<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic allow outside vendor server access to their inside server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180278#M356944</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration does look like it would allow the traffic to the LAN server 192.168.100.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell what NAT configuration that host has?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the object with the IP address 192.168.100.1 but not the NAT configuration under the object for it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Feb 2013 23:30:44 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-02-07T23:30:44Z</dc:date>
    <item>
      <title>allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180275#M356941</link>
      <description>&lt;P&gt;hi everyone we have an outside vendor requesting access to a server they&amp;nbsp; manage through our firewall. They are asking for 3 ports open from their&amp;nbsp; public ip range. They have a unix server that needs to connect to their unix server inside our network that they support. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the asdm 6.4 I set up network objects for their&amp;nbsp; public IP range, ports requested, and the internal server. I added an&amp;nbsp; access rule for the outside interface to allow their source &amp;gt; inside&amp;nbsp; server &amp;gt; tcp ports. They are able to ping our outside public IP, but&amp;nbsp; when attempting to initiate a connection from their server to ours, it&amp;nbsp; is timing out. How can I troubleshoot this ACL? when they ping or&amp;nbsp; attempt the connection, nothing appears in the asdm syslog messages. I have turned all logging to informational and pushed it to my desktop and nowhere in the log does it show any of their IP's. The hitcount on the access list is zero. The list entry is enabled. Pasted below is a sanitized [hopefully] firewall config. Thanks in advance for any help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Call-home enabled from prompt by enable_15 at 18:19:21 UTC Sep 30 2012&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname XX-xx-1&lt;/P&gt;&lt;P&gt;domain-name xxxxxx.com&lt;/P&gt;&lt;P&gt;enable password xxxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxx.xxxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xx.xx.xx.147 255.255.255.240 standby xx.xx.xx.148 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.100.241 255.255.255.0 standby 192.168.100.242 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name xxxxxx.com&lt;/P&gt;&lt;P&gt;dns server-group defaultdns&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network Exchange&lt;/P&gt;&lt;P&gt; host 192.168.100.19&lt;/P&gt;&lt;P&gt; description mail server&lt;/P&gt;&lt;P&gt;object network xxxcrystal&lt;/P&gt;&lt;P&gt; host 192.168.100.34&lt;/P&gt;&lt;P&gt;object network crystal&lt;/P&gt;&lt;P&gt; host 192.168.100.50&lt;/P&gt;&lt;P&gt;object network xx-crystal&lt;/P&gt;&lt;P&gt; host 192.168.100.14&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.22.96_&lt;/P&gt;&lt;DIV&gt;27&lt;BR /&gt; subnet 192.168.22.96 255.255.255.224&lt;BR /&gt;object network VENDORXXX_server&lt;BR /&gt; host 192.168.100.1&lt;BR /&gt; description VENDORXXX server&lt;BR /&gt;object network vendorxxx_external&lt;BR /&gt; range xx.xx.57.160 xx.xx.57.168&lt;BR /&gt; description vendorxxx public IP's&lt;BR /&gt;object-group service VENDORXXX_service_group&lt;BR /&gt; description&amp;nbsp; One object to group together mulitple ports and services for outside&amp;nbsp; VENDORXXX IP objects to access inside VENDORXXX server object&lt;BR /&gt; service-object tcp destination eq 1026 &lt;BR /&gt; service-object tcp destination eq 4433 &lt;BR /&gt; service-object tcp destination eq 4434 &lt;BR /&gt;access-list ISP-INBOUND extended permit icmp any any echo-reply &lt;BR /&gt;access-list ISP-INBOUND extended permit icmp any any unreachable &lt;BR /&gt;access-list ISP-INBOUND extended permit icmp any any echo &lt;BR /&gt;access-list ISP-INBOUND extended permit icmp any any time-exceeded &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp host xx.xx.xx.151 eq www any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp host xx.xx.xx.151 eq 6338 any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit udp host xx.xx.xx.151 eq 6338 any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp host xx.xx.xx.149 eq smtp any &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp host xx.xx.xx.149 eq www any &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp host xx.xx.xx.149 eq https any &lt;BR /&gt;access-list ISP-INBOUND extended deny tcp any host xx.xx.xx.149 eq 3389 &lt;BR /&gt;access-list ISP-INBOUND extended deny tcp any host xx.xx.xx.151 eq 3389 &lt;BR /&gt;access-list ISP-INBOUND extended permit udp any eq domain any &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.151 eq 1433 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.151 eq 8080 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.151 eq 6400 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq www inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 6338 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit udp any host xx.xx.xx.150 eq 6338 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 1433 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 8080 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp any host xx.xx.xx.150 eq 6400 inactive &lt;BR /&gt;access-list ISP-INBOUND extended deny ip any host xx.xx.xx.151 log &lt;BR /&gt;access-list ISP-INBOUND extended deny ip any host xx.xx.xx.150 log &lt;BR /&gt;access-list ISP-INBOUND extended permit ip any any &lt;BR /&gt;access-list ISP-INBOUND extended permit tcp host xx.xx.xx.153 eq 2427 any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit udp host xx.xx.xx.153 eq 2427 any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit udp host xx.xx.xx.153 range 16400 16990 any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit ip host xx.221.32.59 any inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit ip host xx.250.71.186 host xx.xx.xx.151 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit ip host xx.7.229.50 host xx.xx.xx.150 inactive &lt;BR /&gt;access-list ISP-INBOUND extended permit ip host xx.7.229.50 host xx.xx.xx.151 inactive &lt;BR /&gt;access-list ISP-INBOUND remark Allows specific services from external vendorxxx IP's access to the internal vendorxxx server&lt;BR /&gt;access-list&amp;nbsp; ISP-INBOUND extended permit object-group VENDORXXX_service_group object&amp;nbsp; vendorxxx_external object VENDORXXX_server log &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.180.