<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Portforwarding in Pix 501 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198265#M358321</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The format should be something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 49003 &lt;LOCAL ip=""&gt; 49003 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 40085 &lt;LOCAL ip=""&gt; 40085 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And allow them on the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any &lt;OUTSIDE interface="" ip=""&gt; eq 49003&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any &lt;OUTSIDE interface="" ip=""&gt; eq 40085&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL and interface names are just examples&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Apr 2013 19:58:40 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-12T19:58:40Z</dc:date>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198264#M358320</link>
      <description>&lt;P&gt;Hello i'm having a problem portforwarding/redirection for the pix 501&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to open the ports 49003 and 40085 in order to view our dvr remotely and i'm not exactly sure how to it.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198264#M358320</guid>
      <dc:creator>Tmhoang21</dc:creator>
      <dc:date>2019-03-12T01:27:40Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198265#M358321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The format should be something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 49003 &lt;LOCAL ip=""&gt; 49003 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 40085 &lt;LOCAL ip=""&gt; 40085 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And allow them on the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any &lt;OUTSIDE interface="" ip=""&gt; eq 49003&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any &lt;OUTSIDE interface="" ip=""&gt; eq 40085&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL and interface names are just examples&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 19:58:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198265#M358321</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T19:58:40Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198266#M358322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the local ip would be the dvr right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198266#M358322</guid>
      <dc:creator>Tmhoang21</dc:creator>
      <dc:date>2013-04-12T20:06:54Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198267#M358324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its the real IP address of the host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "interface" before it specifies that the IP address of the "outside" interface would be used as the public IP address towards Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had a spare public IP address just for this device then you could simply configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) &lt;PUBLIC ip=""&gt; &lt;LOCAL ip=""&gt; netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198267#M358324</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T20:09:28Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198268#M358326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so the commands should look similar to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;static (inside,outside) tcp interface 49003 192.168.5.100 49003 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;static (inside,outside) tcp interface 40085 &lt;STRONG style="font-family: Arial, verdana, sans-serif; font-size: 12px; border-collapse: collapse; list-style: none;"&gt;192.168.5.100 &lt;/STRONG&gt;40085 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list OUTSIDE-IN permit tcp any 76.205.230.51 eq 49003&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list OUTSIDE-IN permit tcp any &lt;STRONG style="font-family: Arial, verdana, sans-serif; font-size: 12px; border-collapse: collapse; list-style: none;"&gt;76.205.230.51 &lt;/STRONG&gt;eq 40085&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198268#M358326</guid>
      <dc:creator>Tmhoang21</dc:creator>
