<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port Range Forwarding on post 8.3 ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658075#M561322</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you kindly. Makes things more clear why it isn't working at the moment. I've been looking for this specific problem with the 9.0 version but obviously on the wrong places.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For me it works atm with seperate NAT rules, I can live with it till it's fixed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Dec 2012 21:10:18 GMT</pubDate>
    <dc:creator>genivos1976</dc:creator>
    <dc:date>2012-12-17T21:10:18Z</dc:date>
    <item>
      <title>Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658067#M561310</link>
      <description>&lt;P&gt;I have an ASA 5505 on a job. It is a smaller business that would have done better with an RV082, but they have what they have. It is running firmware 8.4. The client needed ports forwarded for their FTP server. The port range in this config is tcp 43333-43339. The FTP server ip is 192.168.1.2. The topology is:&lt;/P&gt;&lt;P&gt;Modem &amp;gt;&amp;gt; ASA &amp;gt;&amp;gt; Switch (unmanaged) &amp;gt;&amp;gt; FTP_Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need a more concise way of port forwarding a range if that exists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---- Redacted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-nat_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-FTP43333&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-FTP43334&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-FTP43335&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-FTP43336&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-FTP43337&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-FTP43338&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-FTP43339&lt;/P&gt;&lt;P&gt; host 192.168.1.2&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.0_24&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service PassiveFTP tcp&lt;/P&gt;&lt;P&gt; port-object range 43333 43339&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.2 object-group PassiveFTP&lt;/P&gt;&lt;P&gt;---- Redacted&lt;/P&gt;&lt;P&gt;object network obj-nat_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj-FTP43333&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43333 43333&lt;/P&gt;&lt;P&gt;object network obj-FTP43334&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43334 43334&lt;/P&gt;&lt;P&gt;object network obj-FTP43335&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43335 43335&lt;/P&gt;&lt;P&gt;object network obj-FTP43336&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43336 43336&lt;/P&gt;&lt;P&gt;object network obj-FTP43337&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43337 43337&lt;/P&gt;&lt;P&gt;object network obj-FTP43338&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43338 43338&lt;/P&gt;&lt;P&gt;object network obj-FTP43339&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 43339 43339&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.0_24&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;DIV&gt;---- Redacted&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;The only other thing to point out is this the changed syntax, so alot of help out there is more or less useless on this topic.&lt;/DIV&gt;&lt;DIV&gt;I had to throw this together and it is working, but a headache to work with.&lt;/DIV&gt;&lt;DIV&gt;Let me know if more detail or clarification is needed. Thanks!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Background: I have my CCNA as a networking base, then went the way of server administration.&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658067#M561310</guid>
      <dc:creator>sam</dc:creator>
      <dc:date>2019-03-11T20:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658068#M561315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of creating multiple objects for your FTP server, you would just need one object group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-FTP&lt;/P&gt;&lt;P&gt;host 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service PassiveFTP tcp&lt;/P&gt;&lt;P&gt;service tcp destination range 43333 43339&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface obj-FTP services PassiveFTP tcp PassiveFTP tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.2 range 43333 43339&lt;/P&gt;&lt;P&gt;access-list outside_access_in in interface outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this should work for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Jun 2011 19:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658068#M561315</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-06-02T19:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658069#M561316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Removing the prior config I had, and using the following did not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-FTP&lt;/P&gt;&lt;P&gt;host 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service PassiveFTP&lt;/P&gt;&lt;P&gt;service tcp destination range 43333 43339&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface obj-FTP services PassiveFTP tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.2 range 43333 43339&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When typing in the nat command I revieved a syntax error on the bold errors on the following commands:&lt;/P&gt;&lt;P&gt;object service PassiveFTP &lt;STRONG&gt;tcp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface obj-FTP services PassiveFTP tcp &lt;STRONG&gt;PassiveFTP tcp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-&lt;STRONG&gt;list&lt;/STRONG&gt; outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed them to the following:&lt;/P&gt;&lt;P&gt;object service PassiveFTP&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface obj-FTP services PassiveFTP tcp&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However this did not allow me to connect to the FTP. Restoring my startup-config brought everything back online.&lt;/P&gt;&lt;P&gt;One thing I would like to note is shouldn't the nat command actually be:&lt;/P&gt;&lt;P&gt;nat (&lt;STRONG&gt;inside,outside&lt;/STRONG&gt;) source static any any destination static interface obj-FTP services PassiveFTP tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trying this did not work either. But I believe it is correct as (inside,outside), am I wrong?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Jun 2011 20:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658069#M561316</guid>
      <dc:creator>sam</dc:creator>
