<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with IIS PAT for ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271213#M346024</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't rolled it out as of yet, I am just trying to see if I got it configured correctly? I am hoping to roll it out and not have to fiddle with it.(as that I really don't have the expertise.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where do I need the &lt;STRONG&gt;"https"&lt;/STRONG&gt; after the &lt;STRONG&gt;"interface" ? &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really don't want any management enabled on my external interface. (only internal and management port mgt access.) Thus I didn't enable on the external port? Will this conflict with my planned configuration?&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Jul 2013 18:18:00 GMT</pubDate>
    <dc:creator>shostackr</dc:creator>
    <dc:date>2013-07-22T18:18:00Z</dc:date>
    <item>
      <title>Help with IIS PAT for ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271211#M346022</link>
      <description>&lt;P&gt;Ok I am pretty new to CISCO configuration. We recently bought an ASA so that we can secure an IIS server behind it. The IIS Server will be doing http and https. I guess I want to do a static nat to nat the outside fixed IP of the website to an internal address. (I think in CISCO terms it's called a PAT) I am just looking for someone to tell me if I configured it correctly? I think I am very close. The thing I think is wrong is for somereason the global (exernal) and nat (internal) for some reason are labeled 101? Should that be changed to something different? Any help you would provide would be sorely appreciated from a newbie like me. I think I am close, but only a trained eye could tell me how close.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif External&lt;BR /&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip address (External WEBSITE FIXEDIP) 255.255.255.0 &lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif Internal&lt;BR /&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip address (INTERNAL INTERFACE IP) 255.255.255.0 &lt;/STRONG&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;&lt;STRONG&gt;access-list External_access_in extended permit tcp any host (EXTERNAL FIXED IP) eq www &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list External_access_in extended permit tcp any host (EXTERNAL FIXED IP) eq https &lt;/STRONG&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu External 1500&lt;BR /&gt;mtu Internal 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;&lt;STRONG&gt;global (External) 101 interface&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (Internal) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;static (Internal,External) tcp interface www (INTERNAL IIS SERVER IP) www netmask 255.255.255.255 &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;static (Internal,External) tcp interface (INTERNAL IIS SERVER IP) https netmask 255.255.255.255 &lt;/STRONG&gt;&lt;BR /&gt;access-group External_access_in in interface External&lt;BR /&gt;&lt;STRONG&gt;route External 0.0.0.0 0.0.0.0 (EXTERNAL GATWAY IP OF ISP) 1&lt;/STRONG&gt;&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271211#M346022</guid>
      <dc:creator>shostackr</dc:creator>
      <dc:date>2019-03-12T02:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Help with IIS PAT for ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271212#M346023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"global" &lt;/STRONG&gt;and &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration simply match the source addresses/subnets for the Dynamic NAT or PAT. The ID number used there doesnt really matter in your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The type of NAT you ha ve done for the server is called Static PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration is otherwise fine but your missing the &lt;STRONG&gt;"https"&lt;/STRONG&gt; after the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; parameter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that connections from the External network aren't working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally with HTTPS the problem might be that the ASA uses that port for ASDM GUI management connections. If you want to change the default port of ASDM Management connections you can use the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;http server enable &lt;PORT number=""&gt;&lt;/PORT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should leave the port TCP/443 usable for other purposes on your &lt;STRONG&gt;"External"&lt;/STRONG&gt; interface. Though I have to say that I am not sure is there any overlap at the moment. You have not enabled any ASDM management on the &lt;STRONG&gt;"External" &lt;/STRONG&gt;interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use the &lt;STRONG&gt;"packet-tracer" &lt;/STRONG&gt;command to simulate a packet incoming from the External network towards your public IP address on certain port. This will usually tell you if the configurations on the ASA are OK and if the traffic/connections is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could use for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input External tcp 1.1.1.1 12345 &lt;YOUR public="" ip=""&gt; 80&lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input External tcp 1.1.1.1 12345 &lt;YOUR public="" ip=""&gt; 443&lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 18:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271212#M346023</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-22T18:03:02Z</dc:date>
    </item>
    <item>
      <title>Help with IIS PAT for ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271213#M346024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't rolled it out as of yet, I am just trying to see if I got it configured correctly? I am hoping to roll it out and not have to fiddle with it.(as that I really don't have the expertise.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where do I need the &lt;STRONG&gt;"https"&lt;/STRONG&gt; after the &lt;STRONG&gt;"interface" ? &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really don't want any management enabled on my external interface. (only internal and management port mgt access.) Thus I didn't enable on the external port? Will this conflict with my planned configuration?&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 18:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271213#M346024</guid>
      <dc:creator>shostackr</dc:creator>
      <dc:date>2013-07-22T18:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Help with IIS PAT for ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271214#M346025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only meant that you have a typo in the other Static PAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the above configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Internal,External) tcp interface www (INTERNAL IIS SERVER IP) www netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Internal,External) tcp interface (INTERNAL IIS SERVER IP) https netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Static PAT for the port TCP/443 is lacking the &lt;STRONG&gt;"https"&lt;/STRONG&gt; after the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; parameter. But as the ASA would not accept the command in its current form I am sure you would notice it eventually. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (Internal,External) tcp interface &lt;SPAN style="color: #ff0000;"&gt;https&lt;/SPAN&gt; (INTERNAL IIS SERVER IP) https netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general the configuration seems ok to me and should work.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Interfaces configured and enabled&lt;/LI&gt;&lt;LI&gt;Default route configured&lt;/LI&gt;&lt;LI&gt;Dynamic PAT and Static PAT configured for Internal users&lt;/LI&gt;&lt;LI&gt;Access-list configured and attached to the External interface&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 18:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-iis-pat-for-asa5510/m-p/2271214#M346025</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-22T18:23:50Z</dc:date>
    </item>
  </channel>
</rss>