      <dc:date>2013-04-12T20:15:10Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198269#M358327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes if the services needed to be forwarded were &lt;STRONG&gt;TCP/49003&lt;/STRONG&gt; and &lt;STRONG&gt;TCP/40085&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember that if you already have an ACL attached to the "outside" interface then you can use that ACL in the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF you have NO ACL attached to the "outside" interface before this then you will also need this command to attach the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198269#M358327</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T20:18:18Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198270#M358328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer the message you sent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For UDP the "static" commands follow the same logic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont seem to have an ACL in the "outside" interface at the moment so you should be able to add these with your IP address infromation inserted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 49003 &lt;LOCAL ip=""&gt; 49003 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 40085 &lt;LOCAL ip=""&gt; 40085 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) udp interface 49003 &lt;LOCAL ip=""&gt; 49003 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) udp interface 40085 &lt;LOCAL ip=""&gt; 40085 netmask 255.255.255.255&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any &lt;OUTSIDE interface="" ip=""&gt; eq 49003&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any &lt;OUTSIDE interface="" ip=""&gt; eq 40085&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp any &lt;OUTSIDE interface="" ip=""&gt; eq 49003&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp any &lt;OUTSIDE interface="" ip=""&gt; eq 40085&lt;/OUTSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198270#M358328</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T20:31:06Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198271#M358329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it gave me &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "static (inside,outside) tcp interface 49003 192.168.4.161 49003 netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: duplicate of existing static&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp from inside:192.168.4.161/49003 to outside:76.205.229.61/49003 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] static [(real_ifc, mapped_ifc)]&lt;/P&gt;&lt;P&gt; {&lt;MAPPED_IP&gt;|interface}&lt;/MAPPED_IP&gt;&lt;/P&gt;&lt;P&gt; {&lt;REAL_IP&gt; [netmask &lt;MASK&gt;]} | {access-list &lt;ACL_NAME&gt;}&lt;/ACL_NAME&gt;&lt;/MASK&gt;&lt;/REAL_IP&gt;&lt;/P&gt;&lt;P&gt; [dns] [norandomseq] [&lt;MAX_CONNS&gt; [&lt;EMB_LIM&gt;]]&lt;/EMB_LIM&gt;&lt;/MAX_CONNS&gt;&lt;/P&gt;&lt;P&gt; [no] static [(real_ifc, mapped_ifc)] {tcp|udp}&lt;/P&gt;&lt;P&gt; {&lt;MAPPED_IP&gt;|interface} &lt;MAPPED_PORT&gt;&lt;/MAPPED_PORT&gt;&lt;/MAPPED_IP&gt;&lt;/P&gt;&lt;P&gt; {&lt;REAL_IP&gt; &lt;REAL_PORT&gt; [netmask &lt;MASK&gt;]} |&lt;/MASK&gt;&lt;/REAL_PORT&gt;&lt;/REAL_IP&gt;&lt;/P&gt;&lt;P&gt; {access-list &lt;ACL_NAME&gt;}&lt;/ACL_NAME&gt;&lt;/P&gt;&lt;P&gt; [dns] [norandomseq] [&lt;MAX_CONNS&gt; [&lt;EMB_LIM&gt;]]&lt;/EMB_LIM&gt;&lt;/MAX_CONNS&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "static (inside,outside) tcp interface 40085 192.168.4.161 40085 netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: duplicate of existing static&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; tcp from inside:192.168.4.161/40085 to outside:76.205.229.61/40085 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] static [(real_ifc, mapped_ifc)]&lt;/P&gt;&lt;P&gt; {&lt;MAPPED_IP&gt;|interface}&lt;/MAPPED_IP&gt;&lt;/P&gt;&lt;P&gt; {&lt;REAL_IP&gt; [netmask &lt;MASK&gt;]} | {access-list &lt;ACL_NAME&gt;}&lt;/ACL_NAME&gt;&lt;/MASK&gt;&lt;/REAL_IP&gt;&lt;/P&gt;&lt;P&gt; [dns] [norandomseq] [&lt;MAX_CONNS&gt; [&lt;EMB_LIM&gt;]]&lt;/EMB_LIM&gt;&lt;/MAX_CONNS&gt;&lt;/P&gt;&lt;P&gt; [no] static [(real_ifc, mapped_ifc)] {tcp|udp}&lt;/P&gt;&lt;P&gt; {&lt;MAPPED_IP&gt;|interface} &lt;MAPPED_PORT&gt;&lt;/MAPPED_PORT&gt;&lt;/MAPPED_IP&gt;&lt;/P&gt;&lt;P&gt; {&lt;REAL_IP&gt; &lt;REAL_PORT&gt; [netmask &lt;MASK&gt;]} |&lt;/MASK&gt;&lt;/REAL_PORT&gt;&lt;/REAL_IP&gt;&lt;/P&gt;&lt;P&gt; {access-list &lt;ACL_NAME&gt;}&lt;/ACL_NAME&gt;&lt;/P&gt;&lt;P&gt; [dns] [norandomseq] [&lt;MAX_CONNS&gt; [&lt;EMB_LIM&gt;]]&lt;/EMB_LIM&gt;&lt;/MAX_CONNS&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "static (inside,outside) udp interface 49003 192.168.4.161 49003 netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "static (inside,outside) udp interface 40085 192.168.4.161 40085 netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: " "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "access-list OUTSIDE-IN permit tcp any 76.205.229.61 eq 49003"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: invalid IP address eq&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] access-list compiled&lt;/P&gt;&lt;P&gt;[no] access-list deny-flow-max &lt;N&gt;&lt;/N&gt;&lt;/P&gt;&lt;P&gt;[no] access-list alert-interval &lt;SECS&gt;&lt;/SECS&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; object-group-search&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; compiled&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] remark &lt;TEXT&gt;&lt;/TEXT&gt;&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;PROTOCOL&gt;|object-group &lt;PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit icmp&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;ICMP_TYPE&gt; | object-group &lt;ICMP_TYPE_OBJ_GRP_ID&gt;]&lt;/ICMP_TYPE_OBJ_GRP_ID&gt;&lt;/ICMP_TYPE&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;Restricted ACLs for route-map use:&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; deny|permit {any | &lt;PREFIX&gt; &lt;MASK&gt; | host &lt;ADDRESS&gt;}&lt;/ADDRESS&gt;&lt;/MASK&gt;&lt;/PREFIX&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "access-list OUTSIDE-IN permit tcp any 76.205.229.61 eq 40085"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: invalid IP address eq&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] access-list compiled&lt;/P&gt;&lt;P&gt;[no] access-list deny-flow-max &lt;N&gt;&lt;/N&gt;&lt;/P&gt;&lt;P&gt;[no] access-list alert-interval &lt;SECS&gt;&lt;/SECS&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; object-group-search&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; compiled&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] remark &lt;TEXT&gt;&lt;/TEXT&gt;&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;PROTOCOL&gt;|object-group &lt;PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit icmp&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;ICMP_TYPE&gt; | object-group &lt;ICMP_TYPE_OBJ_GRP_ID&gt;]&lt;/ICMP_TYPE_OBJ_GRP_ID&gt;&lt;/ICMP_TYPE&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;Restricted ACLs for route-map use:&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; deny|permit {any | &lt;PREFIX&gt; &lt;MASK&gt; | host &lt;ADDRESS&gt;}&lt;/ADDRESS&gt;&lt;/MASK&gt;&lt;/PREFIX&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "access-list OUTSIDE-IN permit udp any 76.205.229.61 eq 49003"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: invalid IP address eq&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] access-list compiled&lt;/P&gt;&lt;P&gt;[no] access-list deny-flow-max &lt;N&gt;&lt;/N&gt;&lt;/P&gt;&lt;P&gt;[no] access-list alert-interval &lt;SECS&gt;&lt;/SECS&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; object-group-search&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; compiled&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] remark &lt;TEXT&gt;&lt;/TEXT&gt;&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;PROTOCOL&gt;|object-group &lt;PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit icmp&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;ICMP_TYPE&gt; | object-group &lt;ICMP_TYPE_OBJ_GRP_ID&gt;]&lt;/ICMP_TYPE_OBJ_GRP_ID&gt;&lt;/ICMP_TYPE&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;Restricted ACLs for route-map use:&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; deny|permit {any | &lt;PREFIX&gt; &lt;MASK&gt; | host &lt;ADDRESS&gt;}&lt;/ADDRESS&gt;&lt;/MASK&gt;&lt;/PREFIX&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "access-list OUTSIDE-IN permit udp any 76.205.229.61 eq 40085"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: invalid IP address eq&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] access-list compiled&lt;/P&gt;&lt;P&gt;[no] access-list deny-flow-max &lt;N&gt;&lt;/N&gt;&lt;/P&gt;&lt;P&gt;[no] access-list alert-interval &lt;SECS&gt;&lt;/SECS&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; object-group-search&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; compiled&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] remark &lt;TEXT&gt;&lt;/TEXT&gt;&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;PROTOCOL&gt;|object-group &lt;PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL_OBJ_GRP_ID&gt;&lt;/PROTOCOL&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;OPERATOR&gt; &lt;PORT&gt; [&lt;PORT&gt;] | object-group &lt;SERVICE_OBJ_GRP_ID&gt;]&lt;/SERVICE_OBJ_GRP_ID&gt;&lt;/PORT&gt;&lt;/PORT&gt;&lt;/OPERATOR&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; [line &lt;LINE-NUM&gt;] deny|permit icmp&lt;/LINE-NUM&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; &lt;SIP&gt; &lt;SMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/SMASK&gt;&lt;/SIP&gt;&lt;/P&gt;&lt;P&gt; &lt;DIP&gt; &lt;DMASK&gt; | interface &lt;IF_NAME&gt; | object-group &lt;NETWORK_OBJ_GRP_ID&gt;&lt;/NETWORK_OBJ_GRP_ID&gt;&lt;/IF_NAME&gt;&lt;/DMASK&gt;&lt;/DIP&gt;&lt;/P&gt;&lt;P&gt; [&lt;ICMP_TYPE&gt; | object-group &lt;ICMP_TYPE_OBJ_GRP_ID&gt;]&lt;/ICMP_TYPE_OBJ_GRP_ID&gt;&lt;/ICMP_TYPE&gt;&lt;/P&gt;&lt;P&gt; [log [disable|default] | [&lt;LEVEL&gt;] [interval &lt;SECS&gt;]]&lt;/SECS&gt;&lt;/LEVEL&gt;&lt;/P&gt;&lt;P&gt;Restricted ACLs for route-map use:&lt;/P&gt;&lt;P&gt;[no] access-list &lt;ID&gt; deny|permit {any | &lt;PREFIX&gt; &lt;MASK&gt; | host &lt;ADDRESS&gt;}&lt;/ADDRESS&gt;&lt;/MASK&gt;&lt;/PREFIX&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: " "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: ""&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of firewall command: "access-group OUTSIDE-IN in interface outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: access-list &lt;OUTSIDE-IN&gt; does not exist&lt;/OUTSIDE-IN&gt;&lt;/P&gt;&lt;P&gt;Usage:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;[no] access-group &lt;ACCESS-LIST&gt; in interface &lt;IF_NAME&gt; [per-user-override]&lt;/IF_NAME&gt;&lt;/ACCESS-LIST&gt;&lt;/P&gt;&lt;P&gt;Command failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:57:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198271#M358329</guid>
