<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399504#M271573</link>
    <description>&lt;P&gt;8.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HI ALL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is my scenerio and I have worked on this with TAC support over the last month, we finally made progress by getting our ISP to activate the 5 static IPs but here is my issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;basically we have a VOIP phone that is "remote". This phone needs to come through the Public IP to an internal address of 192.168.10.57.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We tried only allowing certain "ports" to pass, such as SIP, RTP&amp;gt; but the remote phone still cannot reach the phone server at 192.168.10.57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to open it completely as this phone pc is the ONLY device on that public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so my 2 questions are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do i need to config as a rule/ command to make this happen. were I want the public IP of 50.x.x.x to corelate directly and openly to the internal of 192.168.10.57?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also what is the command to allow the public IP to be pingable? so i can just confirm that it is reachable. I know at the very end we turned it off with a sort of ICMP command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you all for your time and help. if you need more info please ask. &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:29:35 GMT</pubDate>
    <dc:creator>jason</dc:creator>
    <dc:date>2019-03-12T03:29:35Z</dc:date>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399504#M271573</link>
      <description>&lt;P&gt;8.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HI ALL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is my scenerio and I have worked on this with TAC support over the last month, we finally made progress by getting our ISP to activate the 5 static IPs but here is my issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;basically we have a VOIP phone that is "remote". This phone needs to come through the Public IP to an internal address of 192.168.10.57.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We tried only allowing certain "ports" to pass, such as SIP, RTP&amp;gt; but the remote phone still cannot reach the phone server at 192.168.10.57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to open it completely as this phone pc is the ONLY device on that public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so my 2 questions are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what do i need to config as a rule/ command to make this happen. were I want the public IP of 50.x.x.x to corelate directly and openly to the internal of 192.168.10.57?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also what is the command to allow the public IP to be pingable? so i can just confirm that it is reachable. I know at the very end we turned it off with a sort of ICMP command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you all for your time and help. if you need more info please ask. &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399504#M271573</guid>
      <dc:creator>jason</dc:creator>
      <dc:date>2019-03-12T03:29:35Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399505#M271574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So your question is to simply configure a Static NAT which essentially binds one public IP address to one internal IP address. (Forwards all incoming connections to the public IP to the local IP provided the access rules permit this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the configuration would be rather simple&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration format depends on your software. ASA NAT configurations changed in the jump from software 8.2 to 8.3 (and beoynd)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do notice that the below examples presume some interface names on the ASA and also presume that you previously have NO ACL configured and attached on the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Software 8.2 (and below)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) &lt;PUBLIC ip=""&gt; &lt;LOCAL ip=""&gt; netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit icmp any host &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Software 8.2 (and above)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VOIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;LOCAL ip=""&gt;&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit icmp any object VOIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 13:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399505#M271574</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-14T13:56:54Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399506#M271575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much for your help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out-in extended permit icmp any host 50.