<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAT with a single public IP and several servers behind firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135188#M395270</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-group acl-out in interface outside
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When viewing ADSM and logging, when I try to access Https:\\16.2.3.4:445 from the internet, it doesn't even show an entry in the log coming from the machine on the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I know port 445 is on, because internally, i can go to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.1.20.92:445"&gt;https://10.1.20.92:445&lt;/A&gt;&lt;SPAN&gt; and access the DRAC interface.&amp;nbsp; The gateway is correct at 10.1.20.1.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Dec 2012 08:22:55 GMT</pubDate>
    <dc:creator>moogeboo1</dc:creator>
    <dc:date>2012-12-17T08:22:55Z</dc:date>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135181#M395251</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New to the ASA 5505 8.4 software version, but here is what I'm trying to do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Single static public IP:&amp;nbsp; 16.2.3.4&lt;/P&gt;&lt;P&gt;Need to PAT several ports to three separate servers behind firewall&lt;/P&gt;&lt;P&gt;One server houses email, pptp server, ftp server and web services: 10.1.20.91&lt;/P&gt;&lt;P&gt;One server houses drac management (port 445): 10.1.20.92&lt;/P&gt;&lt;P&gt;One server is the IP phone server using a range of ports: 10.1.20.156&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, need to PAT the ports associated with each server to the respective servers behind the ASA 5505.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I have.&amp;nbsp; Is anything missing from this config? Do I need to include a global policy for PPTP and SMTP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname kaa-pix&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 16.2.3.4 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network server_smtp&lt;/P&gt;&lt;P&gt; host 10.1.20.91&lt;/P&gt;&lt;P&gt;object service Port_25&lt;/P&gt;&lt;P&gt; service tcp source eq smtp&lt;/P&gt;&lt;P&gt;object service Port_3389&lt;/P&gt;&lt;P&gt; service tcp source eq 3389&lt;/P&gt;&lt;P&gt;object service Port_1723&lt;/P&gt;&lt;P&gt; service tcp source eq pptp&lt;/P&gt;&lt;P&gt;object service Port_21&lt;/P&gt;&lt;P&gt; service tcp source eq ftp&lt;/P&gt;&lt;P&gt;object service Port_443&lt;/P&gt;&lt;P&gt; service tcp source eq https&lt;/P&gt;&lt;P&gt;object service Port_444&lt;/P&gt;&lt;P&gt; service tcp source eq 444&lt;/P&gt;&lt;P&gt;object network drac&lt;/P&gt;&lt;P&gt; host 10.1.20.92&lt;/P&gt;&lt;P&gt;object service Port_445&lt;/P&gt;&lt;P&gt; service tcp source eq 445&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any interface outside eq pptp&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object server_smtp eq smtp&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object server_smtp eq pptp&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object server_smtp eq 3389&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object server_smtp eq ftp&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object server_smtp eq https&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object server_smtp eq 444&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object drac eq 445&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server_smtp interface service Port_25 Port_25&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #222222; font-family: arial; font-size: small; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server_smtp interface service Port_3389 Port_&lt;/P&gt;&lt;P&gt;3389&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server_smtp interface service Port_1723 Port_&lt;/P&gt;&lt;P&gt;1723&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server_smtp interface service Port_21 Port_21&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #222222; font-family: arial; font-size: small; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server_smtp interface service Port_443 Port_4&lt;/P&gt;&lt;P&gt;43&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server_smtp interface service Port_444 Port_4&lt;/P&gt;&lt;P&gt;44&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static drac interface service Port_445 Port_445&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 16.2.3.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #222222; font-family: arial; font-size: small; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #222222; font-family: arial; font-size: small; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135181#M395251</guid>
      <dc:creator>moogeboo1</dc:creator>
      <dc:date>2019-03-12T00:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: PAT with a single public IP and several servers behind firew</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135182#M395256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks good for SMTP.&lt;/P&gt;&lt;P&gt;PPTP also uses GRE which cannot be configured with port forward since it doesn't use a specific port or range of ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which ones are not working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried packet tracer for the nonworking ones?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet in outside tcp 8.8.8.8 1025 16.2.3.4 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe&amp;nbsp; &lt;/P&gt;&lt;P&gt;Security Team&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2012 19:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135182#M395256</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-11-22T19:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: PAT with a single public IP and several servers behind firew</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135183#M395261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Lcambron...I got PPTP to work.&amp;nbsp; Everything else works fine.&amp;nbsp; I can access email, access my web server, FTP server, and PPTP server.&amp;nbsp; However, from the above configuration, I cannot access my DRAC over the internet..The DRAC runs on a different internal server, and over port 445.&amp;nbsp; So I have th following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network drac&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;host 10.1.20.92&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object service Port_445&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service tcp source eq 445&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl-out extended permit tcp any object drac eq 445&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static drac interface service Port_445 Port_445&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something here?&amp;nbsp; Internally, i can telnet to port 445 on 10.1.20.92, so I know it is listening.&amp;nbsp; However, externally, i cannot telnet to my external ip address of the ASA through port 445.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 07:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135183#M395261</guid>
      <dc:creator>moogeboo1</dc:creator>
