<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port forwarding cisco ASA 9.1.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314120#M345666</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I used TCP/8080 in the packet-tracer as the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/2/2/148228-packetTrace.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;This is the global rule I was refering to.&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/2/2/148227-globalRule.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help so far!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 29 Jul 2013 14:24:14 GMT</pubDate>
    <dc:creator>mike.higginson</dc:creator>
    <dc:date>2013-07-29T14:24:14Z</dc:date>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314115#M345661</link>
      <description>&lt;P&gt;Hello everyone. I'm having difficulty getting an abnormal port (TCP/8080) forwarded to an internal web server(TCP/80) on a test firewall. I tried using the steps listed in a blog post I found, but haven't been able to actually get to the web server from the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My rules look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WebServer&lt;/P&gt;&lt;P&gt;host 192.168.35.150&lt;BR /&gt;description Web Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WebServer&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp www 8080&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm also attaching a redacted version of my running config. I have the firewall setup to do VPN hairpinning as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314115#M345661</guid>
      <dc:creator>mike.higginson</dc:creator>
      <dc:date>2019-03-12T02:18:18Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314116#M345662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is in the interface ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the new software 8.3 and forward the NAT is processed before the ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this both means that you have to allow the traffic to the real IP address and the real port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you change the ACL to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any interface outside eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then it should be fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can test it also with the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.1.1.1 12345 &lt;INTERFACE ip=""&gt; 80&lt;/INTERFACE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Jul 2013 19:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314116#M345662</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-28T19:36:08Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314117#M345663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for the responce Jouni! I'll test this out and let you know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 Jul 2013 21:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314117#M345663</guid>
      <dc:creator>mike.higginson</dc:creator>
      <dc:date>2013-07-28T21:48:14Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314118#M345664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I changed the access rule to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list outside_access_in extended permit tcp any interface outside eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the traffic is still being blocked. From the packet-tracer it looks like it is being blocked by an implicit rule. I see one global ACL in ASDM that looks like this. &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellspacing="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;any&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;any&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;ip&lt;/TD&gt;&lt;TD&gt;Deny&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;Default&lt;/TD&gt;&lt;TD&gt; &lt;/TD&gt;&lt;TD&gt;[Implicit rule]&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to remove the global deny rule and change it to a deny rule on the outside interface underneth my allow tcp/80 rule? 8.3 and above are a lot different than 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the packet tracer results&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jul 2013 03:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314118#M345664</guid>
      <dc:creator>mike.higginson</dc:creator>
      <dc:date>2013-07-29T03:20:18Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314119#M345665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you use the port TCP/8080 in the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; as the destination port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What global deny rule are you talking about?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jul 2013 13:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314119#M345665</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-29T13:45:29Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314120#M345666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I used TCP/8080 in the packet-tracer as the destination port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/2/2/148228-packetTrace.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;This is the global rule I was refering to.&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/2/2/148227-globalRule.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help so far!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jul 2013 14:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314120#M345666</guid>
      <dc:creator>mike.higginson</dc:creator>
      <dc:date>2013-07-29T14:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314121#M345667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I have been blind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual ACL is wrong. You were using the &lt;STRONG&gt;"interface outside"&lt;/STRONG&gt; as the destination. You need to allow the traffic to the real IP address. For some reason I completely missed that until now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also seems I managed to provide the "packet-tracer" command with completely wrong destination port also. &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt; (the TCP/80 port earlier)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;access-list outside_access_in extended permit tcp any object Webserver eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this it should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jul 2013 14:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314121#M345667</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-29T14:27:21Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314122#M345668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I figured out what it was causing the traffic to be dropped. I had configured the ASA for VPN hairpinning (u-turn) so I could VPN from a public network and be able to browse the internet securly. (more on that here &lt;A href="http://nat0.net/cisco-asa-hairpinning/"&gt;http://nat0.net/cisco-asa-hairpinning/&lt;/A&gt;) When I removed the NAT rules I created for the hairpinning the port forwarding worked sorry for the noise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the rules I had for the hairpinning.&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_VPNpool NETWORK_OBJ_VPNpool no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic NETWORK_OBJ_VPNpool interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jul 2013 04:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314122#M345668</guid>
      <dc:creator>mike.higginson</dc:creator>
      <dc:date>2013-07-30T04:37:57Z</dc:date>
    </item>
    <item>
      <title>Port forwarding cisco ASA 9.1.2</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314123#M345669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got the VPN hairpinning and port forwading working correctly! &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; I used this for VPN hairpinning &lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-11640"&gt;https://supportforums.cisco.com/docs/DOC-11640&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are my NAT rules now that everything is working. # are comments I added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# this rule allows my inside network to talk to my vpn network and visa versa&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static InsideNetwork InsideNetwork destination static VPNNetwork VPNNetwork&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Dynamic NAT for inside trafic going out&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Dynamic NAT for VPN hairpinning&lt;/P&gt;&lt;P&gt;object network VPNNetwork&lt;/P&gt;&lt;P&gt; nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Static NAT (port forward) for external 8080 to internal 80&lt;/P&gt;&lt;P&gt;object network FTBcloud&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help &lt;SPAN style="font-size: 10pt;"&gt;Jouni!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Mike H.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jul 2013 05:22:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa-9-1-2/m-p/2314123#M345669</guid>
      <dc:creator>mike.higginson</dc:creator>
      <dc:date>2013-07-30T05:22:59Z</dc:date>
    </item>
  </channel>
</rss>

