<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't open port on ASA! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916326#M457261</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;reverse IPs in the static statement&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 07 Apr 2012 15:36:56 GMT</pubDate>
    <dc:creator>Roman Rodichev</dc:creator>
    <dc:date>2012-04-07T15:36:56Z</dc:date>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916325#M457260</link>
      <description>&lt;P&gt;If anyone thinks they can help, please do, I'm desperately trying to help a company with a short term deadline.&amp;nbsp; Just doing it to help out a friend in a rural area where every CISCO tech contact they had seems to be unavailable (For the last and next week) all at once.&amp;nbsp; I'm tearing my hair out!&amp;nbsp; Here's the current ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3) &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname [top secret!] &lt;/P&gt;&lt;P&gt;domain-name [top secret!] &lt;/P&gt;&lt;P&gt;enable password [top secret!] encrypted &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Vlan1 &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address [top secret!].140 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Vlan2 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address [top secret!].11 255.255.255.248&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Vlan3 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no forward interface Vlan1 &lt;/P&gt;&lt;P&gt;nameif dmz &lt;/P&gt;&lt;P&gt;security-level 50 &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/0 &lt;/P&gt;&lt;P&gt;switchport access vlan 2 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/1 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/2 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/3 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/4 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/5 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/6 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/7 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;passwd [top secret!] encrypted &lt;/P&gt;&lt;P&gt;ftp mode passive &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS &lt;/P&gt;&lt;P&gt;domain-name [top secret!] &lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface &lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip [top secret!] 255.255.255.0 10.0. &lt;/P&gt;&lt;P&gt;8.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 10.0.50.0 255.255.255.24 &lt;/P&gt;&lt;P&gt;8 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 10.0. &lt;/P&gt;&lt;P&gt;6.0 255.255.255.0 – Not in your configuration &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.0.1.0 255.255.255.0 10.0.8 &lt;/P&gt;&lt;P&gt;.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list tr-remote_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp [top secret!] 255.255.255.0 any eq &lt;/P&gt;&lt;P&gt;smtp &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 10.0.1.0 255.255.255.0 10.0.6 &lt;/P&gt;&lt;P&gt;.0 255.255.255.0 – Not in your configuration &lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging enable &lt;/P&gt;&lt;P&gt;logging monitor debugging &lt;/P&gt;&lt;P&gt;logging asdm informational &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu dmz 1500 &lt;/P&gt;&lt;P&gt;ip local pool remote-vpn 10.0.50.0-10.0.50.7 mask 255.255.255.0 &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;/P&gt;&lt;P&gt;icmp permit any inside &lt;/P&gt;&lt;P&gt;icmp permit any outside &lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-523.bin &lt;/P&gt;&lt;P&gt;no asdm history enable &lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 10.0.1.201 smtp netmask 255.255.255.2 &lt;/P&gt;&lt;P&gt;55&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside – Not in your configuration &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 [top secret!].9 1 – was [top secret!].194 in you config &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 &lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 10.0.6.0 255.255.255.0 inside – Not in your configuration &lt;/P&gt;&lt;P&gt;http 10.0.8.0 255.255.255.0 inside – Outside in your configuration &lt;/P&gt;&lt;P&gt;http 10.0.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;http 10.0.50.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac – Not in your configuration &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-DES-MD5 &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA – Not in your configuration &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer [top secret!].194 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-DES-MD5 &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 match address outside_2_cryptomap &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set peer [top secret!].162 &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA – Not in your configuration &lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map &lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside &lt;/P&gt;&lt;P&gt;crypto isakmp policy 10 &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;encryption des &lt;/P&gt;&lt;P&gt;hash md5 &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;lifetime 86400 &lt;/P&gt;&lt;P&gt;crypto isakmp policy 30 &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;encryption 3des &lt;/P&gt;&lt;P&gt;hash sha &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;console timeout 0 &lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map inspection_default &lt;/P&gt;&lt;P&gt;match default-inspection-traffic &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;parameters &lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512 &lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;/P&gt;&lt;P&gt;class inspection_default &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;service-policy global_policy global &lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes &lt;/P&gt;&lt;P&gt;banner none &lt;/P&gt;&lt;P&gt;wins-server none &lt;/P&gt;&lt;P&gt;dns-server none &lt;/P&gt;&lt;P&gt;dhcp-network-scope none &lt;/P&gt;&lt;P&gt;vpn-access-hours none &lt;/P&gt;&lt;P&gt;vpn-simultaneous-logins 3 &lt;/P&gt;&lt;P&gt;vpn-idle-timeout none &lt;/P&gt;&lt;P&gt;vpn-session-timeout none &lt;/P&gt;&lt;P&gt;vpn-filter none &lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec webvpn &lt;/P&gt;&lt;P&gt;password-storage disable &lt;/P&gt;&lt;P&gt;ip-comp disable &lt;/P&gt;&lt;P&gt;re-xauth disable &lt;/P&gt;&lt;P&gt;group-lock none &lt;/P&gt;&lt;P&gt;pfs disable &lt;/P&gt;&lt;P&gt;ipsec-udp disable &lt;/P&gt;&lt;P&gt;ipsec-udp-port 10000 &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelall &lt;/P&gt;&lt;P&gt;split-tunnel-network-list none &lt;/P&gt;&lt;P&gt;default-domain none &lt;/P&gt;&lt;P&gt;split-dns none &lt;/P&gt;&lt;P&gt;intercept-dhcp 255.255.255.255 disable &lt;/P&gt;&lt;P&gt;secure-unit-authentication disable &lt;/P&gt;&lt;P&gt;user-authentication disable &lt;/P&gt;&lt;P&gt;user-authentication-idle-timeout 30 &lt;/P&gt;&lt;P&gt;ip-phone-bypass disable &lt;/P&gt;&lt;P&gt;leap-bypass disable &lt;/P&gt;&lt;P&gt;nem disable &lt;/P&gt;&lt;P&gt;backup-servers keep-client-config &lt;/P&gt;&lt;P&gt;msie-proxy server none &lt;/P&gt;&lt;P&gt;msie-proxy method no-modify &lt;/P&gt;&lt;P&gt;msie-proxy except-list none &lt;/P&gt;&lt;P&gt;msie-proxy local-bypass disable &lt;/P&gt;&lt;P&gt;nac disable &lt;/P&gt;&lt;P&gt;nac-sq-period 300 &lt;/P&gt;&lt;P&gt;nac-reval-period 36000 &lt;/P&gt;&lt;P&gt;nac-default-acl none &lt;/P&gt;&lt;P&gt;address-pools none &lt;/P&gt;&lt;P&gt;smartcard-removal-disconnect enable &lt;/P&gt;&lt;P&gt;client-firewall none &lt;/P&gt;&lt;P&gt;client-access-rule none &lt;/P&gt;&lt;P&gt;webvpn &lt;/P&gt;&lt;P&gt;&amp;nbsp; functions url-entry &lt;/P&gt;&lt;P&gt;&amp;nbsp; html-content-filter none &lt;/P&gt;&lt;P&gt;&amp;nbsp; homepage none &lt;/P&gt;&lt;P&gt;&amp;nbsp; keep-alive-ignore 4 &lt;/P&gt;&lt;P&gt;&amp;nbsp; http-comp gzip &lt;/P&gt;&lt;P&gt;&amp;nbsp; filter none &lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list none &lt;/P&gt;&lt;P&gt;&amp;nbsp; customization value DfltCustomization &lt;/P&gt;&lt;P&gt;&amp;nbsp; port-forward none &lt;/P&gt;&lt;P&gt;&amp;nbsp; port-forward-name value Application Access &lt;/P&gt;&lt;P&gt;&amp;nbsp; sso-server none &lt;/P&gt;&lt;P&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not &lt;/P&gt;&lt;P&gt;been met or due to some specific group policy, you do not have permission to us &lt;/P&gt;&lt;P&gt;e any of the VPN features. Contact your IT administrator for more information &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc none &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keep-installer installed &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keepalive none &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc rekey time none &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc rekey method none &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dpd-interval client none &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dpd-interval gateway none &lt;/P&gt;&lt;P&gt;&amp;nbsp; svc compression deflate – Not in your configuration &lt;/P&gt;&lt;P&gt;group-policy tr-remote internal &lt;/P&gt;&lt;P&gt;group-policy tr-remote attributes &lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified &lt;/P&gt;&lt;P&gt;split-tunnel-network-list value tr-remote_splitTunnelAcl &lt;/P&gt;&lt;P&gt;group-policy staff-remote internal &lt;/P&gt;&lt;P&gt;group-policy staff-remote attributes &lt;/P&gt;&lt;P&gt;dns-server value 10.0.1.200 &lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;username remote password [top secret!] encrypted privilege 0 &lt;/P&gt;&lt;P&gt;username remote attributes &lt;/P&gt;&lt;P&gt;vpn-group-policy [top secret!] &lt;/P&gt;&lt;P&gt;username [top secret!] password [top secret!] encrypted privilege 0 &lt;/P&gt;&lt;P&gt;username [top secret!] attributes &lt;/P&gt;&lt;P&gt;vpn-group-policy tr-remote &lt;/P&gt;&lt;P&gt;tunnel-group [top secret!].194 type ipsec-l2l &lt;/P&gt;&lt;P&gt;tunnel-group [top secret!].194 ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;tunnel-group tr-remote type ipsec-ra &lt;/P&gt;&lt;P&gt;tunnel-group tr-remote general-attributes &lt;/P&gt;&lt;P&gt;address-pool remote-vpn &lt;/P&gt;&lt;P&gt;default-group-policy tr-remote &lt;/P&gt;&lt;P&gt;tunnel-group tr-remote ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;tunnel-group [top secret!].162 type ipsec-l2l &lt;/P&gt;&lt;P&gt;tunnel-group [top secret!].162 ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;tunnel-group staff-remote type ipsec-ra &lt;/P&gt;&lt;P&gt;tunnel-group staff-remote general-attributes &lt;/P&gt;&lt;P&gt;address-pool remote-vpn &lt;/P&gt;&lt;P&gt;default-group-policy [top secret!]&lt;/P&gt;&lt;P&gt;tunnel-group [top secret!] ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key *&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:[top secret!] &lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;an epic thin client is being set up and the company was simply told to (on their Cisco ASA) enable NAT, with external ip xxx.xxx.xxx.14, internal ip 10.0.xx.xx, and open port 8222.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went in and added this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.58 xxx.xxx.xxx.14 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when we try and run the thin client install, we get an error saying invalid ip/port xxx.xxx.xxx.14/8222.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help if you can.&amp;nbsp; I'd be so appreciative.&amp;nbsp; Have already been so thankful for earlier responses.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:51:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916325#M457260</guid>
