<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 7.2 Port Forwarding Question? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319323#M310585</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was using ASDM to configure and was not able to select "interface" through the GUI for some reason. I removed the rules and entered them through Command line interface. It seems to be working now. Thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Oct 2013 16:37:27 GMT</pubDate>
    <dc:creator>sjoshi321</dc:creator>
    <dc:date>2013-10-22T16:37:27Z</dc:date>
    <item>
      <title>ASA 5505 7.2 Port Forwarding Question?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319319#M310578</link>
      <description>&lt;P&gt;I am trying to do some port forwarding on a ASA 5505. It seems pretty straight forward, but somehow it's not working. I am not too familiar with Cisco devices. This is an old firewall which I am trying to configure without clearing the old configuration. Here are some info about the network and from the ASA. Any Help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;24.xx.xx.xx:ASA:192.168.1.1--------------192.168.1.2:RT-N66U:192.168.3.1--------------192.168.3.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RT-N66U is not doing any NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.3.0 255.255.255.0 inside 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.3.0 255.255.255.0 inside 192.168.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.3.0 255.255.255.0 outside 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 21, untranslate_hits = 447&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.3.0 255.255.255.0 outside 192.168.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.3.0 255.255.255.0 _internal_loopback 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.3.0 255.255.255.0 _internal_loopback 192.168.202.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.3.1 eq 3389 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 24.xx.xx.xx/3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 43&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.3.1 eq 8080 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 24.xx.xx.xx/8080&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 47&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 10 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 10 (24.xx.xx.xx [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 338409, untranslate_hits = 1047890&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any _internal_loopback any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 10 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "sh access-list"&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list 100; 1 elements&lt;/P&gt;&lt;P&gt;access-list 100 line 1 extended permit ip 192.168.3.0 255.255.255.0 192.168.16.0 255.255.255.0 (hitcnt=122) 0xc73bcc27 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound; 2 elements&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound line 1 extended permit ip 192.168.3.0 255.255.255.0 192.168.16.0 255.255.255.0 (hitcnt=0) 0x388c6023 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound line 2 extended permit ip 192.168.3.0 255.255.255.0 192.168.202.0 255.255.255.0 (hitcnt=0) 0x70a9d5e2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in; 6 elements&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any eq 81 host 24.xx.xx.xx eq 81 (hitcnt=0) 0xc1148a97 &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 2 extended permit icmp any interface outside (hitcnt=0) 0xbdd73ad6 &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 3 extended permit tcp any interface outside eq 8080 (hitcnt=0) 0xdd94b34c &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 4 extended permit tcp any host 24.xx.xx.xx eq 3389 (hitcnt=0) 0xf7d1bca &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 5 extended permit tcp any eq 37777 host 24.xx.xx.xx eq 37777 (hitcnt=0) 0xa563723 &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 6 extended permit udp any eq 37778 host 24.xx.xx.xx eq 37778 (hitcnt=0) 0xae9a25bb &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap; 1 elements&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap line 1 extended permit ip any 192.168.202.0 255.255.255.0 (hitcnt=0) 0x66ad24cd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-trace input outside tcp 1.1.1.1 1234 24.xx.xx.xx 8080 det"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 24.xx.xx.xx 8080 192.168.3.1 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.3.1 eq 8080 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 24.xx.xx.xx/8080&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 47&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 24.xx.xx.xx/8080 to 192.168.3.1/8080 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 24.xx.xx.xx&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x3498270, priority=0, domain=permit, deny=true&lt;/P&gt;&lt;P&gt; hits=1251390, user_data=0x9, cs_id=0x0, flags=0x1000, protocol=0&lt;/P&gt;&lt;P&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:54:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319319#M310578</guid>
      <dc:creator>sjoshi321</dc:creator>
      <dc:date>2019-03-12T02:54:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 7.2 Port Forwarding Question?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319320#M310579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It matches the NAT rule as we can see from the UN-NAT Phase, yet it drops at the ACL Phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide the output of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run access-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant see any hitcount in the above ACL so it seems to me that either no traffic has come or the ACL has not been attached to the interface with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, a better view (for me personally atleast) of the NAT configuration could be provided with the output of the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run static&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 16:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319320#M310579</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T16:01:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 7.2 Port Forwarding Question?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319321#M310581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the quick reply. Here are the results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run access-group"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run global"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run static"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 24.xx.xx.xx 3389 192.168.3.1 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 24.xx.xx.xx 8080 192.168.3.1 8080 netmask 255.255.255.255 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 16:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319321#M310581</guid>
      <dc:creator>sjoshi321</dc:creator>
      <dc:date>2013-10-22T16:06:29Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 7.2 Port Forwarding Question?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319322#M310583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the public IP address used in the Static PAT (Port Forward) supposed to be the public IP address configured on the interface &lt;STRONG&gt;"outside"&lt;/STRONG&gt; of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is the case then a Static PAT configuration would usually look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 3389 192.168.3.1 3389 netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 8080 192.168.3.1 8080 netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The parameter &lt;STRONG&gt;"interface"&lt;/STRONG&gt; specifies that the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address will be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a spare public IP address for this Static PAT configuration then you naturally specify that public IP address in the actual &lt;STRONG&gt;"static"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems your ACL is attached correctly but I wonder why the ACL doesnt see any hitcount. Its hitcount should increase with the use of &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command even.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess there must be somekind of missmatch between the Static PAT and the ACL rules. Even though they have the rule for the TCP/8080 to &lt;STRONG&gt;"interface outside"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you can try it with this too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit tcp any host 24.x.x.x eq 8080&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 16:13:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319322#M310583</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-22T16:13:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 7.2 Port Forwarding Question?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319323#M310585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was using ASDM to configure and was not able to select "interface" through the GUI for some reason. I removed the rules and entered them through Command line interface. It seems to be working now. Thanks a lot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Oct 2013 16:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-7-2-port-forwarding-question/m-p/2319323#M310585</guid>
      <dc:creator>sjoshi321</dc:creator>
      <dc:date>2013-10-22T16:37:27Z</dc:date>
    </item>
  </channel>
</rss>

