<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Writing Rules for inside hosts to external services in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372685#M306515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, I forgot to mention I am on a dynamic IP address on the outside interface, so how does that change the NAT statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My current running config is specified below.Thanks again, please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 192.168.1.100-192.168.1.110 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description WAN Interface&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN Interface&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Management&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa914-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;object network net-192.168.0&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network vpn-pool&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list SPLIT-TUNNEL standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-715.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN LAN destination static vpn-pool vpn-pool&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network net-192.168.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt; protocol esp encryption aes&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt; protocol esp encryption 3des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt; protocol esp encryption des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=ciscoasa&lt;/P&gt;&lt;P&gt; keypair key1&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt; certificate 57e9a552&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820234 3082019d a0030201 02020457 e9a55230 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86f70d01 09021608 63697363 6f617361 301e170d 31333132 30393139 30323235 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a170d32 33313230 37313930 3232355a 302c3111 300f0603 55040313 08636973 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613081 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100b5 44acf762 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fddc6fd7 ade7b05d 7fc1fadf 35235f68 fa6d9008 172ef1bb 82e56bf0 e7f0e795 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5426bf34 f44cf648 52d94c68 8c6d862d 11a10323 cd083810 8426b1ce d9e881ce &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f00af2d0 9a0f65d6 8521cd3e 354bfec0 012c333f 059f0f47 0b2eba3d b746d05e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05e0156a 981e125f d89167d2 5078bf84 4c04765a 0a1fea26 e28cf902 03010001 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f 0101ff04 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 04030201 86301f06 03551d23 04183016 8014dcb1 017f3656 54a3a895 0698a6aa &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e76aad7 9108301d 0603551d 0e041604 14dcb101 7f365654 a3a89506 98a6aa2e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 76aad791 08300d06 092a8648 86f70d01 01050500 03818100 51ec4061 48cc5c96 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c66421d7 a041a9dd 6b11e61b d2bb5fac f54b16ff 627f22e8 6c4a2e02 8f4c2c34 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14222a12 309ef05c 87fc09b0 abb1b17c 03140c50 6511fb3f afd5e792 a23ad6e1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b43e1826 204c7ad1 2e520458 48bc9198 8c512806 102ebb2a a9569b7b 62e41afc &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a79ee2c7 1ccea212 4a486210 aedfba1b 1c3306ed ca9d81df&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface outside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-macosx-i386-3.1.04074-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-3.1.04072-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect profiles anyconnect_client_profile disk0:/anyconnect_client_profile.xml&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev2 ssl-client &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT-TUNNEL&lt;/P&gt;&lt;P&gt; default-domain value royse.org&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value anyconnect_client_profile type user&lt;/P&gt;&lt;P&gt;username admin password KvX48a46hrlNTwvf encrypted privilege 15&lt;/P&gt;&lt;P&gt;username robr password nJixs.T/EUAomNvd encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN_Pool&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_anyconnect&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias anyconnect enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:00a3737ccf1d39cec03fc8d56b72e32c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Jan 2014 04:12:56 GMT</pubDate>
    <dc:creator>Rob Royse</dc:creator>
    <dc:date>2014-01-01T04:12:56Z</dc:date>
    <item>
      <title>Writing Rules for inside hosts to external services</title>
      <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372682#M306506</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question about how to write access rules for internal hosts. For example, what are all the commands required (including NAT translates) for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.0.238 to expose only port 5831 (TCP and UDP) to the entire internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rob&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372682#M306506</guid>
      <dc:creator>Rob Royse</dc:creator>
      <dc:date>2019-03-12T03:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Writing Rules for inside hosts to external services</title>
      <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372683#M306509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rob,&lt;BR /&gt;&lt;BR /&gt;What's your 'show version'?&lt;BR /&gt;&lt;BR /&gt;There's a quick way to perform this via ASDM using the 'Public Server' option wherein it creates NAT and ACL at the same time.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 10:01:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372683#M306509</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2013-12-31T10:01:01Z</dc:date>
    </item>
    <item>
      <title>Writing Rules for inside hosts to external services</title>
      <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372684#M306513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Rob Royse wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question about how to write access rules for internal hosts. For example, what are all the commands required (including NAT translates) for:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.0.238 to expose only port 5831 (TCP and UDP) to the entire internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rob&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rob-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 192.168.0.238&lt;/P&gt;&lt;P&gt; host 192.168.0.238&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) static [public IP]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host &lt;SPAN style="font-size: 10pt;"&gt;192.168.0.238 &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;eq 5831&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit udp any host &lt;SPAN style="font-size: 10pt;"&gt;192.168.0.238 eq 5831&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Apply the ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 00:38:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372684#M306513</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T00:38:51Z</dc:date>