      <dc:creator>pgmccullough</dc:creator>
      <dc:date>2019-03-11T22:51:39Z</dc:date>
    </item>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916326#M457261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;reverse IPs in the static statement&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Apr 2012 15:36:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916326#M457261</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2012-04-07T15:36:56Z</dc:date>
    </item>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916327#M457262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much for the quick reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, I switched it to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.14 xxx.xxx.xxx.58 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but it didn't appear to make a difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to also change all of the access-list lines to define the xxxxxxx.58 (internal) ip instead of the xxxxxxxxxxxx.14 (external)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Apr 2012 15:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916327#M457262</guid>
      <dc:creator>pgmccullough</dc:creator>
      <dc:date>2012-04-07T15:51:40Z</dc:date>
    </item>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916328#M457263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay--so the ASA's ip is xxxxxxxxx.11.&amp;nbsp; The external ip that needs to be set up for this is xxxxxxxxxx.14 and point to internal ip xxx.xxx.xxx.58 with port 8222 open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So originally I had:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.58 xxx.xxx.xxx.14 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.11 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.11 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.11 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.11 eq 8222&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but a commenter on another discussion said that the 14 and 11 needed to match.&amp;nbsp; So I changed to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.58 xxx.xxx.xxx.14 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above poster pointed out that static statement needed to be swapped, so it became:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.14 xxx.xxx.xxx.58 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am certain that the swapping statics was correct, but it didn't make a difference.&amp;nbsp; I went back and tried to run the epic thin client set up, and still got an invalid ip/port error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I went back to having the original instance of pointing from the public IP the thin client will connect to, to the ASA ip.&amp;nbsp; And I went nuclear with permissions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.58 xxx.xxx.xxx.14 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.11 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.11 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.11 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.11 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.58 eq www&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.58 eq https&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.58 eq 8222&lt;/P&gt;&lt;P&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.58 eq 8222&lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now the thin client install gives another error, saying it can't install to specified host or something.&amp;nbsp; Which feels like progress!&amp;nbsp; Though I'm sure the access-list inbound on everything is a bad security idea.&amp;nbsp; I just needed to play around to see what was going on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Apr 2012 17:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916328#M457263</guid>
      <dc:creator>pgmccullough</dc:creator>
      <dc:date>2012-04-07T17:41:54Z</dc:date>
    </item>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916329#M457264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; did you try to run the packet tracer to find out what is causing the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also try to capture the traffic on the ingress and egress interface to see if the issue is at the ASA or somewhere else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;refer to the below link for the packet capture on ASA&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-17345#comment-8416"&gt;https://supportforums.cisco.com/docs/DOC-17345#comment-8416&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Send me the output of the below command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.1.1.1 1234 xxx.xxx.xxx.58 8222 det&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2012 05:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916329#M457264</guid>