      <dc:creator>Tmhoang21</dc:creator>
      <dc:date>2013-04-12T20:57:12Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198272#M358330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let us know if it worked out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it did please mark the question as answered &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if needed ask more&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198272#M358330</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T20:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198273#M358331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah sorry my bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are missing the parameter "host" from the ACLs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Insert these again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any host 76.205.229.61 eq 49003&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any host 76.205.229.61 eq 40085&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp any host 76.205.229.61 eq 49003&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit udp any host 76.205.229.61 eq 40085&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the error messages with the NAT were shown since you inserted the already existing NAT configurations again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 21:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198273#M358331</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T21:00:37Z</dc:date>
    </item>
    <item>
      <title>Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198274#M358332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i got it thanks!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 21:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198274#M358332</guid>
      <dc:creator>Tmhoang21</dc:creator>
      <dc:date>2013-04-12T21:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: Portforwarding in Pix 501</title>
      <link>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198275#M358333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please keep the questions here on the forums.I would prefer everyone see the whole discussion so they might get the help they need also when/if they happen to read the discussion. Naturally if there is some information that is private you can always send that as a message but please keep the questions here on the discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say that you tested the connections from canyouseeme.org and that you were given the reason that the connection was refused.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This tells us that some device is actively refusing the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the firewall now has rules that do the port forward and allow the traffic through with the ACL it might mean that the actual device is refusing the connections. Is there possibly some settings on the actual device in the LAN network that need to be changed to allow connections from remote networks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding Cisco firewalls by default let blocked connections timeout rather than refuse/reset them. This would furthermore lead me to believe that the above situation is true. That the actual device in the LAN (or some other device) is blocking the connection and sending a TCP Reset to whoever is trying to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also asked if this could be applied to other sites. I dont see why not. You fill first have to define the configurations that are needed to make it work. After that I dont see a problem with using the same concept at every site. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though in your configuration it seemed the other site gets it public IP address through DHCP. Therefore you naturally cant use a public IP address on the ACL as it might change. Unless the ISP has staticly mapped the public IP address to your PIX firewall "outside" interface MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 22:53:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portforwarding-in-pix-501/m-p/2198275#M358333</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T22:53:40Z</dc:date>
    </item>
  </channel>
</rss>