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and now i can ping TY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 50.245.59.98 192.168.10.57 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; ANd got this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# static (inside,outside) 50.245.59.98 192.168.10.57 netmask 2$&lt;/P&gt;&lt;P&gt;ERROR: mapped-address conflict with existing static&lt;/P&gt;&lt;P&gt;&amp;nbsp; inside:192.168.10.57 to outside:50.245.59.98 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want this port "wide open" to see if the remote phone will connect to it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; here is my edited SH RUN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password PfdcbR/f90Mel1yp encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 50.X.X.X 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner login&lt;/P&gt;&lt;P&gt;banner login &amp;amp;&lt;/P&gt;&lt;P&gt;banner login ~&lt;/P&gt;&lt;P&gt;banner login ***********Warning*******&lt;/P&gt;&lt;P&gt;banner login&lt;/P&gt;&lt;P&gt;banner login ^&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list out-in extended permit tcp any host 50.X.X.X eq 3462&lt;/P&gt;&lt;P&gt;access-list out-in extended permit tcp any host 50.X.X.X eq sip&lt;/P&gt;&lt;P&gt;access-list out-in extended permit tcp any host 40.X.X.X eq ftp-data&lt;/P&gt;&lt;P&gt;access-list out-in extended permit tcp any host 40.X.X.X eq ftp&lt;/P&gt;&lt;P&gt;access-list out-in extended permit icmp any host 50.X.X.X&lt;/P&gt;&lt;P&gt;access-list split standard permit 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.10.0 255.255.255.0 192.169.169.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list FTP remark Allow&lt;/P&gt;&lt;P&gt;access-list FTP extended permit tcp any eq ftp any eq ftp&lt;/P&gt;&lt;P&gt;access-list FTP extended permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool ippool 192.169.169.1-192.169.169.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 192.168.10.2 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp-data 192.168.10.2 ftp-data netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 50.X.X.X 192.168.10.57 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group out-in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 50.X.X.X 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt connection timewait&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.50-192.168.10.100 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 75.75.75.75 75.75.76.76 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 86400 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-dart-win-2.5.3041-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; port-forward rdpfromsslvpn 5050 50.X.X.X 5050 remote desktop server from ssl vpn&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy RemoteAccess internal&lt;/P&gt;&lt;P&gt;group-policy RemoteAccess attributes&lt;/P&gt;&lt;P&gt; banner value *****************************WARNING**********************************&lt;/P&gt;&lt;P&gt; banner value Access Beyond This Point Requires Prior Authorization from your Network Administrator&lt;/P&gt;&lt;P&gt; banner value ****************************************************************************&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list none&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default webvpn&lt;/P&gt;&lt;P&gt;username aalmonte password m7vzxUlfTDi05gS6 encrypted privilege 0&lt;/P&gt;&lt;P&gt;username aalmonte attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username mmaccormack password IWIdkIPCDtg4CmHR encrypted privilege 0&lt;/P&gt;&lt;P&gt;username mmaccormack attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username lmaccormack password qRsbIpdvRgZhIVS/ encrypted privilege 0&lt;/P&gt;&lt;P&gt;username lmaccormack attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username admin password V8ctuy0OtxmDU4HD encrypted privilege 15&lt;/P&gt;&lt;P&gt;username rdirkee password mHVkPntgw4LQyh.U encrypted&lt;/P&gt;&lt;P&gt;username rdirkee attributes&lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;username wmaccormack password AhNi5Rk6JFlHU9Fy encrypted privilege 0&lt;/P&gt;&lt;P&gt;username wmaccormack attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;/P&gt;&lt;P&gt;username rickg password 46/GVMAZTuz4ywzs encrypted privilege 0&lt;/P&gt;&lt;P&gt;username rickg attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt; service-type remote-access&lt;/P&gt;&lt;P&gt;username jgoucher password fMhOfzHeEB1lu9z6 encrypted privilege 0&lt;/P&gt;&lt;P&gt;username jgoucher attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username smaccormack password LCkB1kwdtIbPmtQK encrypted privilege 0&lt;/P&gt;&lt;P&gt;username smaccormack attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username rmaccormack password JG98o0q2ozZeYYrv encrypted privilege 0&lt;/P&gt;&lt;P&gt;username rmaccormack attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;username bmaccormack password JTx67mnIFw62G6kx encrypted privilege 0&lt;/P&gt;&lt;P&gt;username bmaccormack attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccess type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccess general-attributes&lt;/P&gt;&lt;P&gt; address-pool ippool&lt;/P&gt;&lt;P&gt; default-group-policy RemoteAccess&lt;/P&gt;&lt;P&gt;tunnel-group RemoteAccess webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias RemoteAccess enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TYVM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 14:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399506#M271575</guid>
      <dc:creator>jason</dc:creator>
      <dc:date>2014-01-14T14:46:45Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399507#M271576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you had the Static NAT configured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So only thing left to do would be to allow all traffic through to this host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list out-in permit ip host &lt;SOURCE ip=""&gt; host &lt;PUBLIC nat="" ip=""&gt;&lt;/PUBLIC&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont know the source IP address where the connection is coming from them you would have to check either the logs or allow traffic temporarily from any source address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list out-in permit ip any host &lt;PUBLIC nat="" ip=""&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 15:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399507#M271576</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-14T15:06:14Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399508#M271578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok i will try that now. What is the "public nat ip"&amp;nbsp; I will attempt the "temporary": allow all but not sure if that public nat ip is just my public IP of 50.x.x.x. or not? TY&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 15:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399508#M271578</guid>
