<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port Forwarding Help!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066970#M398369</link>
    <description>&lt;P&gt;After banging my head on my keyboard for about 3 days straight now I have to ask for help. I am trying to forward specific ports from the outside interface on my ASA5505 to my servers inside and can not get it to work! I have a VPN that currently works and the firewall rule in place I am just overlooking something simple I'm sure. Here is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;passwd &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 172.20.2.4 DC&lt;/P&gt;&lt;P&gt;name 172.20.2.7 VP&lt;/P&gt;&lt;P&gt;name 172.20.2.24 AP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.0.3 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address &amp;lt;Public-IP&amp;gt; 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 172.20.22.0 255.255.255.192&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 2332&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 5901 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 5500 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 5705 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 81 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-IP-Pool 172.20.22.1-172.20.22.55 mask 255.255.0.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2332 VP 2332 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5901 VP 5901 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5500 VP 5500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5705 AP 5705 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 81 AP 81 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server Radius protocol radius&lt;/P&gt;&lt;P&gt;aaa-server Radius (inside) host 172.20.0.3&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa-server Radius (inside) host DC&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set l2tp-transform esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set l2tp-transform mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpn-transform esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn-map 10 set transform-set l2tp-transform vpn-transform&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn-map 10 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map vpn-map 10 ipsec-isakmp dynamic dyn-map&lt;/P&gt;&lt;P&gt;crypto map vpn-map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 15&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 50&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 172.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.20.2.4&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol l2tp-ipsec&lt;/P&gt;&lt;P&gt; default-domain value hq.vertique.com&lt;/P&gt;&lt;P&gt;username admin password &amp;lt;removed&amp;gt; privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-IP-Pool&lt;/P&gt;&lt;P&gt; authentication-server-group Radius&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt; isakmp keepalive disable&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; no authentication chap&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any input!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:03:07 GMT</pubDate>
    <dc:creator>livingdeadbeat</dc:creator>
    <dc:date>2019-03-12T00:03:07Z</dc:date>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066970#M398369</link>
      <description>&lt;P&gt;After banging my head on my keyboard for about 3 days straight now I have to ask for help. I am trying to forward specific ports from the outside interface on my ASA5505 to my servers inside and can not get it to work! I have a VPN that currently works and the firewall rule in place I am just overlooking something simple I'm sure. Here is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;passwd &amp;lt;removed&amp;gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 172.20.2.4 DC&lt;/P&gt;&lt;P&gt;name 172.20.2.7 VP&lt;/P&gt;&lt;P&gt;name 172.20.2.24 AP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.20.0.3 255.255.0.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address &amp;lt;Public-IP&amp;gt; 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 172.20.22.0 255.255.255.192&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 2332&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 5901 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 5500 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 5705 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host &amp;lt;Public-IP&amp;gt;eq 81 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-IP-Pool 172.20.22.1-172.20.22.55 mask 255.255.0.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2332 VP 2332 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5901 VP 5901 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5500 VP 5500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 5705 AP 5705 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 81 AP 81 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server Radius protocol radius&lt;/P&gt;&lt;P&gt;aaa-server Radius (inside) host 172.20.0.3&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa-server Radius (inside) host DC&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; key *****&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set VPN mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set l2tp-transform esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set l2tp-transform mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpn-transform esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn-map 10 set transform-set l2tp-transform vpn-transform&lt;/P&gt;&lt;P&gt;crypto dynamic-map dyn-map 10 set reverse-route&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map vpn-map 10 ipsec-isakmp dynamic dyn-map&lt;/P&gt;&lt;P&gt;crypto map vpn-map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 15&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 50&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 172.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.20.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 20&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt; dns-server value 172.20.2.4&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol l2tp-ipsec&lt;/P&gt;&lt;P&gt; default-domain value hq.vertique.com&lt;/P&gt;&lt;P&gt;username admin password &amp;lt;removed&amp;gt; privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-IP-Pool&lt;/P&gt;&lt;P&gt; authentication-server-group Radius&lt;/P&gt;&lt;P&gt; default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt; isakmp keepalive disable&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt; no authentication chap&lt;/P&gt;&lt;P&gt; authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any input!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066970#M398369</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2019-03-12T00:03:07Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066971#M398370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your first rules look funky. Are you doing one to one NAT or one to many NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are just using your outside IP as your public and port forwarding to one or more internal hosts, your lines should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq 15961&lt;/P&gt;&lt;P&gt; port-object eq 88&lt;/P&gt;&lt;P&gt; port-object eq 9000&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any object-group DM_INLINE_TCP_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface 15961 172.16.0.3 15961 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 15961 172.16.0.3 15961 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 88 172.16.0.3 88 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 67 172.16.0.3 67 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 68 172.16.0.3 68 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 9000 172.16.0.3 9000 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and your inside NAT statement also is wierd&lt;/P&gt;&lt;P&gt;here is mine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066971#M398370</guid>
      <dc:creator>jayturish</dc:creator>
