<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help Public Server ASA 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881801#M457488</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I already have an ACL on the outside allowing access to server 192.168.1.124on tcp port 22 (SSH).&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;could you pass me a configuration of this type of solution so I can compare?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Apr 2012 12:37:40 GMT</pubDate>
    <dc:creator>CSCO10962914</dc:creator>
    <dc:date>2012-04-03T12:37:40Z</dc:date>
    <item>
      <title>Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881797#M457471</link>
      <description>&lt;P&gt;People,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I Have a Firewall ASA 5505 with asa 8.4(2) asdm 6.4(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have only one Public IP services and need to publish on the Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;External User (Internet) -&amp;gt; Calls connection on port 22 Internal server 192.168.1.124&lt;/P&gt;&lt;P&gt;External User (Internet) -&amp;gt; Calls connection on port 80 of the Internal 192.168.1.124 server or other server the same inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the first moment I'm just testing the access port 22.&lt;/P&gt;&lt;P&gt;I had it working in version 8.2 but after I updated to 8.4 does not work, I've tested several different configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration (see asa5505_config.txt file)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network remoto_ssh&lt;/P&gt;&lt;P&gt; host 189.120.190.229&lt;/P&gt;&lt;P&gt;object network linux_ssh&lt;/P&gt;&lt;P&gt; host 192.168.1.124&lt;/P&gt;&lt;P&gt; nat (inside,outside) static remoto_ssh&lt;/P&gt;&lt;P&gt; access-list outside_access_in line 1 extended permit tcp any object linux_ssh eq ssh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: Address 189.120.190.229 overlaps with outside interface address.&lt;/P&gt;&lt;P&gt;ERROR: NAT Policy is not downloaded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881797#M457471</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2019-03-11T22:49:49Z</dc:date>
    </item>
    <item>
      <title>Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881798#M457474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I didnt see a routing.......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0&amp;nbsp;&amp;nbsp; xx.xxx.xx.225 1&lt;/P&gt;&lt;P&gt;(this tells the router where the next hop is....... typically the gateway IP of the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(for dynamic pât rule - allows internal users to reach the internet and get return traffic)&lt;/P&gt;&lt;P&gt;object network obj_any_inside&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_any_inside&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(here is port forwarding static Nat rule.&amp;nbsp; assuming .229 is your external IP address.&amp;nbsp;&amp;nbsp; Since you only have one, just use external interface in rule.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Nat22toserver&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.1.124&lt;/P&gt;&lt;P&gt;object network Nat22toserver&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (inside,outside) static interface service tcp ssh ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically your server 192.168.1.124 needs to be an object by itself for ACL rules.&lt;/P&gt;&lt;P&gt;For Nat related rules and services I use nat in object rules and names that indicate what I am portforwarding.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 03:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881798#M457474</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-03T03:12:56Z</dc:date>
    </item>
    <item>
      <title>Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881799#M457484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access the Internet via the default route is working. in my interface outside I have DHCP and it gives me a publicip. Problem is in the PAT or Public Server ..&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/6/0/84068-log.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 04:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881799#M457484</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2012-04-03T04:39:07Z</dc:date>
    </item>
    <item>
      <title>Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881800#M457485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well that looks like an ACL issue not a nat pat issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would that not stop all incoming traffic cold to any of your servers??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 12:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881800#M457485</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-03T12:16:48Z</dc:date>
    </item>
    <item>
      <title>Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881801#M457488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I already have an ACL on the outside allowing access to server 192.168.1.124on tcp port 22 (SSH).&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;could you pass me a configuration of this type of solution so I can compare?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 12:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881801#M457488</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2012-04-03T12:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881802#M457490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay by default at least in 8.43, there are implicit rules such that any traffic from a lower security to a higher security zone is BLOCKED.&amp;nbsp;&amp;nbsp; In other words typically the outside interface has security of "0" and the inside interface "100" and thus all WAN to LAN trafffic inbound is blocked by default.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now to add to that had a longer look at your config.&amp;nbsp; YOu have no static Nat rules and ur placement in the order of the dynamic pat rule is weird. &lt;/P&gt;&lt;P&gt;Sorry I fail to to see any routing commands (i must be blind).&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;By the way Zion is a Dmz right.&amp;nbsp;&amp;nbsp; Zion can only have internet access with the basic license, cannot initiate connectivity to the LAN but the LAN can initiate connectivity to zion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your whole setup is very confusing and suggest you start without VPN to get it working then introduce VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also your deny rule I pointed to above should be the last one in the list of ACL rules. Its the first or second I think.&amp;nbsp; If its even needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 13:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881802#M457490</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-03T13:04:46Z</dc:date>
    </item>
    <item>
      <title>Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881803#M457491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Alex,&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;So you can understand my topology sent you a complete configuration.(see you e-mail ciscosupport)&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;Some considerations:&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;My VPN is working partially, I close the VPN can not access anything more. but I'll leave it to solve later.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;How to publish an SSH service was just what we were seeing evendid several tests today but without success.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;My license based license and then today just use inside andoutside.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;you could tell me step by step what I need to publish this service?(SSH) will try to redo all my settings.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;Attached below new logs and topology.&lt;/P&gt;&lt;P&gt;&lt;BR style="font-family: arial, sans-serif; font-size: 16px; text-align: -webkit-auto; background-color: #f5f5f5;" /&gt;&lt;/P&gt;&lt;P&gt;Thank you for your support.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 21:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881803#M457491</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2012-04-03T21:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881804#M457492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The following files / logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="84367" __jive_id="84367" alt="Access-list.png" class="jive-image-thumbnail jive-image" src="https://community.cisco.com/Access-list.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="84368" __jive_id="84368" alt="Capture_Outside.png" class="jive-image-thumbnail jive-image" src="https://community.cisco.com/Capture_Outside.