<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port forwarding not working properly in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704138#M563152</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls remove the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="value"&gt;&lt;SPAN class="pBody postableBody"&gt;ip nat pool VNC 10.11.100.10 10.11.100.10 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mikey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 May 2011 21:56:05 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-05-05T21:56:05Z</dc:date>
    <item>
      <title>Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704133#M563147</link>
      <description>&lt;P&gt;&lt;SPAN class="value"&gt;&lt;SPAN class="pBody postableBody"&gt;All I want to do is&amp;nbsp; have VNC connect on port 5950. So I want to forward traffic coming in&amp;nbsp; on the external ip address on port 5950 an internal ip address on port&amp;nbsp; 5950. Here is my config:&lt;BR /&gt;&lt;BR /&gt;Building configuration...&lt;BR /&gt;&lt;BR /&gt;Current configuration : 21370 bytes&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;!&lt;BR /&gt;hostname ****_****&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot system flash:c181x-adventerprisek9-mz.124-24.T4.bin&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 3 log&lt;BR /&gt;security passwords min-length 6&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;logging buffered 51200&lt;BR /&gt;logging console critical&lt;BR /&gt;enable secret 5 $1$r7hB$KVZ6CCm1U.n5.i4K8UHNq0&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;aaa authentication login ciscocp_vpn_xauth_ml_1 local&lt;BR /&gt;aaa authentication login ciscocp_vpn_xauth_ml_2 local&lt;BR /&gt;aaa authorization exec default local &lt;BR /&gt;aaa authorization network ciscocp_vpn_group_ml_1 local &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone PCTime -7&lt;BR /&gt;clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-4112746227&lt;BR /&gt; enrollment selfsigned&lt;BR /&gt; subject-name cn=IOS-Self-Signed-Certificate-4112746227&lt;BR /&gt; revocation-check none&lt;BR /&gt; rsakeypair TP-self-signed-4112746227&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-4112746227&lt;BR /&gt; certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 30820256 308201BF A0030201 02020101 300D0609 2A864886 F70D0101 04050030 &lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 &lt;BR /&gt;&amp;nbsp; 69666963 6174652D 34313132 37343632 3237301E 170D3131 30353034 32313036 &lt;BR /&gt;&amp;nbsp; 30315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 &lt;BR /&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 31313237 &lt;BR /&gt;&amp;nbsp; 34363232 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 &lt;BR /&gt;&amp;nbsp; 8100E019 5ECA9061 1B264BA9 00CB9644 F55859F7 E8B62916 11FF750C C1F84F99 &lt;BR /&gt;&amp;nbsp; BB531024 D90BDF1A C4FE5841 7FC2F512 4B62F7B9 455C58D8 DFF4EE80 42EB09AE &lt;BR /&gt;&amp;nbsp; 50BF3B90 275BF68D 01D18313 CE3BC743 E0BA0AED F1DC5214 2F2DB892 B3877BCC &lt;BR /&gt;&amp;nbsp; 0668D120 499FE43A C54B0E79 39459CAD 8C5ADB85 29F24C6B 1C2C06E3 47DC26DC &lt;BR /&gt;&amp;nbsp; 42450203 010001A3 7E307C30 0F060355 1D130101 FF040530 030101FF 30290603 &lt;BR /&gt;&amp;nbsp; 551D1104 22302082 1E4C6574 68627269 6467655F 53434144 412E3138 342E3731 &lt;BR /&gt;&amp;nbsp; 2E323031 2E363230 1F060355 1D230418 30168014 9F4E468D B29BD696 57D5DDD7 &lt;BR /&gt;&amp;nbsp; 00A6F8DC 4D7E289D 301D0603 551D0E04 1604149F 4E468DB2 9BD69657 D5DDD700 &lt;BR /&gt;&amp;nbsp; A6F8DC4D 7E289D30 0D06092A 864886F7 0D010104 05000381 8100B6AC 3C24C20B &lt;BR /&gt;&amp;nbsp; D17F7078 751BF736 338B882F E24100D1 A1EECAF6 D71B850E B0174C2D 5A7CAEA5 &lt;BR /&gt;&amp;nbsp; BB093DB4 114B75EE A9A80275 BCA107B1 61E18ADC 7F34731D 4E250248 73CB171D &lt;BR /&gt;&amp;nbsp; EC6CA528 A3C87A0B 35904459 5606512D 471C6C9F 870EB1A5 B38375E6 A2767E93 &lt;BR /&gt;&amp;nbsp; 5737E137 B7B8EA26 4B2B0672 4D748C75 3114EBE3 7F2A04DD 2728&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;dot11 syslog&lt;BR /&gt;no ip source-route&lt;BR /&gt;!&lt;BR /&gt;ip traffic-export profile test mode capture&lt;BR /&gt;&amp;nbsp; length 512&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip dhcp use vrf connected&lt;BR /&gt;ip dhcp excluded-address 10.11.100.1 10.11.100.99&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool ccp-pool1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; import all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 10.11.100.