      <dc:date>2012-10-02T20:22:23Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066972#M398371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your static PAT configuration and access-list looks correct to me.&lt;/P&gt;&lt;P&gt;Are you getting any hitcount on the access-list?&lt;/P&gt;&lt;P&gt;Are you able to telnet on those ports from the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you try to change it to the following (ie: using the interface keyword instead of the actual IP):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 2332&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 5901 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 5500 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 5705 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq 81 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does it work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066972#M398371</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-02T20:24:31Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066973#M398374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The traffic does hit the firewall rule and still does not work with the change mentioned with the desired service or ssh over these ports. This is a many to one NAT with the single public IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066973#M398374</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-02T20:29:55Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066974#M398377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using the ASA version 8.2(5) and the ASDM version 6.4(5) with this config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066974#M398377</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-02T20:32:35Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066975#M398379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the traffic does hit the firewall rule, can you pls share the output of :&lt;/P&gt;&lt;P&gt;show conn | i &lt;PRIVATE-IP-OF-SERVER&gt;&lt;/PRIVATE-IP-OF-SERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any firewall or access rules on the server itself that prevents inbound/incoming connection from the internet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066975#M398379</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-02T20:32:39Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066976#M398382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The output of the show conn | i &lt;IP&gt; is blank ...&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a packet trace I get the following &lt;/P&gt;&lt;P&gt;VTQFW# packet-tracer input outside tcp &lt;PUBLIC ip=""&gt; 2332 172.20.2.7 2332 detailed&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc97cbed8, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=60899, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.20.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc97d2af0, priority=500, domain=permit, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=0, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=&lt;PUBLIC-IP&gt;, mask=255.255.255.255, port=0&lt;/PUBLIC-IP&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066976#M398382</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-02T20:41:50Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066977#M398384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you use the packet-tracer, the destination ip address should be the ASA outside interface IP, not the private IP/real IP of the server, because when you actually connect from the internet/outside, you would be connecting to the public IP/NATed IP, not the private IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is how you should run the packet tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp &lt;PUBLIC ip=""&gt; 2332 &lt;ASA-OUTSIDE-INTERFACE-IP&gt; 2332 detailed&lt;/ASA-OUTSIDE-INTERFACE-IP&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2012 03:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066977#M398384</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-03T03:50:32Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066978#M398385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After using the correct syntax with the trace the traffic is allowed through the firewall ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2012 14:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066978#M398385</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-03T14:28:12Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066979#M398386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent, good to hear it's working correctly now.&lt;/P&gt;&lt;P&gt;Pls kindly mark the post answered so others can learn from it. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Oct 2012 20:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066979#M398386</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-03T20:39:31Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066980#M398387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue is still there. The traffic has always traversed the firewall, i was just using packet tracer incorrectly in troubleshooting. It almost has to be some thing in the NATing at this point doesn't it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066980#M398387</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-04T13:34:41Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066981#M398388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the issue is still there, i can assure you that it is not the ASA at this point.&lt;/P&gt;&lt;P&gt;If you use packet tracer and it allows the traffic through, then the ASA configuration is OK.&lt;/P&gt;&lt;P&gt;I would be looking into the server itself to see if there is any firewall on the server itself that might be preventing inbound connection from the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066981#M398388</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:38:05Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066982#M398389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can ssh into the server from the internet using a second gateway we currently have (and phasing out once this is resolved) so it is not the server as far as I can see it. Now you understand why I am so perplexed!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066982#M398389</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-04T13:40:20Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066983#M398390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case, the default gateway of the server is pointing to the second gateway and the return traffic from the server doesn't pass through this particular ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066983#M398390</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:45:44Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066984#M398391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Shouldn't the server respond back to the ASA since it initiated the request? I don't have the server set to send all traffic through the other gateway ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:14:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066984#M398391</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-04T14:14:56Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066985#M398392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yup, you can't possibly have all the internet routes configured on the server, so yes, the server will definitely use default gateway to route back the traffic.&lt;/P&gt;&lt;P&gt;And no, it is not how the server would respond back to the same ASA where the traffic is coming from. Server will respond back by routing via its default gateway since the traffic is from the internet, it will use a default gateway coz you couldn't possibly configure static routes or have the whole internet in your server routing table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a test, just configure the server default gateway to point to this ASA, i am sure you will be able to access it from the internet with no issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066985#M398392</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T14:23:58Z</dc:date>
    </item>
    <item>
      <title>Port Forwarding Help!!</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066986#M398393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the help! I knew it was something overly simple and stupid I was overlooking!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 16:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-help/m-p/2066986#M398393</guid>
      <dc:creator>livingdeadbeat</dc:creator>
      <dc:date>2012-10-05T16:21:53Z</dc:date>
    </item>
  </channel>
</rss>

