<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: allow external traffic to access internal computers in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881550#M457851</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, the global command is not recognized any longer in version 8.4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Mar 2012 21:20:55 GMT</pubDate>
    <dc:creator>par13</dc:creator>
    <dc:date>2012-03-22T21:20:55Z</dc:date>
    <item>
      <title>allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881542#M457831</link>
      <description>&lt;P&gt;We have an ASA 5505 running version 8.4. We are having problems allowing external traffic to access computers behind the firewall. Our current config is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.2.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 152.18.75.132 255.255.255.240&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa843-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;object network a-152.18.75.133&lt;BR /&gt;host 152.18.75.133&lt;BR /&gt;object network a-10.2.1.2&lt;BR /&gt;host 10.2.1.2&lt;BR /&gt;object-group network ext-servers&lt;BR /&gt;network-object host 142.21.53.249&lt;BR /&gt;network-object host 142.21.53.251&lt;BR /&gt;network-object host 142.21.53.195&lt;BR /&gt;object-group network ecomm_servers&lt;BR /&gt;network-object 142.21.53.236 255.255.255.255&lt;BR /&gt;object-group network internal_subnet&lt;BR /&gt;network-object 10.2.1.0 255.255.255.0&lt;BR /&gt;access-list extended extended permit ip any any&lt;BR /&gt;access-list extended extended permit icmp any any&lt;BR /&gt;access-list extended extended permit ip any object-group ext-servers&lt;BR /&gt;access-list acl_out extended permit tcp any object-group ecomm_servers eq https&lt;BR /&gt;access-list outside_in extended permit ip any host 10.2.1.2&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any echo-reply inside&lt;BR /&gt;icmp permit 10.2.1.0 255.255.255.0 inside&lt;BR /&gt;icmp permit any echo-reply outside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-523.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static a-10.2.1.2 a-152.18.75.133&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 152.18.75.129 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.2.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.2.1.2 255.255.255.255 inside&lt;BR /&gt;ssh 122.31.53.0 255.255.255.0 outside&lt;BR /&gt;ssh 122.28.75.128 255.255.255.240 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.2.1.2-10.2.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:c7d7009a051cb0647b402f4acb9a3915&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa(config)# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static a-10.2.1.2 a-152.18.75.133&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 112&lt;BR /&gt;ciscoasa(config)# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static a-10.2.1.2 a-152.18.75.133&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1, untranslate_hits = 113&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:45:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881542#M457831</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2019-03-11T22:45:56Z</dc:date>
    </item>
    <item>
      <title>allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881543#M457835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;can you please explain what host you whant to reach? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from my point try &lt;/P&gt;&lt;P&gt;static (Inside,Outside) 10.2.1.2 152.18.75.133 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 19:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881543#M457835</guid>
      <dc:creator>patrick.preuss</dc:creator>
      <dc:date>2012-03-22T19:13:57Z</dc:date>
    </item>
    <item>
      <title>allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881544#M457838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; This command static (inside, outside) works on previous firewall version. But, in version 8.4 it does not work. In the previous version 7.2, I could use the command that you are suggesting. I am not sure what change on 8.4 that any of this commands works any longer. Bottom line, I need to allow external traffic to access a computer behind the firewall using any port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 19:18:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881544#M457838</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2012-03-22T19:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881545#M457843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Par&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i see. Ok do the router know where to place the packets for you inside host ?&lt;/P&gt;&lt;P&gt;if i am right you must have something like an alias on the outside, so you route can finde the 133.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Patrick Marc Preuss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 19:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881545#M457843</guid>
      <dc:creator>patrick.preuss</dc:creator>
      <dc:date>2012-03-22T19:22:24Z</dc:date>
    </item>
    <item>
