<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Accessing a client maching with port forwarding ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400417#M308546</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm assuming this is what you are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ****-asa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password&amp;nbsp; encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;no names&lt;/P&gt;&lt;P&gt;name **.**.***.** Cox-Static-IP&lt;/P&gt;&lt;P&gt;name ***.***.*.* Site-*****-Subnet&lt;/P&gt;&lt;P&gt;name ***.***.*.* Site-**********-Subnet&lt;/P&gt;&lt;P&gt;name **.*.*.*** Video-Camera-DVR&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address **.**.***.** 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address dhcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa823-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 68.105.28.16&lt;/P&gt;&lt;P&gt; name-server 68.105.29.16&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;object-group network MarvPc&lt;/P&gt;&lt;P&gt;object-group service 2439&lt;/P&gt;&lt;P&gt; service-object tcp source eq 2439 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Swann Security Camera TCP Admin Access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host **.**.***.** eq 9000 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Swann Security Camera HTTP Access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host **.**.***.** eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Swann Security Camera&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host **.**.***.** eq 18004 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq 2439 &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 10.0.0.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 9000 10.0.0.125 9000 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 10.0.0.125 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 18004 10.0.0.125 18004 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2439 10.0.0.110 2439 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 **.**.***.** 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer **.***.**.** &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set peer **.***.**.*** &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 20&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns **.***.**.** **.***.**.**&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.0.0.131-10.0.0.150 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;username aljoasatech password .fUia4yjsvpgYe4v encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.*** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.*** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:b0c3b7b7db62ba5122feede6a72a65f8&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Nov 2013 22:31:58 GMT</pubDate>
    <dc:creator>Phobernomicon</dc:creator>
    <dc:date>2013-11-20T22:31:58Z</dc:date>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400415#M308542</link>
      <description>&lt;P&gt;We are implementing a program on mobile phones that access port 2439 for syncing files from a computer within the domain.&amp;nbsp; I'm new to cisco routers, and am having a hard time wrapping my head around how to set this up.&amp;nbsp; I'm using an ASA 5505 with ASDM 6.2.&amp;nbsp; I'm just trying to use port forwarding to access the files. Any help would be appreciated. &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400415#M308542</guid>
      <dc:creator>Phobernomicon</dc:creator>
      <dc:date>2019-03-12T03:07:28Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400416#M308544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeremy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post current ASA config and remove any public IPs for secuirty. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 21:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400416#M308544</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-20T21:58:59Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400417#M308546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm assuming this is what you are looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ****-asa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password&amp;nbsp; encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;no names&lt;/P&gt;&lt;P&gt;name **.**.***.** Cox-Static-IP&lt;/P&gt;&lt;P&gt;name ***.***.*.* Site-*****-Subnet&lt;/P&gt;&lt;P&gt;name ***.***.*.* Site-**********-Subnet&lt;/P&gt;&lt;P&gt;name **.*.*.*** Video-Camera-DVR&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.100 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address **.**.***.** 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address dhcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa823-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone MST -7&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 68.105.28.16&lt;/P&gt;&lt;P&gt; name-server 68.105.29.16&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;object-group network MarvPc&lt;/P&gt;&lt;P&gt;object-group service 2439&lt;/P&gt;&lt;P&gt; service-object tcp source eq 2439 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Swann Security Camera TCP Admin Access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host **.**.***.** eq 9000 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Swann Security Camera HTTP Access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host **.**.***.** eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Swann Security Camera&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host **.**.***.** eq 18004 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq 2439 &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 10.0.0.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 9000 10.0.0.125 9000 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 10.0.0.125 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 18004 10.0.0.125 18004 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2439 10.0.0.110 2439 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 **.**.***.** 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer **.***.**.** &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set peer **.***.**.*** &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 20&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns **.***.**.** **.***.**.**&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.0.0.131-10.0.0.150 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;username aljoasatech password .fUia4yjsvpgYe4v encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.*** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group **.***.**.*** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:b0c3b7b7db62ba5122feede6a72a65f8&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 22:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400417#M308546</guid>