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="84369" __jive_id="84369" alt="Rotas.png" class="jive-image-thumbnail jive-image" src="https://community.cisco.com/Rotas.png" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 22:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881804#M457492</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2012-04-03T22:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881805#M457494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay I will be unable to help you with a full configuration that has VPN and split tunneling nat or acl rules as I am not that knowlegdable.&amp;nbsp;&amp;nbsp;&amp;nbsp; I can get you going with a simple start and then you can add the complexity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One comment is that with the basic license you can only have three interfaces and that is described by VLANs to my knowedge.&amp;nbsp; YOu have far too many vlans setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN1 INSIDe&lt;/P&gt;&lt;P&gt;VLAN2 - OUTSIDE&lt;/P&gt;&lt;P&gt;VLANX - DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see you also have a VLAN3, a VLAN4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have to decide which VLAN your going to keep and how you will structure your setup.&lt;/P&gt;&lt;P&gt;Stuff you want more public suggest you put on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets start with no VPN and one server with one service on LAN (inside) and one on the DMZ or if you have none intended for the LAN, two on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have groups of external users or singles that you want to use to limit access to those servers.&lt;/P&gt;&lt;P&gt;We can walk through who should have access to what...........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV id="wrc-float-icon"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2012 23:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881805#M457494</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-03T23:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881806#M457496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Alex,&lt;/P&gt;&lt;P&gt;I cleaned my configuration and was only Inside and Outside. currently is workingmy access to internet but still could not access my ssh server by outside.&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 00:29:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881806#M457496</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2012-04-04T00:29:02Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881807#M457498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not see the point of this object rule......&lt;/P&gt;&lt;P&gt;What purpose does it serve?&amp;nbsp; You have already identified the inside lan on the interface setup.&lt;/P&gt;&lt;P&gt;(ip address 192.168.1.1 255.255.255.0) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV id="wrc-float-icon"&gt; &lt;/DIV&gt;&lt;P&gt;object network rede_inside&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp; ??????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am unfamiliar with DCHP setroute.&amp;nbsp; MY wanip is a static (semi - sometime it changes poweroutages etc).&lt;/P&gt;&lt;P&gt;Do you mean its a dynamic WANIP??&amp;nbsp; Every day the ISP changes it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have two objects entered without any defining data??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network aa&amp;nbsp;&amp;nbsp; ???&lt;/P&gt;&lt;P&gt;object network Server_LinuxSSH&amp;nbsp;&amp;nbsp; ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no clue what your trying to do with all these ACL rules.... Its way overboard&lt;/P&gt;&lt;P&gt;access-list rede_inside extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any eq ssh &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object rede_inside any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip object rede_inside any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your dynamic pat rule is missing the object it should be associated with (not defined in your objects section).&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the embedded NAT object rule for ssh seems reasonable, although I would use the port number in the rule and if it equates to a known text item the router will change it automatically ( I confirmed this I made a service object stuck in port 22 and it changed it in the run config to appear as 'ssh'.&amp;nbsp;&amp;nbsp;&amp;nbsp; I am not sure about ANY in the nat rule but your using a different WANIP format than I am used (DHCP Setroute).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont know the purpose of this rule,&amp;nbsp; I dont use it.&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your totally missing a route rule.&amp;nbsp; The packets from your lan and dmz have no idea how to get to their next destination.&lt;/P&gt;&lt;P&gt;YOU need to associate a routing with the IP gateway of your ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sample config follows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname FW-Zion&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.1.0 rede_inside&lt;/P&gt;&lt;P&gt;name 192.168.1.2 wan_tc_zion&lt;/P&gt;&lt;P&gt;name 192.168.1.124 vm_secur&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description outside&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; description lan_server_ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description inside&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description outside&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name toka.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj_any_inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(part of dynamic pat rule which will assign pat to any outgoing traffic so return traffic is routed correctly to originator within the inside lan) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Server_LinuxSSH&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.124&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(comments: host object of PcIP for ACL rules)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Object Service SSH_Service&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp destination eq ssh&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(comments: service defined for ACL rules, note when making the object I entered in 22 for port number)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network web-ssh4Nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.124&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(comments:&amp;nbsp; Nat rule object created)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group icmp-type portas_ping_tracert&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_access_in remark allow external access to ssh server&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit object SSH_Service&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;any&lt;/SPAN&gt; object Server_LinuxSSH &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;( If I didnt use my defined Service object in making the ACL rule and simply put in the port information the rule would be......&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object VS-pcIP eq ssh&lt;/STRONG&gt; )&amp;nbsp; Note if you define a group of users, in ranges, in subnets or individually you can create a group object for users and replace 'any'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj_any_inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(First NAT rule in order, followed by static nat rules)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network web-ssh4Nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp ssh ssh&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;(acl rules above associated with and made under the outside (incoming rules) section&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 xx.xxx.xxx.xx 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(Comments where xx.xxx.xxx.xx is the IP gateway of the ISP)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 01:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881807#M457498</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-04T01:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881808#M457499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brother,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I clean again my configuration following your information and solve my problem finally i managed to&amp;nbsp; publish my server linux SSH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your attention and patience&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I can help you in something please let me know!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 05:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881808#M457499</guid>
      <dc:creator>CSCO10962914</dc:creator>
      <dc:date>2012-04-04T05:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: Help Public Server ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881809#M457500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Awesome, glad to have been of service.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 16:05:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-public-server-asa-8-4/m-p/1881809#M457500</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-04-04T16:05:29Z</dc:date>
    </item>
  </channel>
</rss>

