<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port forwarding with an ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369732#M308791</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some reason I managed to completely miss the Manual NAT configuration you had for Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Jumora mentioned above the problem is the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,Outside) source dynamic All_Inside_Networks interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do do the following change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (any,Outside) source dynamic All_Inside_Networks interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,Outside) after-auto source dynamic All_Inside_Networks interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that this change will cause a small outage in the outbound connections as you are changing the Dynamic PAT configuration for all users. But this is the configuration that is causing problems with the Static PAT (Port Forward)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Nov 2013 10:09:37 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-11-19T10:09:37Z</dc:date>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369724#M308771</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've recently bought a Cisco ASA 5520 on eBay for study and I've decided to use it solely as a firewall between my home LAN and the Internet. Wow, what a learning curve! I've managed to add my internal networks as objects and create a NAT rule (thanks for youtube) to PAT my internal devices to get out to the Internet with ASDM but I'm really struggling to do the following: -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;- allow any incoming traffic that hits the external facing interface destined for port 38921 and nat to 10.1.10.101:38921&lt;/P&gt;- allow any incoming traffic that hits the external facing interface destined for port 30392 and nat to 10.1.10.101:30392&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone guide me on how to do this, as I have a couple of services running behind these ports on a server that I want to get at when I'm not at home? My (rather messy) config is as follows: -&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;hostname FW1&lt;/P&gt;&lt;P&gt;enable password encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;description **External facing to Internet**&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description **Internal Facing to 3750**&lt;/P&gt;&lt;P&gt;nameif Internal&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.1.10.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network VLAN1&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Legacy&lt;/P&gt;&lt;P&gt;object network WiredLAN&lt;/P&gt;&lt;P&gt;subnet 10.1.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Wired LAN&lt;/P&gt;&lt;P&gt;object network CorporateWifi&lt;/P&gt;&lt;P&gt;subnet 10.1.160.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Corporate Wireless VLAN 160&lt;/P&gt;&lt;P&gt;object network GuestWifi&lt;/P&gt;&lt;P&gt;subnet 10.1.165.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Guest Wireless VLAN 165&lt;/P&gt;&lt;P&gt;object network LegacyLAN&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Legacy LAN in place until change over&lt;/P&gt;&lt;P&gt;object network FileServer&lt;/P&gt;&lt;P&gt;host 10.1.10.101&lt;/P&gt;&lt;P&gt;description File Server&lt;/P&gt;&lt;P&gt;object service Service1&lt;/P&gt;&lt;P&gt;service tcp source eq 38921 destination eq 38921 &lt;/P&gt;&lt;P&gt;description 1st service&lt;/P&gt;&lt;P&gt;object-group network All_Inside_Networks&lt;/P&gt;&lt;P&gt;network-object object VLAN1&lt;/P&gt;&lt;P&gt;network-object object WiredLAN&lt;/P&gt;&lt;P&gt;network-object object CorporateWifi&lt;/P&gt;&lt;P&gt;network-object object GuestWifi&lt;/P&gt;&lt;P&gt;network-object object LegacyLAN&lt;/P&gt;&lt;P&gt;object-group service Service2 tcp-udp&lt;/P&gt;&lt;P&gt;port-object eq 30392&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCPUDP_1 tcp-udp&lt;/P&gt;&lt;P&gt;port-object eq 30392&lt;/P&gt;&lt;P&gt;group-object Service2&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt;protocol-object udp&lt;/P&gt;&lt;P&gt;protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit object-group TCPUDP any object FileServer object-group DM_INLINE_TCPUDP_1 inactive &lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit object Service1 any object FileServer inactive &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Internal 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-714.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (Internal,Outside) source dynamic FileServer interface service Service1 Service1 inactive&lt;/P&gt;&lt;P&gt;nat (any,Outside) source dynamic All_Inside_Networks interface&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;route Internal 10.1.160.0 255.255.255.0 10.1.10.1 1&lt;/P&gt;&lt;P&gt;route Internal 10.1.165.0 255.255.255.0 10.1.10.1 1&lt;/P&gt;&lt;P&gt;route Internal 192.168.1.0 255.255.255.0 10.1.10.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.160.15 255.255.255.255 Internal&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet 10.1.160.15 255.255.255.255 Internal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface Outside&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username Barry password encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:19be38edefe8c3fd05e720aedee62c8e&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369724#M308771</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2019-03-12T03:05:57Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369725#M308774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you want to configure Static PAT (Port Forward) for these 2 mentioned ports&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can accomplish that with the following configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-TCP38921&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.1.10.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (Internal,outside) static interface service tcp 38921 38921&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-TCP30392&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.1.10.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (Internal,outside) static interface service tcp 30392 30392&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Outside_access_in extended permit tcp any object STATIC-PAT-TCP38921 eq 38921&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Outside_access_in extended permit tcp any object STATIC-PAT-TCP30392 eq 30392&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A few things to consider&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If either of the ports was actually meant to be UDP then replace the parameter &lt;STRONG&gt;"tcp"&lt;/STRONG&gt; with &lt;STRONG&gt;"udp"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Choose your own names for the objects as they arent really descriptive of the actual service&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might also have the chance to configure Client VPN on your firewall which would enable you to access the servers securely without opening any other external access. You could either use IPsec VPN with a 3rd party VPN Client or Cisco AnyConnect if its installed on the ASA. But this is just a suggestion of what you could go for in the future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also wrote a document about the new NAT 8.3+ (software level) configuration format. Maybe it will help. It can be found here&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-31116"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more and naturally if you have some other NAT related or ASA configuration related problems then post a question here on the forums.