<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1( in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232133#M346912</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sometimes the ASA's smtp inspection actions break email. You can try:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;no inspect esmtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...to turn it off.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 07 Jul 2013 19:41:50 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2013-07-07T19:41:50Z</dc:date>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(3)</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232128#M346907</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a few issues configuring the right stuff for this asa with the software mentioned above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i need done...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. OpenVPN (port 1194 - UDP) - Open from outside to inside and back. - The OpenVPN server is connected to a NAS-server on a 192.168.10.xxx adress&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I have problems sending out mails from a server on the inside using either port 25 or port 587.. The asa won't let the traffic pass from inside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Last config looking for..&amp;nbsp;&amp;nbsp; I have placed a FTP-server on the inside running on port 31030. how do i get it up and running from the outside to reach it..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you guys can help me out with the config for these thru the ASDM - It would be great , but thru CLI is fine aswell..&amp;nbsp; As long as i can get those things running - i would be really happy.. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking forward to hear from you guys..&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:08:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232128#M346907</guid>
      <dc:creator>pavi</dc:creator>
      <dc:date>2019-03-12T02:08:13Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232129#M346908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this a brand new configuration? Your questions imply that it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually (but not always) you need a NAT for inside traffic to the outside. Do you have only the single public IP on the outside or do you have a subnet to work with? This bounds your options in setting up NAT entries and how to allow the things you asked about. If you can post the configuration file that would be helpful in answering your questions better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Simply add an access-list entry on the outside interface. Source any, destination real IP and port 1194 of your server (which may be associated with either a static or dynamic NAT entry).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The NAT needs to be in place for this to work. Once it is, and assuming no access-list on the inbound interface and that a route exists to the destination, traffic is allowed by default from high security (inside) to lower security zones (outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Same approach as #1 above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 16:23:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232129#M346908</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-07T16:23:22Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232130#M346909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible for you to do the lines i have to put in thru the CLI-interface..&amp;nbsp;&amp;nbsp; I tried a dozen of different ways but i don't seem to be able to do it..&amp;nbsp; Pretty new to this box - So trying to learn. hehe..&amp;nbsp;&amp;nbsp; Here is my config file - Pretty clean as for now..&amp;nbsp; Simple config - Building it up step by step..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know how to get those three requests working with the cli-commands i have to do..&amp;nbsp; if it ain't to much work.. hehe ..&amp;nbsp; Thanks alot..&amp;nbsp; AND YES - Only one public IP to work with..&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config file currently :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 21:50:51.749 UTC Sat Jul 6 2013&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname asa&lt;/P&gt;&lt;P&gt;domain-name asa&lt;/P&gt;&lt;P&gt;enable password XX encrypted&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny tcp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;passwd XX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 12&lt;/P&gt;&lt;P&gt; switchport protected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan12&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa912-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name asa&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network Work&lt;/P&gt;&lt;P&gt; host 192.168.2.10&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-713.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network Work&lt;/P&gt;&lt;P&gt; nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=brainbox&lt;/P&gt;&lt;P&gt; keypair &lt;DEFAULT-RSA-KEY&gt;&lt;/DEFAULT-RSA-KEY&gt;&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.10.10-192.168.10.30 inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt;username pascal password XX encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:XX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 16:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232130#M346909</guid>
      <dc:creator>pavi</dc:creator>
      <dc:date>2013-07-07T16:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232131#M346910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa# conf t&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config)# object network host OpenVPN_Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;﻿&lt;/SPAN&gt;asa(config-network-object)# nat (inside, outside) dynamic 192.168.10.xxx service tcp 1194&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;﻿&lt;/SPAN&gt;asa(config-network-object)# object network host FTP_Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;﻿&lt;/SPAN&gt;asa(config-network-object)# nat (inside, outside) dynamic &lt;FTP server="" address=""&gt; service tcp 31030&lt;/FTP&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config)# exit&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config)# &lt;STRONG style="font-size: 8pt; font-family: DJPEF A+ Courier,Courier;"&gt;&lt;STRONG style="font-size: 8pt; font-family: DJPEF A+ Courier,Courier;"&gt;access-list outside_access permit tcp any host OpenVPN_Server eq 1194 &lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config)# &lt;STRONG&gt;&lt;STRONG&gt;access-list outside_access permit tcp any host FTP_Server eq 31030&lt;/STRONG&gt;&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;SPAN style="font-size: 8pt;"&gt;asa(config)# &lt;/SPAN&gt;&lt;STRONG style="font-size: 8pt; font-family: DJPEF A+ Courier,Courier;"&gt;access-group outside_access interface outside &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;asa(config)exit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure why your outbound email isn't working already. Are you getting a good interface address and default route on the ASA from the outside DHCP server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 18:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232131#M346910</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-07T18:25:46Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232132#M346911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the above..