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 10.11.100.1 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 64.59.135.133 64.59.135.135 &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip domain name ######&lt;BR /&gt;ip name-server 64.59.135.133&lt;BR /&gt;ip name-server 64.59.135.135&lt;BR /&gt;ip port-map user-protocol--1 port tcp 5950&lt;BR /&gt;ip inspect log drop-pkt&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;username administrator privilege 15 secret 5 $1$PCU8$WEWuYVom7E7CRWqrp5HtK0&lt;BR /&gt;username VPNuser privilege 7 secret 5 $1$p7F5$CKtOgolWRmP26ySTmhUlx0&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; encr 3des&lt;BR /&gt; authentication pre-share&lt;BR /&gt; group 2&lt;BR /&gt;crypto isakmp key Cisco1811VPN address 142.179.172.39&lt;BR /&gt;crypto isakmp key Cisco1811VPN address 96.53.31.50&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp client configuration group VPN_users&lt;BR /&gt; key Cisco1811VPN&lt;BR /&gt; pool ****_VPN&lt;BR /&gt;crypto isakmp profile ciscocp-ike-profile-1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; match identity group VPN_users&lt;BR /&gt;&amp;nbsp;&amp;nbsp; client authentication list ciscocp_vpn_xauth_ml_2&lt;BR /&gt;&amp;nbsp;&amp;nbsp; isakmp authorization list ciscocp_vpn_group_ml_1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; client configuration address respond&lt;BR /&gt;&amp;nbsp;&amp;nbsp; virtual-template 1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA1 esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA2 esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA3 esp-3des esp-sha-hmac &lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile CiscoCP_Profile1&lt;BR /&gt; set transform-set ESP-3DES-SHA2 &lt;BR /&gt; set isakmp-profile ciscocp-ike-profile-1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map SDM_CMAP_1 1 ipsec-isakmp &lt;BR /&gt; description Tunnel to142.179.172.39&lt;BR /&gt; set peer 142.179.172.39&lt;BR /&gt; set transform-set ESP-3DES-SHA &lt;BR /&gt; match address 102&lt;BR /&gt;!&lt;BR /&gt;crypto map SDM_CMAP_2 1 ipsec-isakmp &lt;BR /&gt; description Tunnel to96.53.31.50&lt;BR /&gt; set peer 96.53.31.50&lt;BR /&gt; set transform-set ESP-3DES-SHA1 &lt;BR /&gt; match address 106&lt;BR /&gt;!&lt;BR /&gt;crypto map SDM_CMAP_3 1 ipsec-isakmp &lt;BR /&gt; description Tunnel to96.53.31.50&lt;BR /&gt; set peer 96.53.31.50&lt;BR /&gt; set transform-set ESP-3DES-SHA3 &lt;BR /&gt; match address 111&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 2&lt;BR /&gt;no ip rcmd domain-lookup&lt;BR /&gt;ip rcmd rcp-enable&lt;BR /&gt;ip rcmd remote-host sdmRe1578d5c 10.11.100.92 Le1578d5c enable&lt;BR /&gt;ip rcmd remote-username sdmRe1578d5c&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-1&lt;BR /&gt; match access-group 104&lt;BR /&gt;class-map type inspect match-any SDM_BOOTPC&lt;BR /&gt; match access-group name SDM_BOOTPC&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-3&lt;BR /&gt; match access-group 109&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-2&lt;BR /&gt; match access-group 107&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-5&lt;BR /&gt; match access-group 112&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-4&lt;BR /&gt; match access-group 110&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-7&lt;BR /&gt; match access-group 115&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-1&lt;BR /&gt; match access-group name VNC_Port_Forwarding&lt;BR /&gt; match protocol user-protocol--1&lt;BR /&gt;class-map type inspect match-any SDM_DHCP_CLIENT_PT&lt;BR /&gt; match class-map SDM_BOOTPC&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-6&lt;BR /&gt; match access-group 113&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-9&lt;BR /&gt; match access-group 117&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-8&lt;BR /&gt; match access-group 118&lt;BR /&gt;class-map type inspect match-all SDM_GRE&lt;BR /&gt; match access-group name SDM_GRE&lt;BR /&gt;class-map type inspect match-any CCP_PPTP&lt;BR /&gt; match class-map SDM_GRE&lt;BR /&gt;class-map type inspect match-all CCP_SSLVPN&lt;BR /&gt; match access-group name SDM_IP&lt;BR /&gt;class-map type inspect match-any SDM_AH&lt;BR /&gt; match access-group name SDM_AH&lt;BR /&gt;class-map type inspect match-any ccp-skinny-inspect&lt;BR /&gt; match protocol skinny&lt;BR /&gt;class-map type inspect match-any SDM_WEBVPN&lt;BR /&gt; match access-group name SDM_WEBVPN&lt;BR /&gt;class-map type inspect match-all SDM_WEBVPN_TRAFFIC&lt;BR /&gt; match class-map SDM_WEBVPN&lt;BR /&gt; match access-group 101&lt;BR /&gt;class-map type inspect match-any sdm-cls-bootps&lt;BR /&gt; match protocol bootps&lt;BR /&gt;class-map type inspect match-any SDM_ESP&lt;BR /&gt; match access-group name