<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with port forwarding ASA5505 v8.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150858#M358077</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet capture gave me this output which didnt have any TCP 3389... but had some random UDP ports only?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 21:54:55.108377 802.1Q vlan#2 P0 X.X.X.218.63420 &amp;gt; 208.67.222.222.53:&amp;nbsp; udp 44 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 21:54:58.751929 802.1Q vlan#2 P0 X.X.X.218.63420 &amp;gt; 208.67.220.220.53:&amp;nbsp; udp 44 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 21:54:59.492238 802.1Q vlan#2 P0 X.X.X.218.63976 &amp;gt; 208.67.222.222.53:&amp;nbsp; udp 45 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 21:55:02.807468 802.1Q vlan#2 P0 X.X.X.218.63207 &amp;gt; 216.239.34.10.53:&amp;nbsp; udp 55 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 21:55:02.807651 802.1Q vlan#2 P0 X.X.X.218.63976 &amp;gt; 208.67.220.220.53:&amp;nbsp; udp 45 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 21:55:06.863495 802.1Q vlan#2 P0 X.X.X.218.63414 &amp;gt; 199.253.183.183.53:&amp;nbsp; udp 56 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 21:55:24.599563 802.1Q vlan#2 P0 X.X.X.218.65039 &amp;gt; 208.67.222.222.53:&amp;nbsp; udp 42 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.12.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.217 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no forward interface Vlan2&lt;/P&gt;&lt;P&gt; nameif backup&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.42 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group icmp-type ICMP&lt;/P&gt;&lt;P&gt; description ICMP types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark TRAFFIC PERMITTED TO ENTER THE OUTSIDE INTERFACE&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any host X.X.X.218 eq 3389 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit icmp any interface outside object-group ICMP &lt;/P&gt;&lt;P&gt;access-list INSIDE-IN remark INSIDE ACCESS&lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list BACKUP-IN remark TRAFFIC PERMITTED TO ENTER THE BACKUP INTERFACE&lt;/P&gt;&lt;P&gt;access-list BACKUP-IN extended permit icmp any interface backup object-group ICMP &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu backup 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (backup) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NO-NAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.218 10.1.12.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group INSIDE-IN in interface inside&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;access-group BACKUP-IN in interface backup&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.222 1 track 1&lt;/P&gt;&lt;P&gt;route backup 0.0.0.0 0.0.0.0 X.X.X.41 254&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;/P&gt;&lt;P&gt; type echo protocol ipIcmpEcho X.X.X.X interface outside&lt;/P&gt;&lt;P&gt; num-packets 3&lt;/P&gt;&lt;P&gt; frequency 10&lt;/P&gt;&lt;P&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Apr 2013 22:04:16 GMT</pubDate>
    <dc:creator>paul.awad</dc:creator>
    <dc:date>2013-04-16T22:04:16Z</dc:date>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150850#M358069</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having an issue doing a port translation on an ASA5505 for RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a /29 allocated by ISP and when I port forward the address assigned to the outside interface RDP works perfectly, however when I try to use another IP within the /29 range, I get nothing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am only new to ASA so please forgive if this is something obvious...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.12.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.217 255.255.255.248 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any host X.X.X.218 eq 3389 &lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.218 10.1.12.10 netmask 255.255.255.255 sh run acces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I used the outside IP address and it worked perfectly, config difference was only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any host X.X.X.217 eq 3389 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.217 3389 10.1.12.10 3389 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150850#M358069</guid>
      <dc:creator>paul.awad</dc:creator>
      <dc:date>2019-03-12T01:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150851#M358070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only 2 reasons that come to mind fast is that you either &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have this configuration enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sysopt noproxyarp outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which case insert this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no sysopt noproxyarp outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISP has done something wrong on their end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So can you first check &lt;STRONG&gt;"show run sysopt"&lt;/STRONG&gt; and share the output with us&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:01:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150851#M358070</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-16T20:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150852#M358071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni for the quick response...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wish that were the answer... a sh run sysopt gives nothing... I added the no sysopt command and still no joy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had thought about calling the ISP however this ASA is a replacement of an PIX which I only just put into place. Under the PIX, that IP address responded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know what else could be causing this...?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:10:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150852#M358071</guid>
