<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic creating ACL and nat rules on ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893371#M457768</link>
    <description>&lt;P&gt;Ive migrated from my lab pix to a lab asa and am trying to open certain ports to my internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in my confg on my pix i had acls to open port 51413 to an inside host along with the static nat rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i am trying to accomplish is same on my asa, however the nat rules seem to be slightly different, and i'm not completely sure how to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ACL and nat rule is below.&amp;nbsp; I'm pretty certain my acl is correct,but i am not sure as to what to do with my NAT rules to allow a translation for the tcp service.&amp;nbsp; any help would be apprecaited.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list outside-in extended permit object tcp51413 any object outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;nat (inside,outside) source dynamic all-inside-nat interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:46:34 GMT</pubDate>
    <dc:creator>schlafket</dc:creator>
    <dc:date>2019-03-11T22:46:34Z</dc:date>
    <item>
      <title>creating ACL and nat rules on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893371#M457768</link>
      <description>&lt;P&gt;Ive migrated from my lab pix to a lab asa and am trying to open certain ports to my internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in my confg on my pix i had acls to open port 51413 to an inside host along with the static nat rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i am trying to accomplish is same on my asa, however the nat rules seem to be slightly different, and i'm not completely sure how to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ACL and nat rule is below.&amp;nbsp; I'm pretty certain my acl is correct,but i am not sure as to what to do with my NAT rules to allow a translation for the tcp service.&amp;nbsp; any help would be apprecaited.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list outside-in extended permit object tcp51413 any object outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;nat (inside,outside) source dynamic all-inside-nat interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:46:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893371#M457768</guid>
      <dc:creator>schlafket</dc:creator>
      <dc:date>2019-03-11T22:46:34Z</dc:date>
    </item>
    <item>
      <title>Re: creating ACL and nat rules on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893372#M457771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming single WANIP&amp;nbsp; 24.333.23.77 (outside interface)&lt;/P&gt;&lt;P&gt;ISP gateway IP 24.333.23.48&lt;/P&gt;&lt;P&gt;LAN 192.168.1.1 (inside interface)&lt;/P&gt;&lt;P&gt;single server RDP 3389 for example&lt;/P&gt;&lt;P&gt;server host PC&amp;nbsp; 192.168.1.44&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a.NEED two ACL rules&lt;/P&gt;&lt;P&gt;NEED one static nat rule (port forwarding)&lt;/P&gt;&lt;P&gt;NEED one dynamic nat rule&amp;nbsp; (allows users behind router to get to the net, ie inbound to outbound)&lt;/P&gt;&lt;P&gt;NEED one routing rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;notes for Adsm gui:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1) Ensure use ACCESS RULES in gui for the ACL rules in order to associate its for the OUTSIDE interface.&amp;nbsp; This is done by ensuring you put your rule under the OUTSIDE submenu selection in the popup.&amp;nbsp; By doing so it creates two rules one would manually insert for CLI.&amp;nbsp; Runtime config looks the same for both. ACL manager is only for post editing and review (not initial config).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2) For NAT rules use network-objects and the nat menu selection at the bottom of the popup.&amp;nbsp; The NAT Rules main menu selection is more for post editing and review (NOT initial config).&amp;nbsp;&amp;nbsp; Be advised in the gui, when you make the NAT rule it creates an object rule as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will note in my NAT rules for portforwarding you do specify the LANIP of the server but avoid using the same name for this embedded nat rule as you do for the server itself.&amp;nbsp; (two reasons, you may have more than one server on that pc and second you need the serverpc by itself as an object for acl rules).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="text-decoration: underline;"&gt;Excerpts from runconfig to get an idea of placement.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(dynamic pat rule to allow outbound initiated connections from the LAN, applies SNAT.&amp;nbsp; Default setup of asa 5505 includes this automagically)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object network obj_any_inside&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(allowed external users object rules)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object network TrustedInternetUsers&lt;/P&gt;&lt;P&gt;subnet 24.333.23.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Corporate-user&lt;/P&gt;&lt;P&gt;host 171.26.424.24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network AuthUsers-Group&lt;/P&gt;&lt;P&gt;network-object object TrustedInternetUsers&lt;/P&gt;&lt;P&gt;network-object object Corporate-user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(network object rule identify the server PC - aka the host)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object network server-pcIP&lt;/P&gt;&lt;P&gt;host 192.168.1.44&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(service object rule for RDP)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object service RDP&lt;/P&gt;&lt;P&gt;service tcp destination eq 3389&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(1st output of NAT rule creates an object)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object network NAT4RDP&lt;/P&gt;&lt;P&gt;host 192.168.1.44&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(acl rule first output is for access to the server allowing the group of permitted users for that service.