<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need help accesing a server from the internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342256#M342807</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I tried but it didn't work so I swithed it back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Just curious: If the ASDM uses https, why disabling http stopped&amp;nbsp; the communication with the ASDM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Sep 2013 15:48:33 GMT</pubDate>
    <dc:creator>ArieteCisco</dc:creator>
    <dc:date>2013-09-26T15:48:33Z</dc:date>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342244#M342794</link>
      <description>&lt;P&gt;I have recently changed my PIX 500E for an ASA 5505 version 9.0(1) but in spite of all the reading about the new NAT commands and similar problems solved I haven't been able to give access to my http and ftp server from the internet. I think my configuration is OK but I must miss something because it doesn't work.&lt;/P&gt;&lt;P&gt;Could you please take a look to my configuration and point me what id wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankyou&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gerardo&lt;/P&gt;&lt;P&gt;***************************************************************************************************&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.0(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa1&lt;/P&gt;&lt;P&gt;enable password HK8DwXVw0PRo5n0D encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.240.1 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network my-inside-net&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.240.0 255.255.255.128&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network MyPublicIP&lt;/P&gt;&lt;P&gt; host xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network FTP_PAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; host 192.168.240.19&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network WEB_PAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; host 192.168.240.19&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network NAT-DYN&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; subnet 192.168.240.0 255.255.255.128&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object my-inside-net any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp object my-inside-net any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp object my-inside-net any &lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;access-list inside_access_in extended permit icmp object my-inside-net any &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object WEB_PAT eq www &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object FTP_PAT eq ftp &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;access-list outside_access_in extended permit icmp any4 any4 &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network my-inside-net&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network FTP_PAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp ftp ftp &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt;object network WEB_PAT&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp www www &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.240.0 255.255.255.128 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username MyName password IPks.pvF1fRLc2sc encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:643794ad28d775a6a849045ced67d284&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;***************************************************************************************************&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342244#M342794</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2019-03-12T02:40:18Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342245#M342795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config looks fine (unless I miss something &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;). Were you able to access internet from internal PC/server? In general, you may need to reboot the internet devices (modem etc) to clear the arp after you chance hardware. Just wanted to check on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Sep 2013 20:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342245#M342795</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2013-09-18T20:01:32Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342246#M342796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please, remove: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;---&amp;gt; access-group inside_access_in in interface inside&amp;lt;---&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;-All you need to do is one access group in that configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Also, you can have one Object and add miltiple ACLs to it. It all depends on the services that you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;object network FTP_PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;host 192.168.240.19&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;object network WEB_PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;host 192.168.240.19&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Sep 2013 20:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342246#M342796</guid>
      <dc:creator>Oscar Castillo</dc:creator>
      <dc:date>2013-09-18T20:31:38Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342247#M342797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks MvSheik,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes, the server has internet connectivity. This is an http and ftp server that was already running and was accessed by both internal net PCs (which still can access) and from the internet (which after changing the PIX for the ASA can't anymore).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any way I reset the modem, the asa even the server but still can't access the server from internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gerardo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 07:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342247#M342797</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-19T07:59:33Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342248#M342798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you removed the default inspection configurations? I cant see them in the configurations. I would suggest adding them just for the sake of the FTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; match default-inspection-traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect dns preset_dns_map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; parameters&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; message-length maximum 512&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; no protocol-enforcement&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect sqlnet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect sunrpc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect tftp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect h323 h225&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect h323 ras&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect ip-options&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect rtsp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect skinny&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect pptp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect http&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect esmtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect ftp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-policy global_policy global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also with regarding the actual specific problem, if you issue &lt;STRONG&gt;"show access-list"&lt;/STRONG&gt; command do you see any hitcount on the ACL statements which allow TCP/80 and TCP/21?