SDM_ESP&lt;BR /&gt;class-map type inspect match-any SDM_VPN_TRAFFIC&lt;BR /&gt; match protocol isakmp&lt;BR /&gt; match protocol ipsec-msft&lt;BR /&gt; match class-map SDM_AH&lt;BR /&gt; match class-map SDM_ESP&lt;BR /&gt;class-map type inspect match-all SDM_VPN_PT&lt;BR /&gt; match access-group 103&lt;BR /&gt; match class-map SDM_VPN_TRAFFIC&lt;BR /&gt;class-map type inspect match-any ICMP&lt;BR /&gt; match protocol icmp&lt;BR /&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt; match protocol cuseeme&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp extended&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt; match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any SDM_IP&lt;BR /&gt; match access-group name SDM_IP&lt;BR /&gt;class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC&lt;BR /&gt; match protocol isakmp&lt;BR /&gt; match protocol ipsec-msft&lt;BR /&gt; match class-map SDM_AH&lt;BR /&gt; match class-map SDM_ESP&lt;BR /&gt;class-map type inspect match-all SDM_EASY_VPN_SERVER_PT&lt;BR /&gt; match class-map SDM_EASY_VPN_SERVER_TRAFFIC&lt;BR /&gt;class-map type inspect match-all SDM_VPN_PT2&lt;BR /&gt; match access-group 116&lt;BR /&gt; match class-map SDM_VPN_TRAFFIC&lt;BR /&gt;class-map type inspect match-all SDM_VPN_PT0&lt;BR /&gt; match access-group 108&lt;BR /&gt; match class-map SDM_VPN_TRAFFIC&lt;BR /&gt;class-map type inspect match-all SDM_VPN_PT1&lt;BR /&gt; match access-group 114&lt;BR /&gt; match class-map SDM_VPN_TRAFFIC&lt;BR /&gt;class-map type inspect match-any ccp-h323nxg-inspect&lt;BR /&gt; match protocol h323-nxg&lt;BR /&gt;class-map type inspect match-any Ping&lt;BR /&gt; match protocol icmp&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-10&lt;BR /&gt; match access-group 119&lt;BR /&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-11&lt;BR /&gt; match access-group 120&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any ccp-h225ras-inspect&lt;BR /&gt; match protocol h225ras&lt;BR /&gt;class-map type inspect match-any ccp-h323annexe-inspect&lt;BR /&gt; match protocol h323-annexe&lt;BR /&gt;class-map type inspect match-all ccp-cls-ccp-permit-2&lt;BR /&gt; match class-map Ping&lt;BR /&gt; match access-group name Ping&lt;BR /&gt;class-map type inspect match-all ccp-cls-ccp-permit-1&lt;BR /&gt; match class-map ICMP&lt;BR /&gt; match access-group name ICMP&lt;BR /&gt;class-map type inspect match-any ccp-h323-inspect&lt;BR /&gt; match protocol h323&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt; match access-group 100&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt; match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all ccp-cls-sdm-permit-ip-1&lt;BR /&gt; match access-group name VNC&lt;BR /&gt;class-map type inspect match-all ssh&lt;BR /&gt; match access-group name ssh&lt;BR /&gt;class-map type inspect match-any ccp-sip-inspect&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt; class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect ccp-sslvpn-pol&lt;BR /&gt; class type inspect CCP_SSLVPN&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect sdm-pol-VPNOutsideToInside-1&lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-2&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-3&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect CCP_PPTP&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-4&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-5&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-6&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-7&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-8&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-9&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-10&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-nat-user-protocol--1-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-11&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt; class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt; class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-sip-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h323-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h323annexe-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h225ras-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-h323nxg-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-skinny-inspect&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class type inspect SDM_VPN_PT&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect SDM_EASY_VPN_SERVER_PT&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect sdm-permit-ip&lt;BR /&gt; class type inspect SDM_IP&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-4&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-VPNOutsideToInside-5&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;!