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Nov 2013 15:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369725#M308774</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-16T15:52:54Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369726#M308776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Jouni - I'll give that a try and post back with how it goes!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Nov 2013 20:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369726#M308776</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2013-11-17T20:54:58Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369727#M308779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK then... so... I've made the changes and tested this externally and it still doesn't work. I ran packet tracer to try and get an idea of what it's doing and this was the result: -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input Outside tcp 9.13.12.6 3456 10.1.10.101 30392&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.1.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; Internal&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object STATIC-PAT-TCP30392 eq 30392&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (any,Outside) source dynamic All_Inside_Networks interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Internal&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input Outside tcp 9.13.12.6 3456 [Public IP Address removed] 30392&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So when I'm trying to connect to the services on the public facing IP address from somewhere out on the Internet, it's being dropped by the implicit rule. Do I need a rule to allow any incoming on tcp port 30392? If so, once I add that rule am I simply going to start hitting the same NAT problem like in the first trace? How do I fix the NAT drop from the first trace?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 00:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369727#M308779</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2013-11-19T00:04:38Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369728#M308781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; fails because you are using the internal IP address as the target. You will never see traffic coming from the Internet with the target IP address that is a private IP address. Because you target the internal IP address and not the public IP address then the other direction of the test matches no NAT rules and the reverse check fails because it matches a NAT rule. For the traffic to pass the traffic must match the same NAT rule on both direction. But the main problem here is that you are indeed targetting the internal IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with the second &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output is that its not matching any NAT configuration. Before any ACCESS-LIST Phase you should be seeing an UN-NAT Phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are not seeing one the reason could be&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You dont have the correct NAT configuration present&lt;/LI&gt;&lt;LI&gt;There is another NAT configuration present that overrides the Static PAT (Port Forward)&lt;/LI&gt;&lt;LI&gt;There is some bug that prevents the traffic from matching the correct NAT rule&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To determine what the reason is we should see your NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 00:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369728#M308781</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-19T00:11:47Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369729#M308784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;1. This is just a configuration example and another option with to due this and avoid sending us the complete NAT configuration:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;object network 10.1.10.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;host 10.1.10.101&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;object service 38921&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt; &lt;/STRONG&gt;&lt;SPAN style="white-space: pre; background-color: #ffffff; font-family: arial, helvetica, sans-serif;"&gt; service tcp source eq 38921&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f7fafb; font-family: Arial, verdana, sans-serif; font-size: 11.818181991577148px;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;object service 30392&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="white-space: pre; background-color: #ffffff; font-family: arial, helvetica, sans-serif;"&gt; service tcp source eq 30392&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="white-space: pre; background-color: #ffffff; font-family: arial, helvetica, sans-serif;"&gt;nat (inside,outside) 1 source static 10.1.10.101 interface service &lt;/SPAN&gt;&lt;SPAN style="background-color: transparent; font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;38921&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="background-color: transparent; font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;38921&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static 10.1.10.101 interface service 30392&amp;nbsp; 30392&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Let me know if it works&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 04:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369729#M308784</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T04:15:22Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369730#M308786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI: it is because of your manual NAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 04:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369730#M308786</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T04:43:44Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369731#M308789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I say, I've only just got this so it's all new to me. NAT config is as follows: -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW# sh run nat&lt;/P&gt;&lt;P&gt;nat (Internal,Outside) source dynamic FileServer interface service Service1 Service1 inactive&lt;/P&gt;&lt;P&gt;nat (any,Outside) source dynamic All_Inside_Networks interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network STATIC-PAT-TCP38921&lt;/P&gt;&lt;P&gt; nat (Internal,Outside) static interface service tcp 38921 38921&lt;/P&gt;&lt;P&gt;object network STATIC-PAT-TCP30392&lt;/P&gt;&lt;P&gt; nat (Internal,Outside) static interface service tcp 30392 30392&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first NAT rule (which I deactivated) was part of my original attempt to get this working...