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.180.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.180.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.150.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxxLAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.160.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.140.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxxxLAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.110.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxxx LAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.170.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Don't NAT xxxxxLAN to remote sites' PIX/ASA networks&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.110.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.140.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.150.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.160.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.170.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Don't NAT office LANs to VPN clients&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.105.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.110.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.120.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.130.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.140.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.150.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.160.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.170.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT remark - Rules to remove after all sites are migrated&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxxxLAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.105.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xx xxxxLAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xx LAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.130.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx Center LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx xxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx Center LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Don't NAT xxxx xxxx LAN to remote sites' PIX/ASA networks&lt;BR /&gt;access-list NO-NAT remark - Don't NAT office LANs to VPN clients&lt;BR /&gt;access-list NO-NAT remark - Rules to remove after all sites are migrated&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx xxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx xx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxx xxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx LAN&lt;BR /&gt;access-list NO-NAT remark - Do not NAT traffic from any site to xxxx xxx LAN&lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.100.0 255.255.255.0 192.168.190.0 255.255.255.0 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.190.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list NO-NAT extended permit ip 192.168.0.0 255.255.0.0 192.168.190.0 255.255.255.0 &lt;BR /&gt;access-list ALLOW-ALL extended permit ip any any &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.100.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.105.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.110.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.120.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.130.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.140.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.150.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.160.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.170.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.180.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list SPLIT-TUNNEL extended permit ip 192.168.190.0 255.255.255.0 192.168.22.96 255.255.255.224 &lt;BR /&gt;access-list standard-split-tunnel-test remark testing split tunnel&lt;BR /&gt;access-list standard-split-tunnel-test standard permit 192.168.0.0 255.255.0.0 &lt;BR /&gt;access-list standard-split-tunnel-test remark testing split tunnel&lt;BR /&gt;access-list global_mpc extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging standby&lt;BR /&gt;logging console informational&lt;BR /&gt;logging monitor informational&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging history informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging mail informational&lt;BR /&gt;logging device-id hostname&lt;BR /&gt;logging host inside 192.168.100.10&lt;BR /&gt;logging debug-trace&lt;BR /&gt;no logging message 313005&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 710005&lt;BR /&gt;no logging message 715075&lt;BR /&gt;no logging message 733100&lt;BR /&gt;no logging message 715047&lt;BR /&gt;no logging message 715046&lt;BR /&gt;no logging message 304001&lt;BR /&gt;no logging message 715036&lt;BR /&gt;no logging message 111005&lt;BR /&gt;no logging message 713236&lt;BR /&gt;no logging message 609002&lt;BR /&gt;no logging message 609001&lt;BR /&gt;flow-export destination inside 192.168.100.10 2055&lt;BR /&gt;flow-export delay flow-create 60&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip local pool vpn-pool 192.168.22.96-192.168.22.127 mask 255.255.255.224&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover Ethernet0/3&lt;BR /&gt;failover link failover Ethernet0/3&lt;BR /&gt;failover interface ip failover 10.10.10.1 255.255.255.252 standby 10.10.10.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any unreachable outside&lt;BR /&gt;icmp permit any echo outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.22.96_27 NETWORK_OBJ_192.168.22.96_27 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network xxxcrystal&lt;BR /&gt; nat (inside,outside) static xx.xx.xx.152&lt;BR /&gt;object network xxxx&lt;BR /&gt; nat (inside,outside) static xx.xx.xx.151&lt;BR /&gt;object network xx-xxxx&lt;BR /&gt; nat (inside,outside) static xx.xx.xx.150&lt;BR /&gt;object network exchange&lt;BR /&gt; nat (inside,outside) static xx.xx.xx.149&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group ISP-INBOUND in interface outside&lt;BR /&gt;access-group ALLOW-ALL in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xx.xx.xx.145 1&lt;BR /&gt;route inside xxxxxxxxxxx 255.255.255.252 192.168.100.254 1&lt;BR /&gt;route inside 192.168.100.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.105.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.110.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.120.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.130.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.140.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.150.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.160.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.170.