&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security ezvpn-zone&lt;BR /&gt;zone security sslvpn-zone&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;BR /&gt;zone-pair security sdm-zp-VPNOutsideToInside-1 source out-zone destination in-zone&lt;BR /&gt; service-policy type inspect sdm-pol-VPNOutsideToInside-1&lt;BR /&gt;zone-pair security sdm-zp-in-ezvpn1 source in-zone destination ezvpn-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination in-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security zp-in-zone-sslvpn-zone source in-zone destination sslvpn-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;zone-pair security zp-out-zone-sslvpn-zone source out-zone destination sslvpn-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;zone-pair security zp-sslvpn-zone-in-zone source sslvpn-zone destination in-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;zone-pair security zp-sslvpn-zone-out-zone source sslvpn-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;zone-pair security zp-sslvpn-zone-ezvpn-zone source sslvpn-zone destination ezvpn-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;zone-pair security zp-ezvpn-zone-sslvpn-zone source ezvpn-zone destination sslvpn-zone&lt;BR /&gt; service-policy type inspect ccp-sslvpn-pol&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt; description $ES_WAN$$FW_OUTSIDE$$ETH-WAN$&lt;BR /&gt; ip address ###### 255.255.255.252&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security out-zone&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; crypto map SDM_CMAP_3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt; no ip address&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; shutdown&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet5&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet6&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet7&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet8&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet9&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template1 type tunnel&lt;BR /&gt; ip unnumbered FastEthernet0&lt;BR /&gt; zone-member security ezvpn-zone&lt;BR /&gt; tunnel mode ipsec ipv4&lt;BR /&gt; tunnel protection ipsec profile CiscoCP_Profile1&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template2&lt;BR /&gt; ip unnumbered FastEthernet0&lt;BR /&gt; zone-member security sslvpn-zone&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description $ETH-SW-LAUNCH$$INTF-INFO-FE 2$$ES_LAN$$FW_INSIDE$&lt;BR /&gt; ip address 10.11.100.1 255.255.255.0&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt; ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;interface Async1&lt;BR /&gt; no ip address&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip local pool ****_VPN 10.11.100.50 10.11.100.99&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 ######&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 23&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat pool VNC 10.11.100.10 10.11.100.10 netmask 255.255.255.0&lt;BR /&gt;ip nat inside source static tcp 10.11.100.10 5950 interface FastEthernet0 5950&lt;BR /&gt;ip nat inside source route-map SDM_RMAP_1 interface FastEthernet0 overload&lt;BR /&gt;ip nat inside source route-map SDM_RMAP_2 interface FastEthernet0 overload&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ICMP&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended Ping&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended SDM_AH&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit ahp any any&lt;BR /&gt;ip access-list extended SDM_BOOTPC&lt;BR /&gt; remark CCP_ACL Category=0&lt;BR /&gt; permit udp any any eq bootpc&lt;BR /&gt;ip access-list extended SDM_ESP&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit esp any any&lt;BR /&gt;ip access-list extended SDM_GRE&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit gre any any&lt;BR /&gt;ip access-list extended SDM_IP&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended SDM_WEBVPN&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq 443&lt;BR /&gt;ip access-list extended VNC&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 10.11.100.10&lt;BR /&gt;ip access-list extended VNC_Port_Forwarding&lt;BR /&gt; remark CCP_ACL Category=2&lt;BR /&gt; permit tcp any eq 5950 host 10.11.100.10 eq 5950&lt;BR /&gt;ip access-list extended icmp&lt;BR /&gt; permit icmp any host 10.11.100.102&lt;BR /&gt; permit icmp host 10.11.100.102 any&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended ssh&lt;BR /&gt; permit tcp any any eq 22&lt;BR /&gt;!