      <dc:date>2011-06-02T20:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658070#M561317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The complete and correct commands to be entered is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-FTP&lt;/P&gt;&lt;P&gt;host 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service Passive_FTP&lt;/P&gt;&lt;P&gt;service tcp destination range 43333 43339&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface obj-FTP services &lt;STRONG&gt;Passive_FTP&lt;/STRONG&gt; &lt;STRONG&gt;Passive_FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any host 192.168.1.2 range 43333 43339&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;and the above nat command is same or equal to:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static obj-FTP interface services &lt;/STRONG&gt;&lt;STRONG&gt;Passive_FTP &lt;/STRONG&gt;&lt;STRONG&gt;Passive_FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 8.3 natting is flow based, so both commands hold true.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both the nat statements are same, if you are still getting any syntax error kindly copy paste the command that you are typing along with the error message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jun 2011 06:08:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658070#M561317</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-06-03T06:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658071#M561318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No thats it. That worked great. I saw the error in the commands as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to adapt it with the desired results in a few areas, so I believe I understand the commands now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guess I should have looked into 8.3 nat commands a little more than focus on IPv6, like any business will ever switch to that!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jun 2011 15:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658071#M561318</guid>
      <dc:creator>sam</dc:creator>
      <dc:date>2011-06-03T15:22:01Z</dc:date>
    </item>
    <item>
      <title>Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658072#M561319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to setup port fording for my ASA 5505 running ASDM 8.4 for our Asterisk Server. I tried to follow your configurations and it looks like the settings dosen't works well for me. I entered following commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-RTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;host 10.10.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service Passive_RTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service udp destination range 10000 20000&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,inside) source static any any destination static interface obj-RTP service Passive_RTP Passive_RTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt;"&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static obj-RTP interface service Passive_RTP Passive_RTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had to change services to service for the command to work, with services I was getting following error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static interface obj-FTP &lt;/P&gt;&lt;P&gt;services Passive_RTP Passive_RTP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;nat (outside,inside) source static any any destination static interface obj-FTP &lt;BR /&gt;services Passive_RTP Passive_RTP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My expertise with CLI is minimal to nothing, can you help me on how to configure it using ASDM. Creating NAT obj using ASDM works great as I am able to create entries for SIP and HTTP. But creating individual entries for 10000 ports is not practical.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Savi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Dec 2011 22:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658072#M561319</guid>
      <dc:creator>savi.thomas</dc:creator>
      <dc:date>2011-12-25T22:10:26Z</dc:date>
    </item>
    <item>
      <title>Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658073#M561320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been struggling with the same issue here. I'm running the 9.0.x version on my ASA5505. The given solutions don't work. I've tried the following to setup secure FTP (tried non-secure FTP as well, with the same negative result):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-FTP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;host 192.168.1.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object service PassiveFTP tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;service tcp destination range 43333 43339&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (outside,inside) source static any any destination static interface obj-FTP service PassiveFTP tcp PassiveFTP tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_access_in extended permit tcp any host 192.168.1.2 range 43333 43339&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_access_in in interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried sereval options in one NAT rule with a port range without success. The only thing how I could get this to work is to make separate NAT rules for each passive port. Since I need only 10 passive ports to be opened, it is not really a problem but .. it doesn't seem like a desirable solution. Imagine when you have to open 500 ports. I'm curious what is the cause that it won't work with a port range and if someone ever found a proper solution for this (to compare, on a LinkSys E4200 I got this to work without any problem, specified a port range for passive FTP and it worked like a charm, I know this is a completely different device but .. hard to believe it won't work on an ASA).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 07:35:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658073#M561320</guid>
      <dc:creator>genivos1976</dc:creator>
      <dc:date>2012-12-17T07:35:39Z</dc:date>
    </item>
    <item>
      <title>Re: Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658074#M561321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remco, this is due to a new bug we've found with the 9.0 and 9.1 versions of software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCud70110" rel="nofollow" target="_blank"&gt;CSCud70110&lt;/A&gt; Manual NAT rule with service port range not matched correctly &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workarounds are:&lt;/P&gt;&lt;P&gt;1) Create an individual port map NAT statement for each port in the range (you've already discovered this)&lt;/P&gt;&lt;P&gt;-or-&lt;/P&gt;&lt;P&gt;2) Downgrade to version 8.4 until we have the bug fixed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the full details of the bug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;DIV id="Release-notenote2" style="color: #000000; font-family: Times; font-size: medium;"&gt;&lt;DIV id="Release-note"&gt;&lt;PRE style="font-size: 12px; white-space: pre-wrap; word-wrap: break-word;"&gt;&lt;B&gt;Symptom&lt;/B&gt; 
Traffic that should match a configured manual NAT rule that uses a range of service ports will fail to match correctly. This results in connections not completing.