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 09:34:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369731#M308789</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2013-11-19T09:34:54Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369732#M308791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some reason I managed to completely miss the Manual NAT configuration you had for Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Jumora mentioned above the problem is the following command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,Outside) source dynamic All_Inside_Networks interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do do the following change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (any,Outside) source dynamic All_Inside_Networks interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,Outside) after-auto source dynamic All_Inside_Networks interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that this change will cause a small outage in the outbound connections as you are changing the Dynamic PAT configuration for all users. But this is the configuration that is causing problems with the Static PAT (Port Forward)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 10:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369732#M308791</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-19T10:09:37Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369733#M308792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;A&gt;&lt;/A&gt;&lt;A&gt;&lt;/A&gt;Jouni! As far as packet tracer is concerned, that seems to have done the trick. I'll test it externally when I next get the chance. Packet tracer now shows...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW(config)# packet-tracer input Outside tcp 9.13.12.6 3456 [Public IP Address removed] 30392&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network STATIC-PAT-TCP30392&lt;BR /&gt; nat (Internal,Outside) static interface service tcp 30392 30392&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface Internal&lt;BR /&gt;Untranslate [Public IP Address removed]/30392 to 10.1.10.101/30392&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object STATIC-PAT-TCP30392 eq 30392&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network STATIC-PAT-TCP30392&lt;BR /&gt; nat (Internal,Outside) static interface service tcp 30392 30392&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 2, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Internal&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what is it that 'after-auto' keyword changes to allow the traffic flow?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 12:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369733#M308792</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2013-11-19T12:49:16Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369734#M308793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; And thanks too for you input Jumora! Much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 12:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369734#M308793</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2013-11-19T12:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369735#M308794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember also to mark &lt;STRONG&gt;Jumoras&lt;/STRONG&gt; reply as the correct answer since he noticed it first. He also provided another &lt;STRONG&gt;"nat" &lt;/STRONG&gt;configuration that would work in your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually suggest changing the existing configuration though since it keeps the configuration clearer to read and manage in the long run but that is naturally my personal opinion only &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; its there only to change the priority of the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give you the all the information shortly consider these facts about the new NAT behaviour and operation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;There are 2 NAT Rule types: Auto NAT and Manual NAT &lt;UL&gt;&lt;LI&gt;Auto NAT is NAT configured under an &lt;STRONG&gt;"object"&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Manual NAT is NOT configured under any &lt;STRONG&gt;"object"&lt;/STRONG&gt; but rather uses&lt;STRONG&gt; "object"&lt;/STRONG&gt; and &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; as its parameters&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;There are 3 Sections of NAT &lt;UL&gt;&lt;LI&gt;Section 1 is Manual NAT&lt;/LI&gt;&lt;LI&gt;Section 2 is Auto NAT&lt;/LI&gt;&lt;LI&gt;Section 3 is Manual NAT&lt;/LI&gt;&lt;LI&gt;They are processed in that order for a match&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Manual NAT is by default Section 1 &lt;UL&gt;&lt;LI&gt;The &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration &lt;STRONG&gt;WITHOUT "after-auto"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Auto NAT is always Section 2 &lt;UL&gt;&lt;LI&gt;For example the Static PAT (Port Forward) we configured&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Manual NAT is also Section 3 &lt;UL&gt;&lt;LI&gt;The "nat" configuration&lt;STRONG&gt; WITH "after-auto"&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you consider all the above mentioned points you will notice that we configured a Section 2 Auto NAT and you had a Section 1 Manual NAT. The Section 1 Manual NAT in this case overrided the Section 2 Auto NAT (since it uses the same public IP address) therefore the Static PAT we configured with Auto NAT didnt work. We then changed the existing configuration to include &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt;. Since this means the NAT configuration is now Section 3 it means it cant override the Section 2 Auto NAT (Static PAT) we configured and it started working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; The &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; also refers that this NAT rule will be after Auto NAT which you will see if you look at the ASDM or CLI of the NAT configuration. You will notice the existing "nat" you changed has now moved to the very bottom.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it makes sense &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check a document I wrote for a bit more information about the above subject.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-31116" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 13:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369735#M308794</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-19T13:03:43Z</dc:date>
    </item>
    <item>
      <title>Port forwarding with an ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369736#M308795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the explanation - makes sense now. I'll take a look at the document too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 13:13:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-with-an-asa-5520/m-p/2369736#M308795</guid>
      <dc:creator>bazzaroo</dc:creator>
      <dc:date>2013-11-19T13:13:22Z</dc:date>
    </item>
  </channel>
</rss>

