.110 and set e0/0 switchport access vlan 2&lt;/P&gt;&lt;P&gt;and I set vlan 1 ip to 192.168.1.30&lt;/P&gt;&lt;P&gt;and route 0.0.0.0 0.0.0.0 108.174.110.1 1 for the default route/gateway&lt;/P&gt;&lt;P&gt;I can ping my vlan2 ip but I can't ping the gateway IP from the cisco&lt;/P&gt;&lt;P&gt;am I missing the part that lets vlan 1 talk with vlan 2?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430955#M270395</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T17:20:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430956#M270396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration itself seems good to me except that the ACL is not attached to the external interface yet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, when you look at the routing table of the ASA with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should see both the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface network there and you should also see the default route.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the output of the following when the ASA is connected to the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show interface Ethernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show route&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show arp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that when you are switching 2 different devices with the same public IP address (but different MAC address) your ISP gateway might not always update and therefore traffic might not work. This should not prevent the routes from showing on the ASA but would rather mean that traffic wouldnt flow unless the ISP gateway updated with the new MAC address. You also have the option to configure the SonicWall external interface MAC address on the ASA Vlan2 interface if ARP is part of the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:27:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430956#M270396</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T17:27:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430957#M270397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wavefc(config)# sh int e0/0&lt;/P&gt;&lt;P&gt;Interface Ethernet0/0 "", is up, line protocol is up&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hardware is 88E6095, BW 100 Mbps, DLY 100 usec&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto-Duplex(Full-duplex), Auto-Speed(100 Mbps)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Input flow control is unsupported, output flow control is unsupported&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Available but not configured via nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; MAC address 885a.922c.59fc, MTU not set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address unassigned&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4858 packets input, 1031732 bytes, 0 no buffer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Received 694 broadcasts, 0 runts, 0 giants&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause input, 0 resume input&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 L2 decode drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3972 switch ingress policy drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 26 packets output, 3014 bytes, 0 underruns&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 pause output, 0 resume output&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 output errors, 0 collisions, 0 interface resets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 late collisions, 0 deferred&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 rate limit drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 switch egress policy drops&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 input reset drops, 0 output reset drops&lt;/P&gt;&lt;P&gt;wavefc(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wavefc(config)# sh rou&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 108.174.110.1 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 108.174.110.0 255.255.255.0 is directly connected, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 108.174.110.1, outside&lt;BR /&gt;wavefc(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wavefc(config)# sh arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.108 842b.2ba9.7e36 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.23 0021.9b8f.75de 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside vam 0060.e055.cd70 206&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside 192.168.1.11 009c.021f.0eac 2782&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside 108.174.110.1 0000.5e00.010a 5171&lt;/P&gt;&lt;P&gt;wavefc(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wavefc(config)# sh run int vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 108.174.110.110 255.255.255.0&lt;/P&gt;&lt;P&gt;wavefc(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all the assistance.&amp;nbsp;&amp;nbsp; Here is the info you wanted.&amp;nbsp;&amp;nbsp; I'll get with the ISP about the MAC Address.&amp;nbsp; I was just thinking about that.&amp;nbsp; how would I go about adding in the sonicwall MAC to vlan2?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430957#M270397</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T17:33:41Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430958#M270398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can check the SonicWall external interface MAC address then you can configure that MAC address to the ASA Vlan2 interface by using these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;wavefc(config)# interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;wavefc(config-if)# mac-address aaaa.bbbb.cccc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the &lt;STRONG&gt;aaaa.bbbb.cccc&lt;/STRONG&gt; is naturally the MAC address from the SonicWall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430958#M270398</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T17:38:25Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430959#M270399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; the sonicwall mac comes in a&amp;nbsp; xx:xx:xx:xx:xx:xx format,&amp;nbsp; I've tried entering it in straight but it won't take it.&amp;nbsp; how do I convert?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:41:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430959#M270399</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T17:41:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430960#M270400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You just write it in part of 4 like I mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;xxxx.xxxx.xxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430960#M270400</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T17:43:30Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430961#M270401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Great.&amp;nbsp; I can now ping (from the ASA) to external internet IP's, as well as the default route IP.&amp;nbsp; But I'm still unable to get to the internet from the host.&amp;nbsp;&amp;nbsp; I've applied the ACL aforementioned.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430961#M270401</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T17:54:38Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430962#M270402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I imagine that you are trying from a host thats network settings are staticly configured and NOT DHCP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have staticly configured the setting please confirm the IP address/network mask/gateway/DNS server so that they are correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are testing from a DHCP host then please add some DNS servers to your DHCP configuration on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd dns 8.8.8.8 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example or the DNS servers provided by your ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 17:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430962#M270402</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T17:58:47Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430963#M270404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually seems you have not even enabled the DHCP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcpd enable inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is if you want to enable it even.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 18:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430963#M270404</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T18:00:52Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430964#M270405</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes it is statically configured.&amp;nbsp; &lt;/P&gt;&lt;P&gt;IP - 192.168.1.26 255.255.255.0&lt;/P&gt;&lt;P&gt;GW - 192.168.1.30&lt;/P&gt;&lt;P&gt;DNS 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DNS will resolve. . .and&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after a third reboot its working like a charm.&amp;nbsp;&amp;nbsp; Thanks a TON for your assistance!&amp;nbsp; You're a lifesaver!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 18:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430964#M270405</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T18:07:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430965#M270407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear its working now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was starting to think I was missing something simple &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 18:10:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430965#M270407</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-04T18:10:12Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Port forwarding UDP ranges to multiple internal IP addr</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430966#M270409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got one more thing. &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got some traffice coming in on the internal interface that is from the 192.168.2.0 range.&amp;nbsp; This is coming in over a VPN.&amp;nbsp; I need to send that traffic back via 192.168.1.254 (which is the gatewat controlling the point to point vpn).&amp;nbsp; On my sonicwall I have a route set as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source = 192.168.1.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp; destination=192.168.2.0/24&amp;nbsp;&amp;nbsp; protocol=any&amp;nbsp;&amp;nbsp;&amp;nbsp; gateway = 192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm thinking that on the ASA&amp;nbsp; I need to put in something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got that enterd in but I'm not establishing communication.&amp;nbsp; am I on the right track?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 20:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forwarding-udp-ranges-to-multiple-internal-ip/m-p/2430966#M270409</guid>
      <dc:creator>AaronCase3</dc:creator>
      <dc:date>2014-02-04T20:58:20Z</dc:date>
    </item>
  </channel>
</rss>

