<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simple Port Forwarding / ACL Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101093#M395085</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems like a simple problem and that something is just being overlooked. I have opened other ports on this PC using the same commands. I don't see why this one is any different. For instance, I have opened RDP access to this computer using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 theking 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So why doesn't the same thing work for port 465? This is my confusion / frustration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Nov 2012 16:05:23 GMT</pubDate>
    <dc:creator>macdady843</dc:creator>
    <dc:date>2012-11-28T16:05:23Z</dc:date>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101087#M395030</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kind of a novice when it comes to Cisco configuration. I went to college for networking but haven't used it enough since graduating and I'm having some trouble with opening some ports for email to my home PC. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically i'm trying to set up IMAP with Gmail to be downloaded to my Mozilla Thunderbird client. I'm using a similar syntax for other ports that i've opened but it isn't working. I also did a "show access list" and saw that one of my rules had hit counts on it but i'm not sure what this means as far as troubleshooting goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone lend a hand and explain what i'm doing wrong? If you're feeling extra nice could you let me know what I would need to do to open some Xbox Live ports as well? The rules aren't set up yet but the ports are present in my config. I've bolded the relevant ports below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** Config ****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname RyansFirewall&lt;/P&gt;&lt;P&gt;enable password C5OQraC02mISnP8p encrypted&lt;/P&gt;&lt;P&gt;passwd 3mBdM08UO1apR0bB encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.130 theking&lt;/P&gt;&lt;P&gt;name 192.168.1.240 wap&lt;/P&gt;&lt;P&gt;name 192.168.1.252 cam&lt;/P&gt;&lt;P&gt;name 192.168.1.253 switch&lt;/P&gt;&lt;P&gt;name 192.168.1.150 xbox&lt;/P&gt;&lt;P&gt;name x.x.x.x vpnreactor&lt;/P&gt;&lt;P&gt;name x.x.x.x HSoftware&lt;/P&gt;&lt;P&gt;name x.x.x.x Mom_and_Dad&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Connection_to_Cable_Modem&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Cisco_Catalyst_2960&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; description Guest_Wireless&lt;/P&gt;&lt;P&gt; switchport access vlan 20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description Private_Internal_Lan&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; description WOW_Internet&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan20&lt;/P&gt;&lt;P&gt; description Guest_Wireless&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 30&lt;/P&gt;&lt;P&gt; ip address 172.16.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone Eastern -5&lt;/P&gt;&lt;P&gt;object-group network outside_ip_group&lt;/P&gt;&lt;P&gt; description This group contains a list of allowed public IP Addresses&lt;/P&gt;&lt;P&gt; network-object HSoftware 255.255.255.255&lt;/P&gt;&lt;P&gt; network-object Mom_and_Dad 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service Xbox_Ports tcp-udp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Ports needed for Xbox Live&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq 88&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq domain&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq 3074&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group service Email_Ports tcp-udp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Ports needed for Email&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq 143&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq 465&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq 587&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; port-object eq 993&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp object-group outside_ip_group any eq 1024&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre host vpnreactor host theking&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host vpnreactor host theking eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp object-group outside_ip_group any eq 5900&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any any object-group Email_Ports&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit udp any any object-group Email_Ports&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-635.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list outside_access_in&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 theking 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp theking ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 1024 cam 1024 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5900 theking 5900 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 143 theking 143 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 465 theking 465 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 587 theking 587 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface 993 theking 993 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh Mom_and_Dad 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh HSoftware 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 10&lt;/P&gt;&lt;P&gt;console timeout 10&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.25 inside&lt;/P&gt;&lt;P&gt;dhcpd dns x.x.x.x x.x.x.x interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 10800 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain RyanJohn interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.1.2-172.16.1.25 dmz&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface dmz&lt;/P&gt;&lt;P&gt;dhcpd domain RyanJohnGuest interface dmz&lt;/P&gt;&lt;P&gt;dhcpd enable dmz&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username XXXXX password ZpRIy72StEDDpdfG encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:3c7abf7d5d55aba0e19d5da340132000&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** Show Access List ****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RyansFirewall# show access-list outside_access_in&lt;/P&gt;&lt;P&gt;access-list outside_access_in; 19 elements; name hash: 0x6892a938&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp object-group outside_ip_group any eq 1024 0xf13a69fb&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit tcp host HSoftware any eq 1024 (hitcnt=0) 0xc8c42900&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit tcp host Mom_and_Dad any eq 1024 (hitcnt=0) 0x7e777675&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 2 extended permit tcp any any eq 3389 (hitcnt=7451) 0x51a647d7&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 3 extended permit tcp any any eq ftp (hitcnt=11) 0x8d0d5aac&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 4 extended permit gre host vpnreactor host theking (hitcnt=0) 0x894a4bbb&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 5 extended permit tcp host vpnreactor host theking eq pptp (hitcnt=0) 0xcb0322a8&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 6 extended