<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow (outside) host to (inside) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660082#M561944</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5505 Sec Plus. I would like to allow outside hosts to our mail server and also our FTP server. So i would like to allow only SMTP, HTTP (for Outlook Web Access) and FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great if you guys can point me in the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 20:36:32 GMT</pubDate>
    <dc:creator>terrencepayet</dc:creator>
    <dc:date>2019-03-11T20:36:32Z</dc:date>
    <item>
      <title>Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660082#M561944</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5505 Sec Plus. I would like to allow outside hosts to our mail server and also our FTP server. So i would like to allow only SMTP, HTTP (for Outlook Web Access) and FTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great if you guys can point me in the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660082#M561944</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2019-03-11T20:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660083#M561945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need the folowing chceklists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. A NAT command, which would publish the servers to the outtside worls and for that you would need a public ip translation on the firewall.&lt;/P&gt;&lt;P&gt;2. You would need to create an access-list to allow outside users to access the servers on port ftp(21),smtp(25) and http (443).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me explain you with an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assume I have a mail server on the inside:&lt;/P&gt;&lt;P&gt;private ip - 192.168.1.2&lt;/P&gt;&lt;P&gt;public ip - 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now I would need the following static command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.2&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.1 eq 25&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is all yo'll need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.-do rate helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 09:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660083#M561945</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-21T09:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660084#M561946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing is... I have only one public IP and it is on my outside interface.&lt;/P&gt;&lt;P&gt;Will i be able to NAT with same public IP to inside??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 09:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660084#M561946</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-21T09:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660085#M561947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terence,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the solution,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say the outside IP is 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would need an access-list to allow the traffic for port 25,21,443&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.1 eq 21&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.1 eq 25&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.1 eq 443&lt;/P&gt;&lt;P&gt;access-group outside_access_inin interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 25 &lt;PRIVATE ip="" of="" server=""&gt; 25&lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 21 &lt;PRIVATE ip="" of="" server=""&gt; 21&lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 443 &lt;PRIVATE ip="" of="" server=""&gt; 443&lt;/PRIVATE&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This is called static port forwarding. If you just have one publkic ip but multiple servers, you can use just the single port on that public ip ,instead of the whole ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this is what you were loking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thnaks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 10:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660085#M561947</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-21T10:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660086#M561950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your helpful post.&lt;/P&gt;&lt;P&gt;But i still cant access the services from outside. I've attached my config below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 11:01:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660086#M561950</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-21T11:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660087#M561951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terence,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this access-list include the server's public ip as well???&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 1XX.XXX.XXX.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also please send me an output of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.1.1.1 80 &lt;PUBLIC ip="" of="" server=""&gt; 80 detailed&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would help a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 11:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660087#M561951</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-21T11:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660088#M561952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;The below IP in the access list is the public IP on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find attached output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 11:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660088#M561952</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-21T11:18:51Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660089#M561953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well if that is the case, could you tell me the purpose of that nat statement. Because you already do have a static statement. If it is something extra, please remove it because its going to conflict with the static that you have added for the servers. NAT exempt always takes precedence over the static statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover the packet tracer output doesn't contain anything. Could you just send the same output that you had in the previous zip file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 11:44:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660089#M561953</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-21T11:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660090#M561954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a million.&lt;/P&gt;&lt;P&gt;I"ve search the whole config over and over, and didn't found anything. There was guy before who were playing with the config.&lt;/P&gt;&lt;P&gt;The problem was with Exempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again Thank you very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 11:55:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660090#M561954</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-21T11:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660091#M561955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Terrence,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to know it worked for you, let me know if you have any further concerns. Also the statement in your config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list inside_nat_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;doesn't make sense, since you don;t have any access-list inside_nat_outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 May 2011 12:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660091#M561955</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-21T12:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: Allow (outside) host to (inside)</title>
      <link>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660092#M561956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i have another scenario whereby i want to allow users coming from the DMZ interface(10.132.33.0/24, 10132.23.0/24, 10.132.66.0/24) access to our internal sql server(192.168.1.7) on the inside interface 192.168.1.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can this be done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Terence&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 May 2011 19:19:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-outside-host-to-inside/m-p/1660092#M561956</guid>
      <dc:creator>terrencepayet</dc:creator>
      <dc:date>2011-05-26T19:19:51Z</dc:date>
    </item>
  </channel>
</rss>