      <dc:creator>paul.awad</dc:creator>
      <dc:date>2013-04-16T20:10:53Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150853#M358072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well you can check the ASA configurations fast with the "packet-tracer" command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer intput outside tcp 1.2.3.4 12345 x.x.x.218 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would simulate a connection coming from behind "outside" interface from source address 1.2.3.4 with source port 12345 to your Static NAT IP address of the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tells us if the ASA configuration are fine for the most part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a host outside your network that can be used to test connectivity I would check if the ACL rule gets any hits&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when testing configurations and frequently changing NAT configurations I would suggest using &lt;STRONG&gt;"clear xlate local &lt;LOCAL ip="" address=""&gt;"&lt;/LOCAL&gt;&lt;/STRONG&gt; to clear any possible old NAT translations active on the firewall (they may remain even if the commands have been removed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use &lt;STRONG&gt;"show xlate | inc &lt;LOCAL ip=""&gt;"&lt;/LOCAL&gt;&lt;/STRONG&gt; to check the active translations for your host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150853#M358072</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-16T20:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150854#M358073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK..., packet tracer output shows allow on all points which is confusing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the packet tracer there was 1 match on my outside access list... cleared the counters and tried to connect via an external IP... and 0 matches!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have also cleared the xlate and still nothing...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150854#M358073</guid>
      <dc:creator>paul.awad</dc:creator>
      <dc:date>2013-04-16T20:30:20Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150855#M358074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the "packet-tracer" command generates hitcounts on the ACLs when used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There shouldnt really be many possibilities why this would not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If indeed you have not disabled Proxy ARP on the "outside" (which seemed to be ok) and have cleared Xlates and allowed the traffic and the "packet-tracer" goes through then I cant see any other reasons other than the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wonder if doing Trace Route from a Internet host towards both the ASA interface IP address and this extra IP used for the Static NAT would show up differently. This could perhaps provide some information if the ISP has indeed messed up something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 20:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150855#M358074</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-16T20:36:06Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150856#M358075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traceroute follows the same path up until the interface IP address and does not go any further, although I am not allowing ping/traceroute to the other IP addresses, only the outside interface IP...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems like it is routed to the right place from ISP point of view.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestions? Really appreciate your help and quick repsonses on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 21:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150856#M358075</guid>
      <dc:creator>paul.awad</dc:creator>
      <dc:date>2013-04-16T21:25:58Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150857#M358076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to be sure, would it be possible to see your ASAs whole configuration (with masked public IP addresses ofcourse)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to go through them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use traffic capture on the ASA itself to confirm if ANY traffic is coming towards the extra public IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAPTURE permit ip any host x.x.x.218&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list CAPTURE permit ip host x.x.x.218 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture CAPTURE type raw-data access-list CAPTURE interface outside buffer 1000000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then test from the Internet and use the commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture CAPTURE &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see if any traffic reaches your ASA. If not I cant think of anything else at the moment than ISP configurations or some device infront of the ASA causing problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 21:33:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150857#M358076</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-16T21:33:42Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150858#M358077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet capture gave me this output which didnt have any TCP 3389... but had some random UDP ports only?