<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Firewall with 8.4 ver in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419195#M307747</link>
    <description>&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to open the following port with ASA running 8.4 version&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP: &lt;STRONG&gt;5242&lt;/STRONG&gt; and &lt;STRONG&gt;4244&lt;/STRONG&gt;&lt;BR /&gt;UDP: &lt;STRONG&gt;5243&lt;/STRONG&gt; and &lt;STRONG&gt;9785&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks.&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:12:39 GMT</pubDate>
    <dc:creator>Britto Vimalraj Anthonysamy</dc:creator>
    <dc:date>2019-03-12T03:12:39Z</dc:date>
    <item>
      <title>ASA Firewall with 8.4 ver</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419195#M307747</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to open the following port with ASA running 8.4 version&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP: &lt;STRONG&gt;5242&lt;/STRONG&gt; and &lt;STRONG&gt;4244&lt;/STRONG&gt;&lt;BR /&gt;UDP: &lt;STRONG&gt;5243&lt;/STRONG&gt; and &lt;STRONG&gt;9785&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419195#M307747</guid>
      <dc:creator>Britto Vimalraj Anthonysamy</dc:creator>
      <dc:date>2019-03-12T03:12:39Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall with 8.4 ver</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419196#M307753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean you need to configure Static PAT (Port Forward) for those ports using your ASAs external interface public IP address or do you have a spare public IP address for the internal server/host so that Static NAT can be configured instead?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to configure Static PAT (Port Forward) then you can use these as an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP5242&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 5242 5424&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP4244&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 4244 4244&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-UDP5243&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service udp 5243 5243&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-TCP9785&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service udp 9785 9785&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont have an ACL configured on your external ASA interface yet then you could configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;INTERNAL host="" ip=""&gt;&lt;/INTERNAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark Allow TCP/5242/4244 and UDP/5243/9785&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object SERVER eq 5242&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object SERVER eq 4244&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp any object SERVER eq 5243&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp any object SERVER eq 9785&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configurations are just example names for the objects and ACL. You can use something else if you want. Naturally the interface names might be different but I used the default ones.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Dec 2013 13:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419196#M307753</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-04T13:36:28Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall with 8.4 ver</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419197#M307759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here, actually these are viber, voice program that require to open these ports. Its not like port forwarding.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Dec 2013 13:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419197#M307759</guid>
      <dc:creator>Britto Vimalraj Anthonysamy</dc:creator>
      <dc:date>2013-12-04T13:52:01Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall with 8.4 ver</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419198#M307760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you need to allow the traffic from your LAN network to the external/public network? If so, then you naturally just simply allow those ports in the ACLs that control traffic out of your LAN (unless they are already allowed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Allowing traffic from LAN to WAN is no different in the new software compared to the older ASA software levels. If the traffic is opened inbound from the external network then you will have to allow the traffic to the local/real IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we are talking about connections that come from the external/public network towards some LAN device on those destination ports then you need either Static NAT for that internal host to a public IP address or a Static PAT (Port Forward) if you only have a single public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still dont know what the actual situation is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Dec 2013 13:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419198#M307760</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-04T13:56:33Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall with 8.4 ver</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419199#M307765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its from LAN to WAN which is already opened. But viber and skype are not working after placing the firewall. That's why am asking any specific acl to be created for this to work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 04:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419199#M307765</guid>
      <dc:creator>Britto Vimalraj Anthonysamy</dc:creator>
      <dc:date>2013-12-05T04:28:00Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall with 8.4 ver</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419200#M307769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't know about Viber but Skype works just fine for me through my home ASA5505 that is running a 8.4 software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest monitoring the logs through ASDM when you are attempting the connections to determine if any traffic is blocked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have simply allowed traffic from my LAN to WAN. I don't have anything opened from the WAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 07:25:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-with-8-4-ver/m-p/2419200#M307769</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T07:25:08Z</dc:date>
    </item>
  </channel>
</rss>