permit icmp any any echo-reply (hitcnt=563) 0x54b872f3&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 7 extended permit icmp any any time-exceeded (hitcnt=703) 0x03690eb3&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 8 extended permit icmp any any unreachable (hitcnt=7408) 0x5c2fa603&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 9 extended permit tcp object-group outside_ip_group any eq 5900 0xe88875b2&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 9 extended permit tcp host HSoftware any eq 5900 (hitcnt=0) 0x2208e16f&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 9 extended permit tcp host Mom_and_Dad any eq 5900 (hitcnt=0) 0xa3aaaedd&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 10 extended permit tcp any any object-group Email_Ports 0x91529965&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 10 extended permit tcp any any eq imap4 (hitcnt=17) 0x53d153bd&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 10 extended permit tcp any any eq 465 (hitcnt=0) 0x4d992f5e&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 10 extended permit tcp any any eq 587 (hitcnt=0) 0x734d200d&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 10 extended permit tcp any any eq 993 (hitcnt=0) 0xb91930a9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in line 11 extended permit udp any any object-group Email_Ports 0xe12dbb9d&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 11 extended permit udp any any eq 143 (hitcnt=0) 0x34d1c49d&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 11 extended permit udp any any eq 465 (hitcnt=0) 0x5cc4b908&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 11 extended permit udp any any eq 587 (hitcnt=0) 0x6e3b53a3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; access-list outside_access_in line 11 extended permit udp any any eq 993 (hitcnt=0) 0x7f9dd9b7&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101087#M395030</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2019-03-12T00:28:49Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101088#M395043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;post output of following:&lt;/P&gt;&lt;P&gt;packet-tracer input tcp 8.8.8.8 1024 192.168.1.130 143 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Nov 2012 17:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101088#M395043</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2012-11-27T17:52:00Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101089#M395052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, the command you posted didn't exactly work so I entered what seemed correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RyansFirewall(config): packet-tracer input outside tcp 8.8.8.8 465 192.168.1.130 465 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object-group Email_Ports any any&lt;/P&gt;&lt;P&gt;object-group service Email_Ports&lt;/P&gt;&lt;P&gt; service-object tcp-udp source eq 143&lt;/P&gt;&lt;P&gt; service-object tcp-udp source eq 465&lt;/P&gt;&lt;P&gt; service-object tcp-udp source eq 587&lt;/P&gt;&lt;P&gt; service-object tcp-udp source eq 993&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7e826e8, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xd613bf50, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=465&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7de9018, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=635, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list outside_access_in&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp outside any outside any eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (Public IP Address [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7e62278, priority=2, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=835, user_data=0xd7e61e60, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7debf90, priority=0, domain=host-limit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 465 theking 465 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host theking eq 465 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 0.0.0.0/465&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd7e79600, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0xd7e79160, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=theking, mask=255.255.255.255, port=465, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 00:23:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101089#M395052</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T00:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101090#M395063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;paste the output for the following :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 465 &lt;OUTSIDE interface="" ip=""&gt; 465 detailed&lt;/OUTSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;note: outside interface ip you can get via , "sh int ip brief"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 12:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101090#M395063</guid>
      <dc:creator>Riyasat Ali</dc:creator>
      <dc:date>2012-11-28T12:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101091#M395072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Riyasat,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the result of the command. I'm a little confused though as it said it passed through although this port is still not open to my inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RyansFirewall# packet-tracer input outside tcp 8.8.8.8 465 Outside_IP 465 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 465 theking 465 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host theking eq 465 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Outside_IP/465&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate Outside_IP/465 to theking/465 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq 465&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd863ac20, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=9, user_data=0xd613bd70, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=465, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7de9018, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=20003, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list outside_access_in&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp outside any outside any eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (Outside_IP [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7e62278, priority=2, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=25913, user_data=0xd7e61e60, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7debf90, priority=0, domain=host-limit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=143, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 465 theking 465 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host theking eq 465 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to Outside_IP/465&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 2&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xd7e84380, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xd7e58b08, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=theking, mask=255.255.255.255, port=465, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 theking 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host theking eq 3389 