<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port forwarding  ASA5506X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872765#M28130</link>
    <description>&lt;P&gt;try this&lt;BR /&gt;!&lt;BR /&gt;object network DVR-TEST&lt;BR /&gt;host x.x.x.x&lt;BR /&gt;nat (int_video,outside) static interface service tcp 443 53429&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in exten permit tcp any host x.x.x.x eq 443&lt;BR /&gt;access-group outside_access_in in interfacec outside&lt;BR /&gt;!&lt;BR /&gt;packet-tracer input outside tcp 8.8.8.8 12345 1.2.3.4.5 53429&lt;/P&gt;&lt;P&gt;where 1.2.3.4.5 is our ASA outside ip address.&lt;/P&gt;</description>
    <pubDate>Thu, 13 Jun 2019 23:43:40 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-06-13T23:43:40Z</dc:date>
    <item>
      <title>Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872712#M28129</link>
      <description>&lt;P&gt;I know it's a very trite subject but I'm already going crazy with this issue&lt;/P&gt;&lt;P&gt;I am configuring a port mapping 53429 ---&amp;gt;https, but this does not work.&lt;/P&gt;&lt;P&gt;https&lt;/P&gt;&lt;P&gt;topology: User browser PC&amp;nbsp; port 53429 ---&amp;gt;Outside ASA ---&amp;gt; inside ASA ---- Device&amp;nbsp;DVR-app&amp;nbsp; https service&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I has configured the following&lt;/P&gt;&lt;P&gt;object network DVR-web&lt;BR /&gt;nat (int_video,outside) static interface service tcp https 53429&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with the acl&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any object DVR-app&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but it is not working, any help I will thank you&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 21:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872712#M28129</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-13T21:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872765#M28130</link>
      <description>&lt;P&gt;try this&lt;BR /&gt;!&lt;BR /&gt;object network DVR-TEST&lt;BR /&gt;host x.x.x.x&lt;BR /&gt;nat (int_video,outside) static interface service tcp 443 53429&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in exten permit tcp any host x.x.x.x eq 443&lt;BR /&gt;access-group outside_access_in in interfacec outside&lt;BR /&gt;!&lt;BR /&gt;packet-tracer input outside tcp 8.8.8.8 12345 1.2.3.4.5 53429&lt;/P&gt;&lt;P&gt;where 1.2.3.4.5 is our ASA outside ip address.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 23:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872765#M28130</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-13T23:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872767#M28131</link>
      <description>&lt;P&gt;When I applyed cli command this show next message:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ERROR: empty object/object-group(s) detected. NAT Policy is not downloaded&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 23:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872767#M28131</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-13T23:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872770#M28132</link>
      <description>&lt;P&gt;Oops, I omitted a line and that's why I showed the error,&lt;BR /&gt;I already applied the suggested lines but the problem continues&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 00:02:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872770#M28132</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-14T00:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872772#M28133</link>
      <description>&lt;P&gt;ASA-QTRO# packet-tracer input outside tcp 8.8.8.8 12345 IP_outside_ASA 53429&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop IP_outside_ASA using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 00:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872772#M28133</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-14T00:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872934#M28134</link>
      <description>&lt;P&gt;share your firewall config in order to fix the issue.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 08:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3872934#M28134</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-14T08:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873184#M28135</link>
      <description>Sure, this is my configuration:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(3)29&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;enable password PASS&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address X.X.X.X 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif int_datos&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.29.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;nameif int_video&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 192.168.79.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;nameif VLANs&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.78&lt;BR /&gt;vlan 78&lt;BR /&gt;nameif int_voz&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.78.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.127&lt;BR /&gt;vlan 127&lt;BR /&gt;nameif Int_visitantes&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.127.