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.180.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;route inside 192.168.190.0 255.255.255.0 192.168.100.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server LDAP protocol ldap&lt;BR /&gt;aaa-server LDAP (inside) host xxxxxx&lt;BR /&gt; server-port 636&lt;BR /&gt; ldap-base-dn ou=users,dc=xxxxxx,dc=com&lt;BR /&gt; ldap-naming-attribute sAMAccountName&lt;BR /&gt; ldap-login-password xxxxxx&lt;BR /&gt; ldap-login-dn xxxxxx\xxxxxxx&lt;BR /&gt; ldap-over-ssl enable&lt;BR /&gt; server-type microsoft&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.100.10 255.255.255.255 inside&lt;BR /&gt;http 192.168.100.135 255.255.255.255 inside&lt;BR /&gt;http 192.168.100.13 255.255.255.255 inside&lt;BR /&gt;http redirect outside 80&lt;BR /&gt;snmp-server host inside 192.168.100.96 community xxxxxx version 2c&lt;BR /&gt;snmp-server location xxxx&lt;BR /&gt;&lt;SPAN&gt;snmp-server contact &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:xxxxxx@xxxxxx.com" target="_blank"&gt;xxxxxx@xxxxxx.com&lt;/A&gt;&lt;BR /&gt;snmp-server community xxxxxxx&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;ssh xxxxx 255.255.255.0 outside&lt;BR /&gt;ssh xxxxxxxx0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat shun except ip-address 192.168.100.0 255.255.255.0&lt;BR /&gt;threat-detection scanning-threat shun duration 7200&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 132.249.20.88 source outside prefer&lt;BR /&gt;x&lt;BR /&gt;username xxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username vendorxxxuser passwordxxxxxencrypted privilege 3&lt;BR /&gt;username vendorxxxuser attributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxpassword xxxxxencrypted privilege 3&lt;BR /&gt;username xxxxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxpassword xxxxencrypted privilege 3&lt;BR /&gt;username xxxxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxxpassword xxxxxencrypted privilege 15&lt;BR /&gt;username xxxxxpassword xxxxxxencrypted privilege 15&lt;BR /&gt;username xxxxpassword xxxxx. encrypted privilege 15&lt;BR /&gt;username xxxxpassword xxxxencrypted privilege 15&lt;BR /&gt;username xxxxxpassword xxxxxencrypted privilege 5&lt;BR /&gt;username xxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxpassword FFN.xxxxxencrypted privilege 3&lt;BR /&gt;username xxxxxxattributes&lt;BR /&gt; vpn-group-policy "GroupPolicy_anyconnect vpn"&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxpassword Pj.xxxxencrypted privilege 3&lt;BR /&gt;username xxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxxpassword /xxxxencrypted privilege 3&lt;BR /&gt;username xxxxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxxxpassword xxxxxxxxxxxencrypted privilege 3&lt;BR /&gt;username xxxxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxpassword xxxxencrypted privilege 3&lt;BR /&gt;username xxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxpassword xxxxx.wS.2jUn encrypted privilege 3&lt;BR /&gt;username xxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username xxxxxpassword xxxxencrypted privilege 3&lt;BR /&gt;username xxxxxattributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group "anyconnect vpn" type remote-access&lt;BR /&gt;tunnel-group "anyconnect vpn" general-attributes&lt;BR /&gt; address-pool vpn-pool&lt;BR /&gt; default-group-policy "GroupPolicy_anyconnect vpn"&lt;BR /&gt;tunnel-group "anyconnect vpn" webvpn-attributes&lt;BR /&gt; group-alias "anyconnect vpn" enable&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt; match access-list global_mpc&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; description netflow to 192.168.100.10&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt; class global-class&lt;BR /&gt;&amp;nbsp; flow-export event-type all destination 192.168.100.10&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command service-policy&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege clear level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:xxxxxx &lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:57:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180275#M356941</guid>
      <dc:creator>ethan12345</dc:creator>
      <dc:date>2019-03-12T00:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180276#M356942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems you might be using the Public NAT IP address of your servers as the destination IP address in the ISP-INBOUND ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From ASA software 8.3 onwards you need to use the Real IP Address of the LAN host as the destination. Even when opening traffic from the Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that you can actually use the "object network" in the ACL too instead of "host x.x.x.x"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Format could for example be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit tcp any object &lt;OBJECT name=""&gt; eq &lt;SERVICE&gt;&lt;/SERVICE&gt;&lt;/OBJECT&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 22:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180276#M356942</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-07T22:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180277#M356943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok so Im using the asdm 6.4 and alot of this was written [messy I know] by the asdm gui application. As you can see above I created 3 objects in the asdm. 1 object for the internal verndor server 192.168.100.1, another object for the ports to be opened, and a 3rd object for the public IP range of the vendors outside servers. When I created those objects, the asdm wrote the following to the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VENDORXXX_server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.100.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description VENDORXXX server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network vendorxxx_external&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; range xx.xx.57.160 xx.xx.57.168&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description vendorxxx public IP's&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service VENDORXXX_service_group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description&amp;nbsp; One object to group together mulitple ports and services&amp;nbsp; for outside&amp;nbsp; VENDORXXX IP objects to access inside VENDORXXX server&amp;nbsp; object&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq 1026 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq 4433 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service-object tcp destination eq 4434 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, in the asdm I added a new line to the ACL on the outside interface, and it automatically added it to the ISP-INBOUND ACL which looks like the following when written to the config by the asdm:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ISP-INBOUND remark Allows specific services from external vendorxxx IP's access to the internal vendorxxx server&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list&amp;nbsp;&amp;nbsp; ISP-INBOUND extended permit object-group VENDORXXX_service_group&amp;nbsp; object&amp;nbsp; vendorxxx_external object VENDORXXX_server log &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im trying to understand your suggestion, but looks like the asdm already wrote some things to the config.&lt;/P&gt;&lt;P&gt;please advise, thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180277#M356943</guid>