      <dc:creator>Amit Rai</dc:creator>
      <dc:date>2012-04-08T05:52:55Z</dc:date>
    </item>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916330#M457266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is absolutely correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,outside) xxx.xxx.xxx.14 xxx.xxx.xxx.58 netmask 255.255.255.255&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq www&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq https&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list inbound extended permit tcp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-list inbound extended permit udp any host xxx.xxx.xxx.14 eq 8222&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static goes as : inside outside externalIP internalIP&lt;/P&gt;&lt;P&gt;Inbound outside ACL must reference externalIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;starting with ASA code 8.3 (you are running something before 8.3), there are no more static commands, and ACL would have to reference internalIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you telnet to xxx.xxx.xxx.14 ports 80, 443 and 8222 from outside. Just do "telnet xxx.xxx.xxx.14 80", if it connects, then you are good, if not, then something's wrong. Verify that you can telnet xxx.xxx.xxx.58 80 from inside. And verify that xxx.xxx.xxx.14 is definitely routed to the ASA's outside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Apr 2012 07:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916330#M457266</guid>
      <dc:creator>Roman Rodichev</dc:creator>
      <dc:date>2012-04-08T07:18:15Z</dc:date>
    </item>
    <item>
      <title>Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916331#M457268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x3582098, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1722090, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.0.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x35fa678, priority=11, domain=permit, deny=true&lt;BR /&gt; in&amp;nbsp; id=0x35fa678, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 16:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916331#M457268</guid>
      <dc:creator>pgmccullough</dc:creator>
      <dc:date>2012-04-09T16:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916332#M457269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also post the whole &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command that you used for the above output?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding if you just want to give an inside IP address its own public IP address it should be done the way it was already mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) &lt;NEW outside="" ip=""&gt; &lt;INSIDE ip=""&gt; netmask 255.255.255.255&lt;/INSIDE&gt;&lt;/NEW&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list &lt;YOUR outside="" acces-list="" name=""&gt; permit tcp any host &lt;PUBLIC ip=""&gt; eq 8222&lt;/PUBLIC&gt;&lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you test the configuration with "packet-tracer" command the format should be this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.2.3.4 1025 &lt;NEW public="" ip=""&gt; 8222&lt;/NEW&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command parameters in order from left to right&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;packet-tracer&lt;/STRONG&gt; = the command itself&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;input&lt;/STRONG&gt; = the input parameter (no other available) used before giving the actual interface name on ASA&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;outside&lt;/STRONG&gt; = the interface name on the ASA&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;tcp&lt;/STRONG&gt; = protocol used&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;1.2.3.4&lt;/STRONG&gt; = random source address chosen&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;1025&lt;/STRONG&gt; = random source port chosen&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;NEW public="" ip=""&gt;&lt;/NEW&gt;&lt;/STRONG&gt; = the IP address you have chosen for the static command&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;8222&lt;/STRONG&gt; = the port you were asked to open (or any other port you need to test)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 18:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916332#M457269</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-04-09T18:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: Can't open port on ASA!</title>
      <link>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916333#M457270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much.&amp;nbsp; At this point, it looks like things OUGHT to be working.&amp;nbsp; I can successfully telnet xx.xx.xx.14 8222, which seems like it bodes well.&amp;nbsp; I can't tell you how deeply I appreciate everyone's responses.&amp;nbsp; I will come back and rate appropriately once we can confirm success in the next day or two.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 18:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-open-port-on-asa/m-p/1916333#M457270</guid>
      <dc:creator>pgmccullough</dc:creator>
      <dc:date>2012-04-09T18:54:57Z</dc:date>
    </item>
  </channel>
</rss>

