<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO ASA5510 help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199166#M359332</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Shalvindra,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say the configuration is the required one,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a capture on the outside interface and inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout interface outside permit tcp any host x.x.x.x eq 8080 ( outisde ASA ip address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin interface inside permit tcp any host x.x.x.x eq 80 ( Inside server IP address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to connect and provide&lt;/P&gt;&lt;P&gt;show cap capout&lt;/P&gt;&lt;P&gt;show cap capin &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 02 Apr 2013 00:58:09 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-04-02T00:58:09Z</dc:date>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199159#M359325</link>
      <description>&lt;DIV&gt;&lt;P&gt;My Scenario:&lt;/P&gt;&lt;P&gt;Cisco ASA 5510&amp;nbsp; directly facing the internet on E0/0 (1 Public IP only) with internal&amp;nbsp; LAN on E0/1. Exchange 2010 OWA working fine with ACL and NAT rules&amp;nbsp; configured.&lt;/P&gt;&lt;P&gt;Problem:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;•1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cannot publish internal web servers to outside, have tried PAT.&lt;/LI&gt;&lt;LI&gt;•2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Have multiple web servers to publish with all on one protocol (HTTP) to&amp;nbsp; a single public IP which I don’t know if it’s possible on a ASA.&lt;/LI&gt;&lt;LI&gt;•3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When SSL VPN is configured with Local user database, connecting from&amp;nbsp; Anyconnect client gives a certificate error. Upon viewing the&amp;nbsp; certificate it points to the internal mail server.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Help please .&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199159#M359325</guid>
      <dc:creator>shalvin_caaf</dc:creator>
      <dc:date>2019-03-12T01:20:51Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199160#M359326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Can you share the NAT setup and ACL's for that setup&lt;/P&gt;&lt;P&gt;2) It can be possible but on the outside interface you should use another port than 80 as that would be used by another server, this if only one IP is available,&lt;/P&gt;&lt;P&gt;3) What is the certificate that you are using for the Anyconnect clients, is it the self-generated one?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 21:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199160#M359326</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-27T21:06:43Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199161#M359327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname &lt;EM style="font-family: mceinline;"&gt;xxxci&lt;/EM&gt;SCOASAXX&lt;/P&gt;&lt;P&gt;enable password encrypted&lt;/P&gt;&lt;P&gt;passwd encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.70.75.XX XXXsrvmx01 description Exchange-Server&lt;/P&gt;&lt;P&gt;name 202.62.XXX.XXX mail.caaf.org.fj description ExtInt&lt;/P&gt;&lt;P&gt;name 10.70.75.XX XXcenter description vmware&lt;/P&gt;&lt;P&gt;name 10.70.75.XX DVR description dvr&lt;/P&gt;&lt;P&gt;name 10.70.75.XX ICTA description ICT Laptop&lt;/P&gt;&lt;P&gt;name 10.70.75.XX XXXsrvaqd01 description AQDportal&lt;/P&gt;&lt;P&gt;name 10.70.75.XX XXSS-Int description hrss&lt;/P&gt;&lt;P&gt;name 10.70.75.XX otrs description otrs&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description WAN_Link&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address XXX.XXX.org.fj 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN_Link&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.70.75.XX 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone FJST 12&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq pop3&lt;/P&gt;&lt;P&gt; port-object eq smtp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq smtp&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list global_mpc extended permit tcp any any object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any interface outside object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp any interface outside eq 100 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp XXXsrvmx01 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface https XXXsrvmx01 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 100 DVR 100 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in_1 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 202.62.xxx.xxx 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http authentication-certificate inside&lt;/P&gt;&lt;P&gt;http authentication-certificate management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=xxxCISCOASAxx&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca server &lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; smtp from-address admin@xxxCISCOASAxx.null&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt;group-policy remoteVPN internal&lt;/P&gt;&lt;P&gt;group-policy remoteVPN attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol webvpn&lt;/P&gt;&lt;P&gt;tunnel-group RemoteVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RemoteVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN_pool&lt;/P&gt;&lt;P&gt; default-group-policy remoteVPN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match access-list global_mpc&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; csc fail-close&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:fd21551&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 02:13:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199161#M359327</guid>
      <dc:creator>shalvin_caaf</dc:creator>
      <dc:date>2013-03-28T02:13:59Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199162#M359328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the Ip address of the internal web server that you are trying to access from the outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 06:00:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199162#M359328</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-28T06:00:54Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199163#M359329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;its 10.70.75.35 HRSS-Int description hrss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 06:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199163#M359329</guid>
      <dc:creator>shalvin_caaf</dc:creator>
      <dc:date>2013-03-28T06:33:55Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199164#M359330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not see any NAT for that&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it should be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 8080 10.70.75.35 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 line 1 permit tcp any host interface_ip_address eq 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then connect from an outside client to port 8080 on the IP address of the outside interface of the ASA and that should do it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 07:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199164#M359330</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-28T07:06:52Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199165#M359331</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have tried the commands but am getting the following when trying to connect to the http server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also done binding to port 8080 via IIS but still am facing the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTTP Error 404. The requested resource is not found&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 00:54:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199165#M359331</guid>
      <dc:creator>shalvin_caaf</dc:creator>
      <dc:date>2013-04-02T00:54:42Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA5510 help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199166#M359332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Shalvindra,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say the configuration is the required one,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you do a capture on the outside interface and inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capout interface outside permit tcp any host x.x.x.x eq 8080 ( outisde ASA ip address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap capin interface inside permit tcp any host x.x.x.x eq 80 ( Inside server IP address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to connect and provide&lt;/P&gt;&lt;P&gt;show cap capout&lt;/P&gt;&lt;P&gt;show cap capin &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Apr 2013 00:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa5510-help/m-p/2199166#M359332</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-02T00:58:09Z</dc:date>
    </item>
  </channel>
</rss>