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you could try to take the output of the&lt;STRONG&gt; "packet-tracer"&lt;/STRONG&gt; command to test the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 &lt;YOUR public="" ip=""&gt; 80 &lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 &lt;YOUR public="" ip=""&gt; 21&lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though in your situation the Static PAT configuration format shouldnt matter, you could try to do the following configurations and see if they make any difference. These remove the current Static PAT (Port Forward) configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit tcp any object WEB_PAT eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit tcp any object FTP_PAT eq ftp &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no object network FTP_PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no object network WEB_PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.240.19&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp source eq 21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp source eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER interface service FTP FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER interface service WWW WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 08:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342248#M342798</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-19T08:10:16Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342249#M342799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Oscar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the access-group inside_access_in but still the same.&lt;/P&gt;&lt;P&gt;I tried with one object before but hadn't internet access to the server either. &lt;SPAN style="font-size: 10pt;"&gt;I don't think it matters so I rather use one object for each port for the sake of clarity.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gerardo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 08:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342249#M342799</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-19T08:10:23Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342250#M342800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni,&lt;/P&gt;&lt;P&gt;I did add the lines you suggested but still the server is unreachable although the packet-tracer show a better answer.&lt;/P&gt;&lt;P&gt;I had to add a line to permit the ip traffic in the outside_access_list to the server as only icmp was left after the changes.&lt;/P&gt;&lt;P&gt;This is the response to the packet-tracer command before and after.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;BEFORE*********************************************************************************&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input outside tcp 1.1.1.1 12345 X.X.X.X 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;AFTER*************************************************************************************&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input outside tcp 1.1.1.1 12345 X.X.X.X 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SERVER interface service WWW WWW&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate X.X.X.X/80 to 192.168.1.19/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any object SERVER &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SERVER interface service WWW WWW&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 1.1.1.1/12345 to 1.1.1.1/12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static SERVER interface service WWW WWW&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1491, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;and this is how my configuration looks now.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.0(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa1&lt;/P&gt;&lt;P&gt;enable password HK8DwXVw0PRo5n0D encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;object network my-inside-net&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object network MyPublicIP&lt;/P&gt;&lt;P&gt; host X.X.X.X&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NAT-DYN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.1.0 255.255.255.128&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.19&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp source eq ftp &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp source eq www &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object my-inside-net any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp object my-inside-net any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp object my-inside-net any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp object my-inside-net any &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any object SERVER &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any4 any4 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER interface service FTP FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER interface service WWW WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network my-inside-net&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.128 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username MyName password IPks.pvF1fRLc2sc encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; no protocol-enforcement&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:6f9275db2a20167e195bf1144cd05961&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gerardo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 10:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342250#M342800</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-19T10:50:51Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342251#M342801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are only using the public IP that you get for the ASA with DHCP there should be no problem reaching your ASA and therefore your server. If there was a problem no internal device could access the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You didnt reply/mention in the above reply if you we seeing any hitcounts on the output of the &lt;STRONG&gt;"show access-list"&lt;/STRONG&gt; command for this SERVER when you are testing connections from the external network. Try the connections multiple times and check the &lt;STRONG&gt;"show access-list"&lt;/STRONG&gt; command to see if the hitcount of the rule for the SERVER is increasing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do notice that using the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands add to the ACL hitcount even though no actual connection has come from the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also suggest double checking the network configurations on the SERVER and confirming that no software firewalls etc is not blocking the connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, are you sure you are targetting the correct public IP address from the external network? Since you are using DHCP to get a public IP address for your ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 14:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342251#M342801</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-09-19T14:24:39Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342252#M342802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;in fact I can access cisco ASDM from the internet. The IP is obtained by DHCP but is static, never changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did the show access-list before your changes and showed 0 hits for the server I forgot to tell.