&lt;B&gt;Conditions&lt;/B&gt;
This problem is seen if a manual NAT configuration includes a service object with a range of ports. Below is an example:

!
object network test_local
 host 192.168.1.4
object network test_global
 host 10.0.0.5
object service test_service_range
 service tcp source range 5000 5005 
!
nat (inside,outside) source static test_local test_global service test_service_single test_service_single
!

Traffic arriving on the outside interface destined to the IP 10.0.0.5 and with destination TCP ports between 5000 and 5005 will not match this translation.

&lt;B&gt;Workaround&lt;/B&gt;
Downgrade to version 8.4

-or-

Change the NAT rule so that it uses a single port, instead of a range of ports. This might require adding multiple service objects, as well as more NAT rules.

Example:
!
object network test_local
 host 192.168.1.4
object network test_global
 host 10.0.0.5
object service test_service_5000
 service tcp source range 5000 
object service test_service_5001
 service tcp source range 5001
object service test_service_5002
 service tcp source range 5002 
object service test_service_5003
 service tcp source range 5003 
object service test_service_5004
 service tcp source range 5004 
object service test_service_5005
 service tcp source range 5005 
!
nat (inside,outside) source static test_local test_global service test_service_5000 test_service_5000
nat (inside,outside) source static test_local test_global service test_service_5001 test_service_5001
nat (inside,outside) source static test_local test_global service test_service_5002 test_service_5002
nat (inside,outside) source static test_local test_global service test_service_5003 test_service_5003
nat (inside,outside) source static test_local test_global service test_service_5004 test_service_5004
nat (inside,outside) source static test_local test_global service test_service_5005 test_service_5005
!&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The bug is being worked on now. Once we get it fixed, the range of ports in the NAT configuration should work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 15:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658074#M561321</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2012-12-17T15:03:43Z</dc:date>
    </item>
    <item>
      <title>Port Range Forwarding on post 8.3 ASA</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658075#M561322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you kindly. Makes things more clear why it isn't working at the moment. I've been looking for this specific problem with the 9.0 version but obviously on the wrong places.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For me it works atm with seperate NAT rules, I can live with it till it's fixed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 21:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658075#M561322</guid>
      <dc:creator>genivos1976</dc:creator>
      <dc:date>2012-12-17T21:10:18Z</dc:date>
    </item>
    <item>
      <title>Hi folks</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658076#M561323</link>
      <description>&lt;P&gt;Hi folks&lt;/P&gt;
&lt;P&gt;I simply just cannot get this to work and I need some help to figure out what I am missing:&lt;BR /&gt;ASA 5505 -&amp;nbsp;v9.2(2)8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My config:&lt;/P&gt;

&lt;PRE&gt;
object network PC
 host 10.45.132.2

object service NAT-Range_TCP
 service tcp destination range 25600 25616

nat (outside,inside) source static any any destination static interface PC service NAT-Range_TCP NAT-Range_TCP

access-list outside-in extended permit tcp any host 10.45.132.2 range 25600 25616&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet-tracer output:&lt;/P&gt;