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 0.0.0.0/3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 107&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7e70e30, priority=5, domain=host, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1642, user_data=0xd7e6c678, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=theking, mask=255.255.255.255, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xd7d9e160, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=30929, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 31012, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 15:14:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101091#M395072</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T15:14:53Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101092#M395079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Packet Tracer only test the firewall portion. It shows what happens to different traffic based on what you enter after the "packet-tracer" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesnt tell anything about the actual host behind the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One phase of the test states that it matches a permit rule on your firewalls outside interface access-list and shows the access-list rule also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 15:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101092#M395079</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-28T15:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101093#M395085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems like a simple problem and that something is just being overlooked. I have opened other ports on this PC using the same commands. I don't see why this one is any different. For instance, I have opened RDP access to this computer using:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 3389 theking 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So why doesn't the same thing work for port 465? This is my confusion / frustration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 16:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101093#M395085</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T16:05:23Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101094#M395089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the email portion, you do not use port forwarding. You are trying to access Gmail and the ports required are in use at the far end, the source port that you are coming from is dynamic. If you were hosting an email sever, you would need to use port forwarding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue the following command and past the output:&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.1.10 65532 173.194.69.83 465&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do you have WOW Ultra service or just a standard cable modem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Xbox Live will require port forwarding, but let’s work on one issue at a time here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 16:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101094#M395089</guid>
      <dc:creator>lanbrown</dc:creator>
      <dc:date>2012-11-28T16:22:13Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101095#M395092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply lanbrown,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using a regular WOW cable modem with a dynamic ip address. It makes sense what you said about the email part not needing port forwarding, however what do I need to do to get it to communicate? Here is the result of the command that you gave me:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RyansFirewall# packet-tracer input inside tcp 192.168.1.10 65532 173.194.69.83$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (WOWPublicIP [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 20557, untranslate_hits = 3331&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.1.10/65532 to WOWPublicIP/38166 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list outside_access_in&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp outside any outside any eq 3389&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (WOWPublicIP [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 33056, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 16:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101095#M395092</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T16:53:24Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101096#M395094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also on a side note, I have been messing around with xbox live ports but haven't really been able to get them to work either. I am trying to remedy the fact that when I do a network test on my xbox I get a "moderate NAT" rating. We can deal with this after the email though like you said.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 16:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101096#M395094</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T16:55:30Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101097#M395096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the output, it works. Do you have a telnet client on the PC in question? If so, open a telnet session to 173.194.69.83 but instead of port 23 used port 465. If you can create a session (it doesn’t close immediately or you don’t get a timeout) then you did connect to the Gmail server on port 465. That would tell me you have a config issue with the email client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you just have the default permit for the inside access list? To see what is going on, let’s do a capture, you might need to modify to fit your setup. &lt;/P&gt;&lt;P&gt;cap IMAP interface inside match tcp any any eq 465&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;cap IMAP interface inside real-time match tcp any any eq 465&lt;/P&gt;&lt;P&gt;To see the capture do a show capture IMAP except for the bottom one, it will display the packets as they come in. If you see packets then we need to perform a similar setup but this time on the outside interface.&amp;nbsp;&amp;nbsp; You can also use ASDM to do the capture. I think you are going to find that the issue is with the email client. If you can access the Internet and you have the implicit permit for the inside access-list, then the firewall is going to pass the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I asked about if you had the Ultra service from WOW, the firmware on the RG is horrendous and has several glaring bugs; ARP and in how the RG handles DMZ mode.&amp;nbsp; Arris who produces it should leave the market if that is what they are going to produce.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 17:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101097#M395096</guid>
      <dc:creator>lanbrown</dc:creator>