      <dc:date>2012-12-14T07:48:08Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135184#M395265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally configure the Port Forward NATs with a different way. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example the above mentioned case i would configure in the following way (while removing the old one)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DRAC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.1.20.92&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 445 445&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit tcp any object DRAC eq 445&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same type of format could be applied to any Port Forward configured (if needed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2012 15:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135184#M395265</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-14T15:33:46Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135185#M395267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks JouniForss.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I implemented your commands and removed the ones from my configuration, and yet I still cannot reach the DRAC interface over port 445.&amp;nbsp; I know the DRAC is listening on port 445, as i can access the DRAC interface internally at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.1.20.92:445"&gt;https://10.1.20.92:445&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp; However, when trying to telnet to port 445 on the external IP address, I get connection failed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Any other ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Dec 2012 18:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135185#M395267</guid>
      <dc:creator>moogeboo1</dc:creator>
      <dc:date>2012-12-15T18:32:17Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135186#M395268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though you stated that everything else works, I just have to ask, have you attached the ACL to the outside interface? I cant see the "access-group" command in the above configuration which would attach the ACL in question to the interface. (Then again I guess theres some other configurations that hasnt been attached there?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since looking at the configurations it seems that all the other Port Forwards are done to another server, is this server configured with a correct default gateway so the return traffic for the test from Internet would find a route back? It wouldnt need this default route for the connections to work inside the same subnet/LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you connect to the firewall with ASDM and use the Monitor/Logging on it and at the sametime test the connection from Internet? See what the logs say and copy/paste them here. Make sure the ASDM logging is set to "informational" atleast&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This can be done with "logging asdm infromational" from CLI or from the ASDM settings themselves.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Dec 2012 21:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135186#M395268</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-15T21:29:00Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135187#M395269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;watch &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; show conn detail long | i 10.1.20.92&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;output while connecting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure it is 445 and not 443? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Dec 2012 21:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135187#M395269</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2012-12-15T21:42:43Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135188#M395270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-group acl-out in interface outside
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When viewing ADSM and logging, when I try to access Https:\\16.2.3.4:445 from the internet, it doesn't even show an entry in the log coming from the machine on the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I know port 445 is on, because internally, i can go to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.1.20.92:445"&gt;https://10.1.20.92:445&lt;/A&gt;&lt;SPAN&gt; and access the DRAC interface.&amp;nbsp; The gateway is correct at 10.1.20.1.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 08:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135188#M395270</guid>
      <dc:creator>moogeboo1</dc:creator>
      <dc:date>2012-12-17T08:22:55Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135189#M395271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Yes, it is on port 445, rather than 443, because another internal server is listening on 443 (10.1.20.91) so this server (10.1.20.92) had to be changed to use port 445.&amp;nbsp; I know it is correct, because internally, I can access &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://10.1.20.92:445"&gt;https://10.1.20.92:445&lt;/A&gt;&lt;SPAN&gt; just fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 08:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135189#M395271</guid>
      <dc:creator>moogeboo1</dc:creator>
      <dc:date>2012-12-17T08:24:22Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135190#M395272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually port TCP/445 is used for something totally different than you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the possibility that your ISP is blocking the said port on their side as you said you never even see the connection attempt?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you try Port Forward some other random port and try again with the new port?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 08:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135190#M395272</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-17T08:55:28Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135191#M395273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni...You were right.&amp;nbsp; The ISP was blocking port 445, thus it did not work.&amp;nbsp; Thanks for the pointer...I was puzzled as to why the config was not working when everything looked correct.&amp;nbsp; Changing the port on the DRAC side did the trick.&amp;nbsp; Thanks again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mooge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 05:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135191#M395273</guid>
      <dc:creator>moogeboo1</dc:creator>
      <dc:date>2012-12-18T05:53:57Z</dc:date>
    </item>
    <item>
      <title>PAT with a single public IP and several servers behind firewall</title>
      <link>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135192#M395274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad it worked out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have recently run into this issue a couple of times when old devices previously (or even currently) used for "gathering" DSLAMs have had filter configurations in them to limit the ports used by Windows machines for file sharing etc. This has caused some problems between customers connection between branches. Whats made the situation even more wierd has been that usually they've been L2 directly connected to the firewall and yet firewall sees even no connection attempts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Had to scratch my head a bit when this first happened &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 07:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pat-with-a-single-public-ip-and-several-servers-behind-firewall/m-p/2135192#M395274</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-18T07:02:48Z</dc:date>
    </item>
  </channel>
</rss>