&lt;PRE&gt;
ASA5505#&lt;STRONG&gt;packet-tracer input outside tcp 212.242.48.3 1088 10.45.132.2 25600&lt;/STRONG&gt;

Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in   10.45.132.0     255.255.255.240 via 10.45.128.2, inside

Phase: 2
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         via 212.x.x.1, outside

Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group outside-in in interface outside
access-list outside-in extended permit tcp any host 10.45.132.2 range 25600 25616
Additional Information:

Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 6
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:

Phase: 7
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
nat (outside,inside) source static any any destination static interface PC service NAT-Range_TCP NAT-Range_TCP
Additional Information:

Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2014 23:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658076#M561323</guid>
      <dc:creator>jesper_petersen</dc:creator>
      <dc:date>2014-11-14T23:20:57Z</dc:date>
    </item>
    <item>
      <title>Jason,</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658077#M561324</link>
      <description>&lt;P&gt;Jason,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you ever get this going? I have the same code version and I want to make sure this is working on 9.2.(2)8. Below is my configs, all objects have been created on the firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group service &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.5.5_PORTS&lt;/P&gt;
&lt;P&gt;service-object tcp destination range 42990 42999&lt;/P&gt;
&lt;P&gt;service-object tcp destination range 43000 43518&lt;/P&gt;
&lt;P&gt;service-object tcp destination range 43519 43520&lt;/P&gt;
&lt;P&gt;service-object tcp destination eq 40022&lt;/P&gt;
&lt;TABLE cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;service-object tcp destination range 940 990&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination eq 14970&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 20000 20050&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;TABLE cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;object-group service &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.3.3_PORTS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 47824 47830&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 47831 47837&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 5887 5893&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 47809 47815&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 47817 47823&lt;/P&gt;
&lt;P&gt;&amp;nbsp;service-object tcp destination range 47840 47850&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (outside,Prod-SAAS) &lt;SPAN&gt;source static any any destination static &lt;/SPAN&gt;obj-64.4.6.6 obj-172.20.5.5 service &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.5.5_PORTS &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.5.5_PORTS&lt;/P&gt;
&lt;P&gt;nat (outside,Prod-SAAS) &lt;SPAN&gt;source static any any destination static &lt;/SPAN&gt;obj-64.4.6.6 obj-172.20.3.3 service &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.3.3_PORTS &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.3.3_PORTS&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list acl-out extended permit tcp any object &lt;SPAN&gt;obj-172.20.5.5 object-group &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.5.5_PORTS&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;access-list acl-out extended permit tcp any object &lt;SPAN&gt;obj-172.20.3.53 object-group &lt;A href="https://ubersmith.internap.com//service.php?packid=172"&gt;&lt;SPAN&gt;172&lt;/SPAN&gt;&lt;/A&gt;.20.3.3_PORTS&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 20:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658077#M561324</guid>
      <dc:creator>truenetworkengineer</dc:creator>
      <dc:date>2016-04-06T20:53:52Z</dc:date>
    </item>
    <item>
      <title>I finally manage to get port</title>
      <link>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658078#M561325</link>
      <description>&lt;P&gt;I finally manage to get port range to work with ASA 5505. It took me 7 hours but mainly because of a known bug in ASA 9.0 and 9.1 that will block port range to work properly! After I upgraded to 9.2(4) it started to work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I used ASDM but here are the ASA commands:&lt;/STRONG&gt;&lt;BR /&gt;object network FTP-Passive&lt;BR /&gt;host 192.168.1.50&lt;BR /&gt;object service Passive_FTP&lt;BR /&gt;service tcp destination range 32900 33000&lt;BR /&gt;nat (outside,inside) source static any any destination static interface FTP-Passive service Passive_FTP Passive_FTP&lt;BR /&gt;access-list inbound extended permit tcp any host 192.168.1.50 range 31900 32000&lt;BR /&gt;access-group inbound in interface outside&lt;/P&gt;</description>
      <pubDate>Thu, 23 Feb 2017 13:52:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-range-forwarding-on-post-8-3-asa/m-p/1658078#M561325</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2017-02-23T13:52:06Z</dc:date>
    </item>
  </channel>
</rss>