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 21:54:55.108377 802.1Q vlan#2 P0 X.X.X.218.63420 &amp;gt; 208.67.222.222.53:&amp;nbsp; udp 44 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 21:54:58.751929 802.1Q vlan#2 P0 X.X.X.218.63420 &amp;gt; 208.67.220.220.53:&amp;nbsp; udp 44 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 21:54:59.492238 802.1Q vlan#2 P0 X.X.X.218.63976 &amp;gt; 208.67.222.222.53:&amp;nbsp; udp 45 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 4: 21:55:02.807468 802.1Q vlan#2 P0 X.X.X.218.63207 &amp;gt; 216.239.34.10.53:&amp;nbsp; udp 55 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 5: 21:55:02.807651 802.1Q vlan#2 P0 X.X.X.218.63976 &amp;gt; 208.67.220.220.53:&amp;nbsp; udp 45 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 6: 21:55:06.863495 802.1Q vlan#2 P0 X.X.X.218.63414 &amp;gt; 199.253.183.183.53:&amp;nbsp; udp 56 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 7: 21:55:24.599563 802.1Q vlan#2 P0 X.X.X.218.65039 &amp;gt; 208.67.222.222.53:&amp;nbsp; udp 42 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description TO LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.12.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.217 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no forward interface Vlan2&lt;/P&gt;&lt;P&gt; nameif backup&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.42 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group icmp-type ICMP&lt;/P&gt;&lt;P&gt; description ICMP types permitted&lt;/P&gt;&lt;P&gt; icmp-object echo&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN remark TRAFFIC PERMITTED TO ENTER THE OUTSIDE INTERFACE&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any host X.X.X.218 eq 3389 &lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit icmp any interface outside object-group ICMP &lt;/P&gt;&lt;P&gt;access-list INSIDE-IN remark INSIDE ACCESS&lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list INSIDE-IN extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list BACKUP-IN remark TRAFFIC PERMITTED TO ENTER THE BACKUP INTERFACE&lt;/P&gt;&lt;P&gt;access-list BACKUP-IN extended permit icmp any interface backup object-group ICMP &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu backup 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (backup) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NO-NAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.218 10.1.12.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group INSIDE-IN in interface inside&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;access-group BACKUP-IN in interface backup&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.222 1 track 1&lt;/P&gt;&lt;P&gt;route backup 0.0.0.0 0.0.0.0 X.X.X.41 254&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;/P&gt;&lt;P&gt; type echo protocol ipIcmpEcho X.X.X.X interface outside&lt;/P&gt;&lt;P&gt; num-packets 3&lt;/P&gt;&lt;P&gt; frequency 10&lt;/P&gt;&lt;P&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 22:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150858#M358077</guid>
      <dc:creator>paul.awad</dc:creator>
      <dc:date>2013-04-16T22:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150859#M358078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we are only seeing the host using the Static NAT IP address is trying to do DNS querys but receives no reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still bet that some device in front of the ASA is causing this or the ISP has configured something wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sometimes when replacing the firewall it might be possible that the ISP still has an old ARP table marking for the IP address (Public IP -&amp;gt; PIX MAC address). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the setting is at its default it would mean that it would take 4 hours to clear and after that update with the MAC of the new ASA (instead of the PIX MAC) Naturally you could test this with the PIX if it indeed had this Static NAT also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then again the interface IP address is functioning ok so I am not sure about that. The way a device might update the upsteam devices ARP is Gratuitous ARP. I am not sure if ASA does this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 22:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150859#M358078</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-16T22:11:40Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150860#M358079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still the same... I am going to give up on this for the time being as I cant be bothered trying to explain this to customer service at the ISP... will end up wasting more time. I have forwarded all RDP to the interface IP and all works there so there is no need at this point to continue. Whn in fact I need another IP from the /29, will chase up the ISP then...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 14:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150860#M358079</guid>
      <dc:creator>paul.awad</dc:creator>
      <dc:date>2013-04-17T14:49:32Z</dc:date>
    </item>
    <item>
      <title>Help with port forwarding ASA5505 v8.2</title>
      <link>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150861#M358080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shame we couldnt get this to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless there is somekind of misstype/typo in the IP addresses then I dont know what the problem could have been on your side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe if you get this solved at some point with the ISP you could let us know that the problem was if it indeed was on the ISP side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 15:14:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-port-forwarding-asa5505-v8-2/m-p/2150861#M358080</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-17T15:14:25Z</dc:date>
    </item>
  </channel>
</rss>