    </item>
    <item>
      <title>Writing Rules for inside hosts to external services</title>
      <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372685#M306515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, I forgot to mention I am on a dynamic IP address on the outside interface, so how does that change the NAT statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My current running config is specified below.Thanks again, please advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 192.168.1.100-192.168.1.110 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description WAN Interface&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN Interface&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Management&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa914-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;object network net-192.168.0&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network vpn-pool&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list SPLIT-TUNNEL standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-715.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN LAN destination static vpn-pool vpn-pool&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network net-192.168.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt; protocol esp encryption aes&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt; protocol esp encryption 3des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt; protocol esp encryption des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=ciscoasa&lt;/P&gt;&lt;P&gt; keypair key1&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt; certificate 57e9a552&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820234 3082019d a0030201 02020457 e9a55230 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86f70d01 09021608 63697363 6f617361 301e170d 31333132 30393139 30323235 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a170d32 33313230 37313930 3232355a 302c3111 300f0603 55040313 08636973 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613081 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100b5 44acf762 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fddc6fd7 ade7b05d 7fc1fadf 35235f68 fa6d9008 172ef1bb 82e56bf0 e7f0e795 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5426bf34 f44cf648 52d94c68 8c6d862d 11a10323 cd083810 8426b1ce d9e881ce &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f00af2d0 9a0f65d6 8521cd3e 354bfec0 012c333f 059f0f47 0b2eba3d b746d05e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05e0156a 981e125f d89167d2 5078bf84 4c04765a 0a1fea26 e28cf902 03010001 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 03551d0f 0101ff04 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 04030201 86301f06 03551d23 04183016 8014dcb1 017f3656 54a3a895 0698a6aa &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e76aad7 9108301d 0603551d 0e041604 14dcb101 7f365654 a3a89506 98a6aa2e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 76aad791 08300d06 092a8648 86f70d01 01050500 03818100 51ec4061 48cc5c96 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c66421d7 a041a9dd 6b11e61b d2bb5fac f54b16ff 627f22e8 6c4a2e02 8f4c2c34 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 14222a12 309ef05c 87fc09b0 abb1b17c 03140c50 6511fb3f afd5e792 a23ad6e1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b43e1826 204c7ad1 2e520458 48bc9198 8c512806 102ebb2a a9569b7b 62e41afc &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a79ee2c7 1ccea212 4a486210 aedfba1b 1c3306ed ca9d81df&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface outside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-macosx-i386-3.1.04074-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-3.1.04072-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect profiles anyconnect_client_profile disk0:/anyconnect_client_profile.xml&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev2 ssl-client &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT-TUNNEL&lt;/P&gt;&lt;P&gt; default-domain value royse.org&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value anyconnect_client_profile type user&lt;/P&gt;&lt;P&gt;username admin password KvX48a46hrlNTwvf encrypted privilege 15&lt;/P&gt;&lt;P&gt;username robr password nJixs.T/EUAomNvd encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN_Pool&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_anyconnect&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias anyconnect enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:00a3737ccf1d39cec03fc8d56b72e32c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 04:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372685#M306515</guid>
      <dc:creator>Rob Royse</dc:creator>
      <dc:date>2014-01-01T04:12:56Z</dc:date>
    </item>
    <item>
      <title>Writing Rules for inside hosts to external services</title>
      <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372686#M306516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rob-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would now look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;The NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network 192.168.0.238&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; host 192.168.0.238&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (inside,outside) static interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;The ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list outside-in extended permit tcp any host 192.168.0.238 eq 5831&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list outside-in extended permit udp any host 192.168.0.238 eq 5831&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Apply the ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 04:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372686#M306516</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T04:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: Writing Rules for inside hosts to external services</title>
      <link>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372687#M306518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;You also have the option of configuring a port translation. You would use this if you ever need to map other ports to a different internal server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network T-192.168.0.238&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.0.238&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 5831 5831&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network U-192.168.0.238&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.0.238&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service udp 5831 5831&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host 192.168.0.238 eq 5831&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit udp any host 192.168.0.238 eq 5831&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Apply the ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Jan 2014 04:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/writing-rules-for-inside-hosts-to-external-services/m-p/2372687#M306518</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2014-01-01T04:23:08Z</dc:date>
    </item>
  </channel>
</rss>