      <title>allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881546#M457847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; yes, my inside computers are able to access the internet,etc. But, external traffic cannot access the computers beging the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 19:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881546#M457847</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2012-03-22T19:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881547#M457848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes inside to out is not the problem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;knows the outside router where to place packets for 133 ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 19:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881547#M457848</guid>
      <dc:creator>patrick.preuss</dc:creator>
      <dc:date>2012-03-22T19:26:52Z</dc:date>
    </item>
    <item>
      <title>allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881548#M457849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have two issues, and you can help to decide here. First, the firewall outside interface ip is 132 which knows how to get to the gateway. Second, in the previous version 7.3, a technician asked me to create a static address 133 which could be used for outside traffic coming thru the firewall and behind the firewall. If you take a look at the configuration info provided on my first discussion submission, it shows the static address. However, the firewall does not seem to recognise this static address. I cannot ping the 133 only the 132. So, perhaps, my hold issue is that until the 133 is recognized by the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 19:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881548#M457849</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2012-03-22T19:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881549#M457850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi par &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;think you need somthing like global (outside) 152.18.75.133&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 21:07:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881549#M457850</guid>
      <dc:creator>patrick.preuss</dc:creator>
      <dc:date>2012-03-22T21:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881550#M457851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, the global command is not recognized any longer in version 8.4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2012 21:20:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881550#M457851</guid>
      <dc:creator>par13</dc:creator>
      <dc:date>2012-03-22T21:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881551#M457852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Okay I will bite.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming you have&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a.&amp;nbsp; &lt;STRONG&gt;dynamic pat rule &lt;/STRONG&gt;for lan users-devices to reach the internet&lt;/P&gt;&lt;P&gt;(missing ???????????????&lt;/P&gt;&lt;P&gt;(should look like a nat rule that makes two entries when you make the one rule)&lt;BR /&gt;(with router set at defaults it may make this rule for you already in place)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-object bit&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;PRE&gt;object network obj_any_inside&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;/PRE&gt;&lt;P&gt;and rule bit&lt;/P&gt;&lt;PRE&gt;object network obj_any_inside&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b.&amp;nbsp; &lt;STRONG&gt;route rule &lt;/STRONG&gt;- tells asa next hop is IP gateway address &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 152.18.75.129 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;c.&amp;nbsp; Nat rule for port forwarding- Using objects it creates two entries (lets say i call it natforward4server)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object bit&lt;/P&gt;&lt;PRE&gt;object network natforward4server&lt;BR /&gt; host 10.2.1.2&lt;BR /&gt;&lt;BR /&gt; Nat bit&lt;/PRE&gt;&lt;PRE&gt;&lt;PRE&gt;object network natforward4server&lt;BR /&gt; nat (inside,outside) static interface service tcp 443 443&lt;BR /&gt;&lt;BR /&gt; &lt;BR /&gt; d. Nat for translated ort. &lt;BR /&gt;If you had wanted to translate a port, lets say you have external users that can only use port 80 but need to access https &lt;BR /&gt; &lt;BR /&gt;&lt;P&gt;object bit&lt;/P&gt;&lt;PRE&gt;object network natfortransl4server&lt;BR /&gt; host 10.2.1.2&lt;BR /&gt;&lt;BR /&gt; Nat bit&lt;/PRE&gt;
&lt;PRE&gt;&lt;PRE&gt;object network natfortransl4server&lt;BR /&gt; nat (inside,outside) static interface service tcp 443 80&lt;/PRE&gt;
&lt;/PRE&gt;
 &lt;/PRE&gt;
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 18:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881551#M457852</guid>
      <dc:creator>llamaw0rksE</dc:creator>
      <dc:date>2012-03-23T18:04:19Z</dc:date>
    </item>
    <item>
      <title>allow external traffic to access internal computers</title>
      <link>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881552#M457853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configuration looks correct. Is that the full config however? I don't see the ACL bound to your interface. Can you make sure this is in?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-group outside_in in interface outside&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2012 22:11:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-external-traffic-to-access-internal-computers/m-p/1881552#M457853</guid>
      <dc:creator>jack.leung</dc:creator>
      <dc:date>2012-03-23T22:11:59Z</dc:date>
    </item>
  </channel>
</rss>