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa983-29-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network LAN-QTRO&lt;BR /&gt;subnet 192.168.29.0 255.255.255.0&lt;BR /&gt;object network LAN_PUE&lt;BR /&gt;subnet 192.168.11.0 255.255.255.0&lt;BR /&gt;object network LAN_PUE_USU&lt;BR /&gt;subnet 192.168.17.0 255.255.255.0&lt;BR /&gt;object network LAN-Visit&lt;BR /&gt;subnet 192.168.127.0 255.255.255.0&lt;BR /&gt;object network NVR&lt;BR /&gt;host 192.168.79.10&lt;BR /&gt;object network DVR-app&lt;BR /&gt;host 192.168.79.10&lt;BR /&gt;object network DVR-web&lt;BR /&gt;host 192.168.79.10&lt;BR /&gt;object network LAN_Voz&lt;BR /&gt;subnet 192.168.78.0 255.255.255.0&lt;BR /&gt;description red de voz&lt;BR /&gt;object network LAN_NAUCALPAN&lt;BR /&gt;subnet 192.168.18.0 255.255.255.0&lt;BR /&gt;description red cargotecnia mexico&lt;BR /&gt;object network test&lt;BR /&gt;host 192.168.79.10&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network LAN_Video&lt;BR /&gt;subnet 192.168.79.0 255.255.255.0&lt;BR /&gt;object network Dvr-web&lt;BR /&gt;object network DVR-test&lt;BR /&gt;host 192.168.79.10&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object LAN_PUE&lt;BR /&gt;network-object object LAN_PUE_USU&lt;BR /&gt;access-list outside_cryptomap extended permit ip object LAN-QTRO object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list int_datos_access_in extended permit ip object LAN-QTRO any&lt;BR /&gt;access-list outside_access_in extended permit ip any object DVR-app&lt;BR /&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.79.10 eq https&lt;BR /&gt;access-list int_video_access_in extended permit ip object LAN_Video any&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object LAN-QTRO object LAN_NAUCALPAN&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu int_datos 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu int_video 1500&lt;BR /&gt;mtu VLANs 1500&lt;BR /&gt;mtu int_voz 1500&lt;BR /&gt;mtu Int_visitantes 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any int_datos&lt;BR /&gt;asdm image disk0:/asdm-792-152.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (int_datos,outside) source static LAN-QTRO LAN-QTRO destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp route-lookup&lt;BR /&gt;nat (int_datos,outside) source dynamic LAN-QTRO interface&lt;BR /&gt;nat (Int_visitantes,outside) source dynamic LAN-Visit interface&lt;BR /&gt;nat (int_voz,outside) source dynamic LAN_Voz interface&lt;BR /&gt;nat (int_video,outside) source dynamic LAN_Video interface&lt;BR /&gt;!&lt;BR /&gt;object network DVR-app&lt;BR /&gt;nat (int_video,outside) static interface service tcp 8000 52429&lt;BR /&gt;object network DVR-web&lt;BR /&gt;nat (int_video,outside) static interface service tcp https 53429&lt;BR /&gt;object network DVR-test&lt;BR /&gt;nat (int_video,outside) static interface service tcp https 53429&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group int_datos_access_in in interface int_datos&lt;BR /&gt;access-group int_video_access_in in interface int_video&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 IPGATEWAY 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.29.0 255.255.255.0 int_datos&lt;BR /&gt;http 192.168.0.0 255.255.0.0 int_datos&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;.&lt;BR /&gt;&lt;BR /&gt;.&lt;BR /&gt;&lt;BR /&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;console timeout 0&lt;BR /&gt;&lt;BR /&gt;dhcp-client client-id interface inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.29.100-192.168.29.130 int_datos&lt;BR /&gt;dhcpd dns 192.168.11.18 8.8.8.8 interface int_datos&lt;BR /&gt;dhcpd option 3 ip 192.168.29.1 interface int_datos&lt;BR /&gt;dhcpd enable int_datos&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.79.50-192.168.79.55 int_video&lt;BR /&gt;dhcpd dns 8.8.8.8 interface int_video&lt;BR /&gt;dhcpd option 3 ip 192.168.79.1 interface int_video&lt;BR /&gt;dhcpd enable int_video&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.78.50-192.168.78.70 int_voz&lt;BR /&gt;dhcpd dns 8.8.8.8 interface int_voz&lt;BR /&gt;dhcpd option 3 ip 192.168.78.1 interface int_voz&lt;BR /&gt;dhcpd enable int_voz&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.127.10-192.168.127.30 Int_visitantes&lt;BR /&gt;dhcpd dns 8.8.8.8 interface Int_visitantes&lt;BR /&gt;dhcpd option 3 ip 192.168.127.1 interface Int_visitantes&lt;BR /&gt;dhcpd enable Int_visitantes&lt;BR /&gt;!&lt;BR /&gt;priority-queue int_datos&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy GroupPolicy_X.X.X.X internal&lt;BR /&gt;group-policy GroupPolicy_X.X.X.X attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;group-policy GroupPolicy_X.X.X.X internal&lt;BR /&gt;group-policy GroupPolicy_1X.X.X.X attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:347297c9e6d2c5ea3638b6170b57b7bf&lt;BR /&gt;: end</description>
      <pubDate>Fri, 14 Jun 2019 14:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873184#M28135</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-14T14:56:39Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873354#M28136</link>