      <dc:creator>Phobernomicon</dc:creator>
      <dc:date>2013-11-20T22:31:58Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400418#M308548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your config looks fine assuming the internal machine is 10.0.0.110. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is the port definitely TCP and are you sure there are no other ports needed for this connection ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Nov 2013 22:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400418#M308548</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-20T22:58:24Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400419#M308549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I would change the next ACE due to security reasons:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any any eq 2439 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 2439&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as Jon stated the connection should go through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 01:46:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400419#M308549</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-21T01:46:55Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400420#M308550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The computer I am trying to reach is 10.0.0.110,&amp;nbsp; the server on the other hand is 10.0.0.115&amp;nbsp; Is there an issue with that? I just don't understand why this isn't working, maybe a setting I've overlooked?&amp;nbsp; I have the ports open on 10.0.0.110 and a firewall exception on the server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 18:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400420#M308550</guid>
      <dc:creator>Phobernomicon</dc:creator>
      <dc:date>2013-11-21T18:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400421#M308551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeremy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure i understand. What is the difference between the computer 10.0.0.110 and the server 10.0.0.115. Which one are you trying to sync the phones with ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 19:50:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400421#M308551</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-21T19:50:09Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400422#M308552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If they are on the same subnet traffic does not even reach the ASA so I am bit confused on what you are asking&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 21:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400422#M308552</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-21T21:00:27Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400423#M308553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The mobile phones need to sync with a client computer @10.0.0.110.&amp;nbsp; The server is 10.0.0.115.&amp;nbsp; I added this info because the router seems to be set up properly yet I still cannot connect to sync the phones.&amp;nbsp; I'm thinking I have something setup wrong somewhere, just not sure how to diagnose it.&amp;nbsp; The phones sync fine while connected to the companies wifi using 10.0.0.110.&amp;nbsp; But unreachable when I use the outside IP address.&amp;nbsp; Sorry for being confusing, I was more trying to clarify the setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 21:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400423#M308553</guid>
      <dc:creator>Phobernomicon</dc:creator>
      <dc:date>2013-11-21T21:16:40Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400424#M308554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jeremy &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still can't see anything wrong with your config. Is there a specific application name for the syncing of the phones ? It may be there is some issue with them using NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 21:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400424#M308554</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2013-11-21T21:20:29Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400425#M308555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a program called HandiFox, it's installed on the phones, and within quickbooks.&amp;nbsp; It tracks inventory and sales.&amp;nbsp; Supposedly it just needs port 2439 to be forwarded. They haven't had this problem before, is there any more info you guys would like to look at?&amp;nbsp; Nic setting, firewall settings?&amp;nbsp; My head is spinning like Linda Blair.&amp;nbsp; It has to be a rookie mistake on my part somewhere.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Nov 2013 21:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400425#M308555</guid>
      <dc:creator>Phobernomicon</dc:creator>
      <dc:date>2013-11-21T21:32:21Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400426#M308556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After pooring over it a couple more times I realized Jumora mentioned the subnet.&amp;nbsp; Finally noticed this in the log file&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2439 10.0.0.110 2439 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;The subnet mask of that address is 255.255.255.0&amp;nbsp; Looks like this is the problem.&amp;nbsp; Unfortunately I haven't found how to change the subnet of that forwarding.&amp;nbsp; How can I correct this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2013 18:56:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400426#M308556</guid>
      <dc:creator>Phobernomicon</dc:creator>
      <dc:date>2013-11-22T18:56:39Z</dc:date>
    </item>
    <item>
      <title>Accessing a client maching with port forwarding ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400427#M308557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh my friend I believe that you are confused. Please call me juanmh84 through skype today or tomorrow or at my phone number that is posted on Monday after 11 am CST.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value our effort and rate the assistance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Nov 2013 03:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/accessing-a-client-maching-with-port-forwarding-asa-5505/m-p/2400427#M308557</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-24T03:21:38Z</dc:date>
    </item>
  </channel>
</rss>