      <dc:creator>ethan12345</dc:creator>
      <dc:date>2013-02-07T23:21:27Z</dc:date>
    </item>
    <item>
      <title>allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180278#M356944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration does look like it would allow the traffic to the LAN server 192.168.100.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell what NAT configuration that host has?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see the object with the IP address 192.168.100.1 but not the NAT configuration under the object for it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180278#M356944</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-07T23:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180279#M356945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have asked the vendor to connect to our public IP address and assumed that the acl that I added would allow their specified IP's in to the inside server which is the 192.168.100.1 address. The public IP is our internet facing IP. Until this point, no one has ever tried to reach the 192.168.100.1 server from the outside. There is no NAT from the outside interface to the 192.168.100.1 server that I know of. I have an available public IP I can use, should I set another IP up for just this server or can I use the existing public IP on the outside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180279#M356945</guid>
      <dc:creator>ethan12345</dc:creator>
      <dc:date>2013-02-07T23:39:34Z</dc:date>
    </item>
    <item>
      <title>allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180280#M356946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say as long as you have free public IP addresses I would use them for the LAN servers when they need to be accessed from the Internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configure the Static NAT you can use the following format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network VENDORXXX_server&lt;/P&gt;&lt;P&gt; host 192.168.100.1&lt;/P&gt;&lt;P&gt; nat (inside,outside) static &lt;PUBLIC ip="" address=""&gt; dns&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that since you already have the object you ONLY need to add the NAT configuration with the new free public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively the Port Forward NAT configuration would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SERVER-TCP-1234&lt;/P&gt;&lt;P&gt; host 192.168.100.1&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 1234 1234&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SERVER-TCP-5678&lt;/P&gt;&lt;P&gt; host 192.168.100.1&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 5678 5678&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And so on for the needed ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said if you can spare a public IP address for this, it would be much simpler and cleaner configuration wise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180280#M356946</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-07T23:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180281#M356947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have the following line in your ACL from Internet to LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ISP-INBOUND extended permit ip any any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow ALL traffic from Internet through your firewall (for all the Static NATed host)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest removing it so that your firewall isnt completely open. Instead open only the TCP/UDP ports to the hosts needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Theres also alot of "inactive" rules in the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180281#M356947</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-07T23:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180282#M356948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I will take care of that asap thank you! I kind of inherited this so Im doing my best. I added a spare public IP and NATed it to 192.168.100.1, and left the ACL as is. I will ask the vendor to test tomorrow AM. thanks!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180282#M356948</guid>
      <dc:creator>ethan12345</dc:creator>
      <dc:date>2013-02-07T23:54:23Z</dc:date>
    </item>
    <item>
      <title>allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180283#M356949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know if it worked and if it did mark the question as answered &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it doesnt work we could check the configuration again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Feb 2013 23:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180283#M356949</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-07T23:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: allow outside vendor server access to their inside server</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180284#M356950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it worked. So I gave them their own public IP. You were right, there was no NATing being done from the outside to this server. The objects and the ACL was correct, I just needed to burn that public IP and add it to the 192.168.100.1 object. Fortunately we had one to spare and everything was already working with the ISP. Thanks again! You are hired and I am fired lol.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2013 00:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-vendor-server-access-to-their-inside-server/m-p/2180284#M356950</guid>
      <dc:creator>ethan12345</dc:creator>
      <dc:date>2013-02-08T00:17:43Z</dc:date>
    </item>
  </channel>
</rss>