      <dc:date>2012-11-28T17:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101098#M395098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My capture did not get anything. Also when I telnet I get a timeout. --- scratch that just got the capture to work. The result and result in the command prompt is below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RyansFirewall# cap IMAP interface inside real-time match tcp any any eq 465&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warning: using this option with a slow console connection may&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; result in an excessive amount of non-displayed packets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; due to performance limitations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use ctrl-c to terminate real-time capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 12:53:27.075084 802.1Q vlan#1 P0 192.168.1.130.1192 &amp;gt; 173.194.69.83.465: S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3177691729:3177691729(0) win 64512 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 2: 12:53:30.121926 802.1Q vlan#1 P0 192.168.1.130.1192 &amp;gt; 173.194.69.83.465: S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3177691729:3177691729(0) win 64512 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 3: 12:53:36.109705 802.1Q vlan#1 P0 192.168.1.130.1192 &amp;gt; 173.194.69.83.465: S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3177691729:3177691729(0) win 64512 &lt;MSS 1260=""&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;3 packets shown.&lt;/P&gt;&lt;P&gt;0 packets not shown due to performance limitations.&lt;/P&gt;&lt;P&gt;RyansFirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C:\Documents and Settings\Ryan&amp;gt;telnet 173.194.69.83 465&lt;/P&gt;&lt;P&gt;Connecting To 173.194.69.83...Could not open connection to the host, on port 465&lt;/P&gt;&lt;P&gt;: Connect failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you explain what allows an inside port to be open? I'm not well versed in NAT and I thought the static command was allowing it to be open?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 17:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101098#M395098</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T17:54:12Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101099#M395101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you needed to create a NAT for every connection, you would need one for HTTP (80) one for HTTPS (443), etc. On the inside you are masking 192.168.1.0/24 as the egress interface which in this case is the Internet interface IP. The static NAT’s you created are there to take a port on the Internet interface IP and direct it towards an internal host. So that is from outside in, inside out a dynamic NAT would be used; this is the nat (inside) 1 0.0.0.0 0.0.0.0 command you have listed. What allows the port to be opened is a combination of the ACL and the NAT rules (there are others that play a factor, like routing, etc.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are trying to connect to port 465 at a remote server, so a static NAT is not needed. Unless you are trying to host an email server, then a static NAT is not necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet tracer showed the traffic was allowed but you received a timeout when using a telnet client. Did you specify to use port 465?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any reason why you have 3389 and ftp wide open to the entire Internet? That is a standard port that gets probed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 18:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101099#M395101</guid>
      <dc:creator>lanbrown</dc:creator>
      <dc:date>2012-11-28T18:28:41Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101100#M395102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I did specify to use port 465. I used the command "telnet ipaddress 465". The reason that 3389 and FTP are wide open is that I travel for work and I never know what public IP I will be coming in on when I want to connect to my home PC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 18:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101100#M395102</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T18:35:53Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101101#M395103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty much ready to give up at this point. Like you said there's no reason it shouldn't be working and yet I still can't telnet to the ports I desire. Maybe we could switch gears and figure out why my NAT is being rated moderate in xbox live? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 18:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101101#M395103</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T18:41:19Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101102#M395104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn’t trust certain regions in the world; I would at least use different ports. You could keep them the same on the inside, but on the outside you wouldn’t be connecting to 3389.&amp;nbsp; Ideally you would use different ports (unless you can’t) but also create a list of subnets that can use that service and deny the rest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the capture, we did see traffic.&amp;nbsp; Was that traffic from the telnet command?&amp;nbsp; Try the packet tracer command again but instead of 192.168.1.10 use the machine you are trying to get the e-mail client to work on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 18:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101102#M395104</guid>
      <dc:creator>lanbrown</dc:creator>
      <dc:date>2012-11-28T18:44:36Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101103#M395105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the capture was from the telnet command. I re-ran the packet tracer to my machine IP address and got the same success result.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 19:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101103#M395105</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-28T19:00:32Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101104#M395106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What OS are you using?&amp;nbsp; Is a software firewall being used on the local machine?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2012 19:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101104#M395106</guid>
      <dc:creator>lanbrown</dc:creator>
      <dc:date>2012-11-28T19:09:16Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101105#M395107</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm using Windows XP and I do have a Zone Alarm software firewall but i've disabled it for purposes of this testing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2012 14:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101105#M395107</guid>
      <dc:creator>macdady843</dc:creator>
      <dc:date>2012-11-29T14:35:22Z</dc:date>
    </item>
    <item>
      <title>Simple Port Forwarding / ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101106#M395108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the firewall is dropping the traffic for any reason, then this will show us:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap IMAP type asp-drop all real-time&lt;/P&gt;&lt;P&gt;Perform your IMAP test with your mail client and post the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2012 15:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-port-forwarding-acl-question/m-p/2101106#M395108</guid>
      <dc:creator>lanbrown</dc:creator>
      <dc:date>2012-11-29T15:19:08Z</dc:date>
    </item>
  </channel>
</rss>

