<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to get access to port 8000? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171016#M360570</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I guess I just need to manually enter in each nat'ed port instead of using a "&lt;SPAN style="font-size: 10pt;"&gt;object network". &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Mar 2013 18:55:42 GMT</pubDate>
    <dc:creator>eferland</dc:creator>
    <dc:date>2013-03-11T18:55:42Z</dc:date>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170992#M360546</link>
      <description>&lt;P&gt;I had a issue getting to my VPN device from outside my network on port 444. A Cisco tech helped me fix it last night but now I can't get to the device via the internal IP and using port 8000? It worked fine before the tech helped me get access which I'm grateful for but how do I get access back?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using a ASA 5510&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.0.0.0 10.0.0.0 destination static 10.0.1.0 10.0.1.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-10.0.0.183&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp &lt;/P&gt;&lt;P&gt;object network obj-10.0.0.183-01&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-10.0.0.183-02&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp imap4 imap4 &lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_voip&lt;/P&gt;&lt;P&gt; nat (VoIP,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network BarracudaVPN&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 444 444 &lt;/P&gt;&lt;P&gt;object network vpn&lt;/P&gt;&lt;P&gt; nat (inside,outside) static A_64.140.222.185&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was the fix from cisco&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network BarracudaVPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (outside,inside) static interface service tcp 444 444&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 444 444&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate local 10.0.0.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list out_in line 1 permit tcp any host 10.0.012 eq 444&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:11:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170992#M360546</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2019-03-12T01:11:41Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170993#M360547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that you need to get on the device that is behind your firewall and you need to access it using the public IP address of the ASA "outside" interface and port TCP/8000?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont see any port forward configuration atleast for TCP/8000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic configuration to enable TCP/8000 port forwarding would be (provided its supposed to be both the real and the mapped port)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network &lt;/STRONG&gt;&lt;OBJECT name=""&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;LOCAL ip=""&gt;&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 8000 8000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit tcp any object &lt;OBJECT name=""&gt; eq 8000&lt;/OBJECT&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;ACL name=""&gt; permit tcp any host &lt;REAL ip=""&gt; eq 8000&lt;/REAL&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you meant getting to the device from "inside" interface then I cant really say with the above configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify the situation a bit if the above things werent correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 15:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170993#M360547</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T15:42:18Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170994#M360548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN&gt;Getting to the device using its internal IP address 10.0.0.12. To access the admin control panel the address is &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://10.0.0.12:8000"&gt;http://10.0.0.12:8000&lt;/A&gt;&lt;SPAN&gt;. When I go to that address I get the login in screen but can't login because it can't get out of the firewall via 80. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 15:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170994#M360548</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T15:47:29Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170995#M360549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you still clarify as to where the connection attempt to the local IP address of 10.0.0.12 is coming from? From the Internet, from the local LAN or perhaps through VPN connection to the ASA (as I notice you have some sort of NAT0 configuration)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 15:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170995#M360549</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T15:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170996#M360550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From inside the network 10.0.0.35 (The local LAN) &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 15:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170996#M360550</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T15:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170997#M360551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic inside the same subnet shouldnt even go to the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One common problem situation where there a LAN subnet is directly connected to the ASA interface is when the ASAs interface has Proxy ARP enabled. It might answer ARP requests for the LAN host trying to access another host on the same subnet and the connection could fail because of this. (Since ASA answers to the ARP request instead of the actual host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proxy ARP can be disabled with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;sysopt noproxyarp &lt;INTERFACE nameif=""&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But cant really say if this is the case. The firewall shouldnt have anything to do with traffic inside a single subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 16:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170997#M360551</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T16:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170998#M360552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would agree if it did not work just prior to having made the changes to the ASA to allow outside access via port 444. But accessing the device using 10.0.0.12:8000 worked before making the ASA adjustment for port 444. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 16:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170998#M360552</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T16:27:14Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170999#M360553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The change that you mention doing is simply switching the source and destination interface for the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before the change the NAT would have operated so that&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The translation would have been done for the host 10.0.0.12&lt;/LI&gt;&lt;LI&gt;The translation defined that the host 10.0.0.12 was actually behind the "outside" interface and that it would be translated to the "interface" IP address of "inside"&lt;/LI&gt;&lt;LI&gt;It would have been accessible from behind the "inside" with TCP/444&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the change the NAT should operate so that&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The translation would still be done for the host 10.0.0.12&lt;/LI&gt;&lt;LI&gt;The translation defines that the host 10.0.0.12 is behind the "inside" interface of the ASA and that it would be translated to the "interface" IP address of the "outside"&lt;/LI&gt;&lt;LI&gt;It would could be accessed from behind "outside" with TCP/444&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also what I am wondering is that you get a login page? Doesnt this already mean that connectivity to the host exists?