<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port forwarding with ASDM 6.4 for ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380640#M308168</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, how do I get my configuration?&lt;/P&gt;&lt;P&gt;I'm a total noob when it comes to this device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Dec 2013 10:28:51 GMT</pubDate>
    <dc:creator>asdmquest</dc:creator>
    <dc:date>2013-12-02T10:28:51Z</dc:date>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380637#M308154</link>
      <description>&lt;P&gt;Hi, I'm stuck!&lt;/P&gt;&lt;P&gt;I can't seem to get port forwarding to work. I want a server in the internal network (192.168.2.39) to be accessible from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've added a static NAT rule&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit;"&gt;Interface: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit;"&gt;Source: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;192.168.2.39&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Translated&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit;"&gt;Interface: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;Outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit;"&gt; &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;Used Interface IP Address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Port Address Translation (PAT)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 0px;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Protocol: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;TCP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Original Port: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Translated Port: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;And a Access rule&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 0px;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Interface: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Action: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;Permit&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Source: &lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Destination: &lt;STRONG&gt;My WAN ip address&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Service: &lt;STRONG&gt;ssh&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG style="font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; vertical-align: baseline;"&gt;/22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Enable Logging: &lt;STRONG&gt;Checked&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I get no hits when I try to connect to my server in the internal network from outside. What am I doing wrong? &lt;/P&gt;&lt;P&gt;Obviously I'm totally new to this! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I'm at it I would like to make the IP address of the server (192.168.2.39) static, is it possible to make the dhcp lease infinite for (192.168.2.39) or is there a better way to do it ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate any help &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;\L&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 01:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380637#M308154</guid>
      <dc:creator>asdmquest</dc:creator>
      <dc:date>2019-03-13T01:05:53Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380638#M308158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;More information is needed, please post the configuration &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Nov 2013 16:48:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380638#M308158</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-30T16:48:21Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380639#M308163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I get your point on the documentation what I need is the NAT rule configuration if not I don´t know how you are configuring it, or if there are other NAT rules affecting it, or or or or get my point we need the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you cannot post any further detail please open a TAC case-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 04:02:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380639#M308163</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-12-02T04:02:43Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380640#M308168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, how do I get my configuration?&lt;/P&gt;&lt;P&gt;I'm a total noob when it comes to this device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 10:28:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380640#M308168</guid>
      <dc:creator>asdmquest</dc:creator>
      <dc:date>2013-12-02T10:28:51Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380641#M308174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want the CLI format configuration from the ASDM then you should be able to get it like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Tools&lt;/STRONG&gt; - &lt;STRONG&gt;menu&lt;/STRONG&gt; (at the top) -&amp;gt; &lt;STRONG&gt;Command Line Interface&lt;/STRONG&gt; -&amp;gt; Type &lt;STRONG&gt;show run &lt;/STRONG&gt;in the command field -&amp;gt; Press the &lt;STRONG&gt;Send -button&lt;/STRONG&gt; -&amp;gt; Copy/Paste the output here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to remove/mask any sensitive information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 10:34:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380641#M308174</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-02T10:34:18Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380642#M308178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address XX.XXX.XXX.154 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 XX.XXX.XXX.153 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.2.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http XXX.XXX.XXX.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.2.10-192.168.2.250 inside&lt;/P&gt;&lt;P&gt;dhcpd dns XX.XXX.XX.10 XX.XXX.XX.20 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 86400 interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum: ---&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 10:39:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380642#M308178</guid>
      <dc:creator>asdmquest</dc:creator>
      <dc:date>2013-12-02T10:39:09Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380643#M308181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, one thing to consider here is the fact that ASA also allows management connection through SSH though you dont seem to be using it. What I mean is that if you have any plans to manage the ASA through SSH from the external network then you would be better of changing this Static PAT (Port Forward) configurations public port to something else than the default TCP/22. This would leave you room to start using SSH at some point from the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Static PAT (Port Forward) configuration and the ACL that will allow the traffic could be accomplished in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 222 192.168.2.39 22 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark Allow SSH&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any interface outside eq 222&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that the above example uses a nondefault port of TCP/222 towards the external/public network. You can naturally change it to the default TCP/22 or even something else. If you change the port from the above then also remember to change the port to the &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; configuration above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can insert this configuration from the same place as I mentioned above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only change is that when you first go to &lt;STRONG&gt;Tools -&amp;gt; Command Line Interface &lt;/STRONG&gt;you will then need to check the section &lt;STRONG&gt;Multiple Line&lt;/STRONG&gt; which will let you attach multiple lines of configurations (the configurations above) and then press the button &lt;STRONG&gt;Send&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should send the above configurations to the device and you should be able to access the internal device through the external/public network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can naturally change the ACL above if you want to allow traffic only from certain IP addresses and not from &lt;STRONG&gt;"any" &lt;/STRONG&gt;source IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 10:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380643#M308181</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-02T10:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380644#M308183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, I will test this as soon as possible.&lt;/P&gt;&lt;P&gt;Is it possible to change the ssh port on the ASA to something else rather than 22 ?&lt;/P&gt;&lt;P&gt;I want to do this because I would like to have the default ssh port on my server in the internal network.&lt;/P&gt;&lt;P&gt;We use ssh on the ASA, its an outside firm that handles some configuration of it, so it's juste their ip range that is allowed to login into the ASA from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Sorry, you've already pointed that out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;/P&gt;&lt;P&gt;Much appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 10:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380644#M308183</guid>
      <dc:creator>asdmquest</dc:creator>
      <dc:date>2013-12-02T10:55:17Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380645#M308185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding there is no way to change the SSH port on the ASA. ASDM port is the only management connection which port can be changed freely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other option is naturally that you configure a VPN Client connection to the ASA and connect to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface IP address through the VPN with SSH or Telnet. Naturally this involves more configurations (to implement) but would let you use the default SSH port for the Static PAT (Port Forward) configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise it seems you would be stuck using ASDM only from the external network. Atleast to my understanding the SSH portforward will affect the SSH management connectivity of the ASA itself since you only have the one public IP address available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do you actually have extra public IP addresses? I was looking at your external interfaces network mask which is /29 which would mean that you have a few public IP addresses free if you have the whole subnet to your own use. In that case you could configure Static NAT with another public IP address for this internal server and not affect the ASA SSH management at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 11:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380645#M308185</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-02T11:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding with ASDM 6.4 for ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380646#M308187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think we only have one ip-adress actually.&lt;/P&gt;&lt;P&gt;But I'll have to use a non standard port for my server then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 11:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-asdm-6-4-for-asa/m-p/2380646#M308187</guid>
      <dc:creator>asdmquest</dc:creator>
      <dc:date>2013-12-02T11:18:08Z</dc:date>
    </item>
  </channel>
</rss>