&amp;nbsp; I will try it out right away and see if it works out..&amp;nbsp;&amp;nbsp; I appricate your time in this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to the email..&amp;nbsp; Its my Synology-server that comes up with an error trying to send an email..&amp;nbsp; I have set it up to send mesages thru gmail for warnings etc..&amp;nbsp;&amp;nbsp; It used to work on a different firewall without any settings..&amp;nbsp; But hasn't worked after installing this one..&amp;nbsp; So for me it sounds like that it won't let me send email from those ports without rules created in the box ??&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I will look into the log an see what error it comes up with and copy/paste it here..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so far for the info above - I will try it out and let you know if it fixed it.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/pascal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 19:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232132#M346911</guid>
      <dc:creator>pavi</dc:creator>
      <dc:date>2013-07-07T19:33:19Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232133#M346912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sometimes the ASA's smtp inspection actions break email. You can try:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;no inspect esmtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...to turn it off.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 19:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232133#M346912</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-07T19:41:50Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232134#M346913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Marvin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The email-part worked perfectly..&amp;nbsp;&amp;nbsp; I can now send emails thru it.. PERFECT !!! thanks for fixing that one..&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the other part..&amp;nbsp;&amp;nbsp; Didnt work out.. it comes with errors..&amp;nbsp; Look below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Already at the first part it goes wrong..&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;brainbox# config t&lt;/P&gt;&lt;P&gt;brainbox(config)# object network host OpenVPN_Server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;brainbox(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i believe before that one is created - The next line won't make any sense...&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;nat (inside, outside) dynamic 192.168.10.xxx service tcp 1194 &amp;lt;-----------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Uhmm.. does this make sense to you .. what is wrong?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 20:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232134#M346913</guid>
      <dc:creator>pavi</dc:creator>
      <dc:date>2013-07-07T20:08:27Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232135#M346914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great that the mail is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think my syntax was a bit off - it should be object-network etc. But you might be better off trying the GUI for setting up a public server for your two public servers. The configuration guide section here should help:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa91/asdm71/firewall/access_public_servers.html#wp1091646"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/asdm71/firewall/access_public_servers.html#wp1091646&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 20:28:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232135#M346914</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-07T20:28:48Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232136#M346915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried to follow the guide - But still not home free..&amp;nbsp; I'm just thinking...&amp;nbsp; How hard can it really be to make OpenVPN on port 1194 working..&amp;nbsp;&amp;nbsp; Thats the only port for OpenVPN that needs access thru my firewall and i can't seem to figure out how to configure it correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone in the forum here that has a Synology like i do and knows how to get this working ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appriciate your tryings Marvin..&amp;nbsp;&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Jul 2013 20:58:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232136#M346915</guid>
      <dc:creator>pavi</dc:creator>
      <dc:date>2013-07-07T20:58:42Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232137#M346916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Uhmm.. it says " Question is answered" - Not 100 percent..&amp;nbsp; Please read above this post..&amp;nbsp;&amp;nbsp;&amp;nbsp; I still need assistance...&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanks...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 09:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232137#M346916</guid>
      <dc:creator>pavi</dc:creator>
      <dc:date>2013-07-08T09:37:44Z</dc:date>
    </item>
    <item>
      <title>Port forwarding - Cisco ASA5505 - Running ASA 9.1(2) - ADSM 7.1(</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232138#M346917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pascal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you get the "object-network host" command with its associated nat and access-list entries to take? If you could post the updated configuration with that in place, we can have a look at it some more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Marvin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jul 2013 23:17:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-cisco-asa5505-running-asa-9-1-2-adsm-7-1-3/m-p/2232138#M346917</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-07-08T23:17:29Z</dc:date>
    </item>
  </channel>
</rss>