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 16:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2170999#M360553</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T16:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171000#M360554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you are right I just set up a small network like this;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpn appliance (10.0.0.12) ------&amp;gt;Switch&amp;lt;-----------laptop (10.0.0.23) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no firewall I get the same outcome. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 18:34:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171000#M360554</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T18:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171001#M360555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are telling me that when I try to login the device goes out to the web to check licensing information. If it can't get out it just spins and times out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 21:48:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171001#M360555</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T21:48:27Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171002#M360556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well if you need to specifically check what the ASA would do to a TCP/80 destination port connection towards the Internet from that local soure IP address you can use "packet-tracer" command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 10.0.0.12 12345 1.1.1.1 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just as an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should list what rules the ASA applies to the traffic mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 21:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171002#M360556</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T21:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171003#M360557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't ping &lt;/P&gt;&lt;P&gt;74.125.129.103 from the device&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 21:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171003#M360557</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T21:54:26Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171004#M360558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no idea what that IP address is supposed to be. The destination for the TCP/80 connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP isnt a 100% reliable way to determine that something is working. Its not necesarily allowed everywhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above "packet-tracer" should tell what the ASA would do the TCP/80 traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally something can be told by looking through the ASDM real time monitoring on what happens to the connection from the device to the destination port TCP/80 somewhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 21:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171004#M360558</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T21:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171005#M360559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "packet-tracer input outside icmp 10.0.0.12 8 0 74.125.129.103"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171005#M360559</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T22:03:20Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171006#M360560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wrong input interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When traffic is coming from host 10.0.0.12 its coming from "inside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171006#M360560</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T22:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171007#M360561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 10.0.0.12 12345 1.1.1.1 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group in_out in interface inside&lt;/P&gt;&lt;P&gt;access-list in_out extended permit tcp host 10.0.0.12 any eq www &lt;/P&gt;&lt;P&gt;access-list in_out remark Barracuda&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network vpn&lt;/P&gt;&lt;P&gt; nat (inside,outside) static A_64.140.222.185&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 10.0.0.12/12345 to 64.140.222.185/12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: USER-STATISTICS&lt;/P&gt;&lt;P&gt;Subtype: user-statistics&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: USER-STATISTICS&lt;/P&gt;&lt;P&gt;Subtype: user-statistics&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 14&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 83337983, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171007#M360561</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T22:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171008#M360562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Naturally something can be told by looking through the ASDM real time monitoring on what happens to the connection from the device to the destination port TCP/80 somewhere"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where in the asdm?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171008#M360562</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T22:11:40Z</dc:date>
    </item>
    <item>
      <title>How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171009#M360563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That test would show that the connection should go through just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What seems strange to me is the result of the NAT phase combined with the thing what you were looking through with Cisco&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "packet-tracer" output shows that you have configured a completely own IP address for the VPN device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You NAT configurations is probably something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network vpn&lt;/P&gt;&lt;P&gt; host 10.0.0.12&lt;/P&gt;&lt;P&gt; nat (inside,outside) static A_64.140.222.185&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF the host 10.0.0.12 actually has its own public IP address you could just open port TCP/444 for this host on the "outside" interface ACL. It wouldnt need any port forward as the above NAT configuration already makes it possible to contact the device using that public IP address on any port PROVIDED that the ACL rule for it exists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume that the IP address 64.140.222.185 isnt used anywhere else on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171009#M360563</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-08T22:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171010#M360564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;64.140.222.185:443 is used for owa (Exchange). To change the default from port 443 to 444 (because 443 is in use) on the vpn device I need to login via 10.0.0.12:8000.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see it trying to get on in the asa it looks like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;Mar 08 2013&lt;/TD&gt;&lt;TD&gt;17:41:52&lt;/TD&gt;&lt;TD&gt;302013&lt;/TD&gt;&lt;TD&gt;10.0.0.12&lt;/TD&gt;&lt;TD&gt;45976&lt;/TD&gt;&lt;TD&gt;216.129.105.129&lt;/TD&gt;&lt;TD&gt;80&lt;/TD&gt;&lt;TD&gt;Built outbound TCP connection 83340217 for outside:216.129.105.129/80 (216.129.105.129/80) to inside:10.0.0.12/45976 (64.140.222.185/45976)&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171010#M360564</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T22:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to get access to port 8000?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171011#M360565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My boss is kicking me out. arrrgh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Mar 2013 22:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-get-access-to-port-8000/m-p/2171011#M360565</guid>
      <dc:creator>eferland</dc:creator>
      <dc:date>2013-03-08T22:24:38Z</dc:date>
    </item>
  </channel>
</rss>

