<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 using NAT allowing incoming traffic on HTTPS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218294#M350613</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work but make sure you did this first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create the "object" that holds the real IP address of the server and the NAT configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS-WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While under the "object" configuration mode add the real IP address and the NAT configuration line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;host 192.168.1.14&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) static interface service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then make sure to configure the ACL/Access-list that allows the traffic to the Web server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark Allow HTTPS traffic to the Web Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object HTTPS-WEBSERVER eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 May 2013 16:18:53 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-03T16:18:53Z</dc:date>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218289#M350608</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a 5505 and the following network layout:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Home router =&amp;gt; ASA 5505 =&amp;gt; HTTPS webserver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The home router is on 192.168.0.1&lt;/P&gt;&lt;P&gt;ASA 5505 external 192.168.0.19&lt;/P&gt;&lt;P&gt;ASA Internal 192.168.1.1&lt;/P&gt;&lt;P&gt;HTTPS webserver 192.168.1.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need the ASA to allow only HTTPS traffic inbound through it.&lt;/P&gt;&lt;P&gt;Thanks for any help you can offer.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218289#M350608</guid>
      <dc:creator>mattatkin</dc:creator>
      <dc:date>2019-03-12T01:38:10Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218290#M350609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Couple of things you want to check/configure first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure the ASAs "outside" interface with a static IP address instead of DHCP so the IP address doesnt change and therefore prevent the NAT from working&lt;/LI&gt;&lt;LI&gt;Remember that you will have to forward the port TCP/443 also on the Home Router since it has the public IP address to which people should connect to&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Port Forward / Static PAT configuration on your ASA would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS-WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.14&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark Allow HTTPS traffic to the Web Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object HTTPS-WEBSERVER eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration will forward the TCP/443 connections coming towards your ASA "outside" interface IP address to the "inside" IP address of the Web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said you will have to both configure the ASA "outside" IP address staticly so it doesnt change (which would make the NAT useless naturally) and you will also have to do a Port Forward / Static PAT configuration on the Home Router. You will basically need to forward the port TCP/443 coming to your Home Router public IP address to the ASA "outside" interface IP address on port TCP/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the question as answered if it did. Or ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 15:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218290#M350609</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T15:52:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218291#M350610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks JouniForss, when I try to configure the external interface with an IP address or security level (ethernet 0/0) I get the error This command can only be configured on VLAN interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-M&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218291#M350610</guid>
      <dc:creator>mattatkin</dc:creator>
      <dc:date>2013-05-03T16:06:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218292#M350611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the only interface where you configure IP address information on your ASA5505 is the Vlan interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment your ASA "outside" interface is the interface Vlan2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would have to configure the IP address in this way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 192.168.0.x 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that this will naturally can cause a small outage in connections through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also make sure that the network mask I entered above is correct and choose the IP address you want instead of the "x" at the end of the IP address. This IP address should be in turn used on the Home Router as the IP address towards which you need to do the Port Forward on the Home Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:11:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218292#M350611</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T16:11:39Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218293#M350612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I put the 192.168.0.19 on the Vlan 2, (which I think logically works).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then when I tried to do the NAT mapping I got this error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# nat (inside,outside) static interface service tcp 443 443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218293#M350612</guid>
      <dc:creator>mattatkin</dc:creator>
      <dc:date>2013-05-03T16:15:03Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218294#M350613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work but make sure you did this first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create the "object" that holds the real IP address of the server and the NAT configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS-WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While under the "object" configuration mode add the real IP address and the NAT configuration line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;host 192.168.1.14&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) static interface service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then make sure to configure the ACL/Access-list that allows the traffic to the Web server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark Allow HTTPS traffic to the Web Server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object HTTPS-WEBSERVER eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:18:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218294#M350613</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T16:18:53Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218295#M350614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks working just great!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 16:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218295#M350614</guid>
      <dc:creator>mattatkin</dc:creator>
      <dc:date>2013-05-03T16:59:26Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 using NAT allowing incoming traffic on HTTPS</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218296#M350615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad its working now &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 17:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-using-nat-allowing-incoming-traffic-on-https/m-p/2218296#M350615</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T17:00:47Z</dc:date>
    </item>
  </channel>
</rss>