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The extrange thing is that hitcnt is only increased by the packet-tracer command not when I try a web page of the server or the ftp. Both the IIS server and ftp server are up and running I can access them from the internal network.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in; 2 elements; name hash: 0x6892a938&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 1 extended permit ip any object SERVER (hitcnt=3) 0xee330cf0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit ip any host 192.168.1.19 (hitcnt=3) 0xee330cf0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 2 extended permit icmp any4 any4 (hitcnt=1108) 0x5ac062e8 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have checked the SERVER network configuration and security settings and found nothing wrong. Also I shut down the antivirus and antispybot. But everything remains the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gerardo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 16:15:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342252#M342802</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-19T16:15:45Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342253#M342803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gerardo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you manage to get this resolved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm experiencing the same issue but I'm using a Cisco ASA 5510 with IOS 9.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My issue is the same as yours, the ACL that is applied to the Outside interface behaves like it hasn't been applied so I get no hit counts. The only statement that works and gets a hit count is the "permit icmp any any" but all my other statements which are TCP and UDP don't work, it feels like TCP and UDP requests are being dropped but even before the requests get to the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing i noticed on IOS 9.0 and later is that at the beginning of the config it shows this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if by changing them to permit would make a difference, I'll give it a go tomorrow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 00:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342253#M342803</guid>
      <dc:creator>Jonathan Rees</dc:creator>
      <dc:date>2013-09-26T00:26:34Z</dc:date>
    </item>
    <item>
      <title>Re:Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342254#M342804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gerardo,&lt;BR /&gt;Please disable ASDM.&lt;BR /&gt;&lt;BR /&gt;no http server enable&lt;BR /&gt;&lt;BR /&gt;It could be intercepting the requests for port 80.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Mike&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 05:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342254#M342804</guid>
      <dc:creator>Mike Williams</dc:creator>
      <dc:date>2013-09-26T05:14:39Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342255#M342805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jon,&lt;/P&gt;&lt;P&gt;I don't have those statements&lt;SPAN __jive_emoticon_name="info" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; so I don't think that is.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 15:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342255#M342805</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-26T15:46:28Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342256#M342807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I tried but it didn't work so I swithed it back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Just curious: If the ASDM uses https, why disabling http stopped&amp;nbsp; the communication with the ASDM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 15:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342256#M342807</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-26T15:48:33Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342257#M342808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello and thanks to all of you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't exactly resolved the issue but very very very near. I will explain:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have an ASA 5505 but two of them each of one linked to the internet with a different ISP (backup connection) and of course with a different external fixed IP.&lt;/P&gt;&lt;P&gt;So, I sended the same configuration to the other ASA and in the server I configured the gateway to be this othar asa, and then everything worked!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I switched back to the original ASA and added these lines:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="color: #000000; word-wrap: break-word; white-space: pre-wrap;"&gt;&lt;PRE style="color: #000000; word-wrap: break-word; white-space: pre-wrap;"&gt;&lt;STRONG&gt;object service FTP2121
 service tcp source eq 2121 
object service WWW8080
 service tcp source eq 8080 &lt;/STRONG&gt;&lt;/PRE&gt;
&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER interface service FTP2121 FTP2121 nat (inside,outside) source static SERVER interface service WWW8080 WWW8080&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and voila! I can connect with my SERVER web and ftp services on these ports from the outside.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I have also nated the ultraVNC port 5900 and with this I had no problem.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not a hundred percent sure but it seems that the first ISP is blocking somehow ports 21 and 80, is this even posible? its router is in bridging mode to serve the IP to my ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Sep 2013 16:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342257#M342808</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-26T16:09:23Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342258#M342809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Geraldo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is your ISP Comcast? I have done the same, I called them up, switched to bridge mode my cable modem, them let the ASA do the work.&lt;/P&gt;&lt;P&gt;Double NAT with a router in between causes many issues. I spent two days doing the same until I got my modem into Bridge mode setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 01:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342258#M342809</guid>
      <dc:creator>Oscar Castillo</dc:creator>
      <dc:date>2013-09-27T01:21:31Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342259#M342810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Oscar,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no, my ISP is Telefonica and its router has NAT deactivated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 06:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342259#M342810</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-30T06:48:55Z</dc:date>
    </item>
    <item>
      <title>Need help accesing a server from the internet</title>
      <link>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342260#M342811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to all of you, the problem is now resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was the zyxel router provided by my ISP. It was configured in routing mode, NAT deactivated, no filtering rules and giving the external IP to my ASA through DHCP but &lt;STRONG&gt;it keeped 3 ports for itself for comissioning: 21, 23 and 80&lt;/STRONG&gt;. Once I changed this ports to 2121, 2323 and 8080 they were liberated for the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 06:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-accesing-a-server-from-the-internet/m-p/2342260#M342811</guid>
      <dc:creator>ArieteCisco</dc:creator>
      <dc:date>2013-09-30T06:55:41Z</dc:date>
    </item>
  </channel>
</rss>

