<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Basic ACL Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-acl-question/m-p/1811319#M456097</link>
    <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a 5505 on ASA 8.2 in the field already working. It has two interfaces, LAN/inside and WAN/outside. There is an L2 site-to-site IPSec tunnel configured from the outside interface of the local ASA to the outside interface of a remote F/W (between local internal host .1/32 and remote internal host .1/32). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to enable port forwading for a single port to the outside IP of the local ASA to forward to the internal host .2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I apply the below configurations at the CLI will this let in the desired traffic without dirupting the IPSec tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface&amp;nbsp; outside eq 555 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 555 192.168.0.2 555 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reading.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:20:16 GMT</pubDate>
    <dc:creator>jwbensley</dc:creator>
    <dc:date>2019-03-11T22:20:16Z</dc:date>
    <item>
      <title>Basic ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/basic-acl-question/m-p/1811319#M456097</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a 5505 on ASA 8.2 in the field already working. It has two interfaces, LAN/inside and WAN/outside. There is an L2 site-to-site IPSec tunnel configured from the outside interface of the local ASA to the outside interface of a remote F/W (between local internal host .1/32 and remote internal host .1/32). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to enable port forwading for a single port to the outside IP of the local ASA to forward to the internal host .2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I apply the below configurations at the CLI will this let in the desired traffic without dirupting the IPSec tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface&amp;nbsp; outside eq 555 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 555 192.168.0.2 555 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reading.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-acl-question/m-p/1811319#M456097</guid>
      <dc:creator>jwbensley</dc:creator>
      <dc:date>2019-03-11T22:20:16Z</dc:date>
    </item>
    <item>
      <title>Basic ACL Question</title>
      <link>https://community.cisco.com/t5/network-security/basic-acl-question/m-p/1811320#M456100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your encryption domain ACL includes only the hosts x.x.x.1 and x.x.x.1, then your static port forward for x.x.x.2 should not cause any issues with the VPN. To be sure, I am answering this under the understanding that the connection to your FW's Interface IP &amp;amp; port 555 is &lt;EM&gt;not&lt;/EM&gt; coming from within the VPN tunnel.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover, the port you are using (555) is not a standard port used in IPSec VPNs, so you don't have to worry about anything there.&amp;nbsp; Most VPNs will be using protocol 50 (ESP), protocol 51 (AH), UDP port 500 (ISAKMP), or UDP port 4500 (NAT-T).&amp;nbsp; So TCP 555 does not run the risk of overlapping with one of these.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 20:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-acl-question/m-p/1811320#M456100</guid>
      <dc:creator>eddie.harmoush</dc:creator>
      <dc:date>2012-01-27T20:22:18Z</dc:date>
    </item>
  </channel>
</rss>