&amp;nbsp; ACL rules come before NAT rules in sequence)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit object RDP object-group AuthUsers-Group object server-pcIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(second output of NAT rule is the nat rule)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;object network NAT4RDP&lt;/P&gt;&lt;P&gt;nat (main-lan,outside) static interface service tcp 3389 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(The second ACL output is automatically created (access-group rule) and appears after NAT rules and before the next hop outbound route rule for any outgoing traffic from the inside interface)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 24.333.23.48 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Mar 2012 14:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893372#M457771</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-25T14:38:15Z</dc:date>
    </item>
    <item>
      <title>creating ACL and nat rules on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893373#M457772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Alex.&amp;nbsp; I feel like i have it set up right.&amp;nbsp; but for whatever reason my client on the inside still thinks the port is not open.&amp;nbsp; Here are my packet traces and config snips. Note i dont actually expect to connect to 8.8.8.8 on port 51413, its really just meant to serve as a real world outside address that I know exists.&amp;nbsp; In all reality i could be connecting to anything.&amp;nbsp; Yes i am trying to open up ports for torrents on my lab.&amp;nbsp; But really this would provide me a template for other things in the future.&amp;nbsp; feedback would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Config snipet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; description Inside User Subnets&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network vlan201 &lt;/P&gt;&lt;P&gt; subnet 10.10.201.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network vlan203 &lt;/P&gt;&lt;P&gt; subnet 10.10.203.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network all-inside-nat&lt;/P&gt;&lt;P&gt; network-object object vlan201&lt;/P&gt;&lt;P&gt; network-object object vlan203&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service torrent &lt;/P&gt;&lt;P&gt; service tcp source eq 51413 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit object torrent any object-group all-inside-nat &lt;/P&gt;&lt;P&gt;access-list outside-in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside-in extended deny ip any any log &lt;/P&gt;&lt;P&gt;access-list inside-in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static all-inside-nat all-inside-nat service torrent torrent&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic all-inside-nat interface&lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside-in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input inside tcp 10.10.201.4 51413 8.8.8.8 51413&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside-in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside-in extended permit ip any any &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;nat (inside,outside) source static all-inside-nat all-inside-nat service torrent torrent&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 10.10.201.4/51413 to 10.10.201.4/51413&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 969599, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 8.8.8.8 51413 10.10.201.4 51413&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static all-inside-nat all-inside-nat service torrent torrent&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 10.10.201.4/51413 to 10.10.201.4/51413&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit object torrent any object-group all-inside-nat &lt;/P&gt;&lt;P&gt;object-group network all-inside-nat&lt;/P&gt;&lt;P&gt; network-object object vlan201&lt;/P&gt;&lt;P&gt; network-object object vlan203&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;nat (inside,outside) source static all-inside-nat all-inside-nat service torrent torrent&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 969732, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Mar 2012 05:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893373#M457772</guid>
      <dc:creator>schlafket</dc:creator>
      <dc:date>2012-03-27T05:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: creating ACL and nat rules on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893374#M457773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me caveat that what I thought you were doing was allowing external users access servers behind the ASA.&lt;/P&gt;&lt;P&gt;I may be very wrong in this assumption and if so can disregard the rest of this post LOL. In fact the more I read its like you want users behind the ASA but on a separate lan to access a server on a different lan??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; (1) Not sure why you have this rule?&amp;nbsp; I dont have it and my setup works.&lt;BR /&gt;access-group inside-in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2) Not keen on your ACL rule structure.&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit object torrent &lt;STRONG&gt;&lt;EM&gt;any&lt;/EM&gt;&lt;/STRONG&gt; object-group all-inside-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would likely try to put in.&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit object torrent object-group all-inside-nat object &lt;STRONG style="text-decoration: underline; "&gt;server-pcIP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming definitions exist&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network server-pcIP&lt;/P&gt;&lt;P&gt;host 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service&amp;nbsp; torrent&lt;/P&gt;&lt;P&gt;service tcp destination eq 51413&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2012 03:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/creating-acl-and-nat-rules-on-asa5505/m-p/1893374#M457773</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-28T03:52:35Z</dc:date>
    </item>
  </channel>
</rss>