      <dc:creator>jason</dc:creator>
      <dc:date>2014-01-14T15:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399509#M271579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its the public IP address you configured in the &lt;STRONG&gt;"static"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one starting 50.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 15:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399509#M271579</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-14T15:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399510#M271580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; You solved 3 Hours of phone support in 3 post.. THank you so much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote phone now connects, but supposedly has no audio.. the client seems to think this could be related to a setting on the firewall? possible?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 16:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399510#M271580</guid>
      <dc:creator>jason</dc:creator>
      <dc:date>2014-01-14T16:58:19Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399511#M271581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear it helped &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though if there is still problem then its not quite yet solved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly I have very little knowledge of VoIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In some cases the &lt;STRONG&gt;"inspect"&lt;/STRONG&gt; configuration that you see under the default &lt;STRONG&gt;"policy-map"&lt;/STRONG&gt; configuration cause problems to certain connections through the firewall. For example, &lt;STRONG&gt;"inspect esmtp"&lt;/STRONG&gt; has caused a lot of problems in the past for us with SMTP connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would try to maybe monitor the ASA logs through the ASDM GUI while connecting to see if the ASA logs any dropped connection attempt or any other error message that might give a clue about the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could naturally try to remove some VoIP related inspection from the ASA configuration and see if that helps and if not configure them back into the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially to go to the right configuration mode you have to enter these&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA# conf term&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)# policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config-pmap)#policy-map global_policy class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can issue the &lt;STRONG&gt;"no inspect &lt;INSPECT&gt;"&lt;/INSPECT&gt;&lt;/STRONG&gt; commands or enter them again with&lt;STRONG&gt; "inspect &lt;INSPECT&gt;"&lt;/INSPECT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config-pmap-c)# no inspect sip&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the current "policy-map" configuration with the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run policy-map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its shown also at the bottom of the ASA configuration you posted above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 17:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399511#M271581</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-14T17:56:00Z</dc:date>
    </item>
    <item>
      <title>ASA5505 NAT CONFIG QUESTION? OPEN STATIC IP</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399512#M271582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; HI sorry for delay. wondering if you could help me with the following on this same topic/.issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The manual for the phone system states the following. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the phone system router (the asa5505 8.2 )&amp;nbsp; Forward UDP ports 5060 (SIP) and 1024-1215 (RTP) to the phone systems IP address (192.168.10.57)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i added (not sure if this is even legit or not)&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out-in extended permit udp any host 50.X.X.X eq sip &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so not sure if thats ok, and also not sure how to get that RTP ports range in there either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; again they can "connect" the remote VOIP phone just audio is loss as stated below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;&lt;EM&gt;The phone finds the switch and connects and stays connected, but at times will lose audio. Also the phone uses a codec list&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;&lt;EM&gt;starting with G.729 and working its way down to G.722. At times we see it using G.711 (5th choice). This seems to be an&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;&lt;EM&gt;RTP issue. If you could check to see if RTP ports 1024-1215 are forwarded and not used by anything else.&amp;nbsp; Thanks for&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;&lt;EM&gt;your help.&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 14:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-config-question-open-static-ip/m-p/2399512#M271582</guid>
      <dc:creator>jason</dc:creator>
      <dc:date>2014-01-21T14:57:05Z</dc:date>
    </item>
  </channel>
</rss>