      <description>&lt;P&gt;put these command and display it output of packet tracer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;no nat (int_video,outside) source dynamic LAN_Video interface&lt;BR /&gt;!&lt;BR /&gt;object network LAN_Video&lt;BR /&gt;subnet 192.168.79.0 255.255.255.0&lt;BR /&gt;nat (int_video,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;object network DVR-web&lt;BR /&gt;host 192.168.79.10&lt;BR /&gt;nat (int_video,outside) static interface service tcp https 53429&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.79.10 eq https&lt;BR /&gt;!&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;packet-tracer input outside tcp 8.8.8.8 12345 X.X.X.X 53429&lt;BR /&gt;!&lt;BR /&gt;NOTE: X.X.X.X put your firewall outside ip address.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 19:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873354#M28136</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-14T19:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873399#M28137</link>
      <description>This is my packet-tracert output&lt;BR /&gt;&lt;BR /&gt;ASA-QTRO#&lt;BR /&gt;ASA-QTRO# packet-tracer input outside tcp 8.8.8.8 12345 189.213.236.130 53429&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 189.213.236.130 using egress ifc identity&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;ASA-QTRO#</description>
      <pubDate>Fri, 14 Jun 2019 22:15:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873399#M28137</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-14T22:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873415#M28138</link>
      <description>&lt;P&gt;hm.. can you try this please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network DVR-web&lt;BR /&gt;host 192.168.185.11&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object service 53429&lt;BR /&gt;service tcp source eq 53429&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object service HTTP&lt;BR /&gt;service tcp source eq https&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (wireless-house,outside) source static DVR-web interface service HTTP 53429&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 12345 189.213.236.130 53429&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;if the above even does not work.share the output command "show nat detail"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 23:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3873415#M28138</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-14T23:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3874442#M28139</link>
      <description>I am assuming that the values ​​of "DVR-web" and the "wireless-house" interface in the nat are for simulation; because they are not the real values ​​that I have.&lt;BR /&gt;&lt;BR /&gt;taking into account thats, here is the output of the packet-tracert&lt;BR /&gt;&lt;BR /&gt;ASA-QTRO# packet-tracer input outside tcp 8.8.8.8 12345 189.213.236.130 53429 det&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 189.213.236.130 using egress ifc identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc55ccc6390, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=139164, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc55d8f73a0, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=21780, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 17 Jun 2019 17:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3874442#M28139</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-17T17:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3875167#M28140</link>
      <description>&lt;P&gt;I applied the lines on ASA&lt;/P&gt;&lt;P&gt;I am assuming that the values ​​of DVR-web and in the nat wireles-house are for simulaicon since these&lt;BR /&gt;values ​​are not what I have in the configuration.&lt;/P&gt;&lt;P&gt;This is my packet-tracert output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA-QTRO#&lt;BR /&gt;ASA-QTRO# packet-tracer input outside tcp 8.8.8.8 12345 189.213.236.130 53429 $&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 189.213.236.130 using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc55ccc6390, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=188011, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc55d8f73a0, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=27329, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 15:18:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3875167#M28140</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-18T15:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding  ASA5506X</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3875199#M28141</link>
      <description>I applied the lines on ASA&lt;BR /&gt;&lt;BR /&gt;I am assuming that the values ​​of DVR-web and in the nat wireles-house are for simulaicon since these&lt;BR /&gt;values ​​are not what I have in the configuration.&lt;BR /&gt;&lt;BR /&gt;This is my packet-tracert output:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ASA-QTRO#&lt;BR /&gt;ASA-QTRO# packet-tracer input outside tcp 8.8.8.8 12345 189.213.236.130 53429 $&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 189.213.236.130 using egress ifc identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc55ccc6390, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=188011, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7fc55d8f73a0, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=27329, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 18 Jun 2019 15:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-asa5506x/m-p/3875199#M28141</guid>
      <dc:creator>ahuertavazquez</dc:creator>
      <dc:date>2019-06-18T15:57:48Z</dc:date>
    </item>
  </channel>
</rss>