&lt;BR /&gt;logging trap debugging&lt;BR /&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 100 remark CCP_ACL Category=128&lt;BR /&gt;access-list 100 permit ip host 255.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 100 permit ip 184.71.201.60 0.0.0.3 any&lt;BR /&gt;access-list 101 remark CCP_ACL Category=128&lt;BR /&gt;access-list 101 permit ip any host ######&lt;BR /&gt;access-list 101 permit ip any host 206.75.152.126&lt;BR /&gt;access-list 102 remark CCP_ACL Category=4&lt;BR /&gt;access-list 102 remark IPSec Rule&lt;BR /&gt;access-list 102 permit ip 10.11.100.0 0.0.0.255 10.11.101.0 0.0.0.255&lt;BR /&gt;access-list 103 remark CCP_ACL Category=128&lt;BR /&gt;access-list 103 permit ip host 142.179.172.39 any&lt;BR /&gt;access-list 103 permit ip host 96.53.31.50 any&lt;BR /&gt;access-list 104 remark CCP_ACL Category=0&lt;BR /&gt;access-list 104 remark IPSec Rule&lt;BR /&gt;access-list 104 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 105 remark CCP_ACL Category=2&lt;BR /&gt;access-list 105 remark IPSec Rule&lt;BR /&gt;access-list 105 deny&amp;nbsp;&amp;nbsp; ip 10.11.100.0 0.0.0.255 10.11.101.0 0.0.0.255&lt;BR /&gt;access-list 105 permit ip 10.11.100.0 0.0.0.255 any&lt;BR /&gt;access-list 106 remark CCP_ACL Category=4&lt;BR /&gt;access-list 106 remark IPSec Rule&lt;BR /&gt;access-list 106 permit ip 10.11.100.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 107 remark CCP_ACL Category=0&lt;BR /&gt;access-list 107 remark IPSec Rule&lt;BR /&gt;access-list 107 permit ip 10.11.100.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 108 remark CCP_ACL Category=128&lt;BR /&gt;access-list 108 permit ip host 96.53.31.50 any&lt;BR /&gt;access-list 109 remark CCP_ACL Category=0&lt;BR /&gt;access-list 109 remark IPSec Rule&lt;BR /&gt;access-list 109 permit ip 10.11.100.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 110 remark CCP_ACL Category=0&lt;BR /&gt;access-list 110 remark IPSec Rule&lt;BR /&gt;access-list 110 permit ip 10.11.100.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 111 remark CCP_ACL Category=4&lt;BR /&gt;access-list 111 remark IPSec Rule&lt;BR /&gt;access-list 111 permit ip 10.11.100.0 0.0.0.255 10.11.101.0 0.0.0.255&lt;BR /&gt;access-list 112 remark CCP_ACL Category=0&lt;BR /&gt;access-list 112 remark IPSec Rule&lt;BR /&gt;access-list 112 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 113 remark CCP_ACL Category=0&lt;BR /&gt;access-list 113 remark IPSec Rule&lt;BR /&gt;access-list 113 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 114 remark CCP_ACL Category=128&lt;BR /&gt;access-list 114 permit ip host 96.53.31.50 any&lt;BR /&gt;access-list 115 remark CCP_ACL Category=0&lt;BR /&gt;access-list 115 remark IPSec Rule&lt;BR /&gt;access-list 115 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 116 remark CCP_ACL Category=128&lt;BR /&gt;access-list 116 permit ip host 96.53.31.50 any&lt;BR /&gt;access-list 117 remark CCP_ACL Category=0&lt;BR /&gt;access-list 117 remark IPSec Rule&lt;BR /&gt;access-list 117 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 118 remark CCP_ACL Category=0&lt;BR /&gt;access-list 118 remark IPSec Rule&lt;BR /&gt;access-list 118 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 119 remark CCP_ACL Category=0&lt;BR /&gt;access-list 119 remark IPSec Rule&lt;BR /&gt;access-list 119 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;access-list 120 remark CCP_ACL Category=0&lt;BR /&gt;access-list 120 remark IPSec Rule&lt;BR /&gt;access-list 120 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;BR /&gt;no cdp run&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map SDM_RMAP_1 permit 1&lt;BR /&gt; match ip address 105&lt;BR /&gt;!&lt;BR /&gt;route-map SDM_RMAP_2 permit 1&lt;BR /&gt; match ip address 105&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;banner exec ^C&lt;BR /&gt;% Password expiration warning.&lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt; &lt;BR /&gt;Cisco Configuration Professional (Cisco CP) is installed on this device &lt;BR /&gt;and it provides the default username "cisco" for&amp;nbsp; one-time use. If you have &lt;BR /&gt;already used the username "cisco" to login to the router and your IOS image &lt;BR /&gt;supports the "one-time" user option, then this username has already expired. &lt;BR /&gt;You will not be able to login to the router with this username after you exit &lt;BR /&gt;this session.&lt;BR /&gt; &lt;BR /&gt;It is strongly suggested that you create a new username with a privilege level &lt;BR /&gt;of 15 using the following command.&lt;BR /&gt; &lt;BR /&gt;username &amp;lt;myuser&amp;gt; privilege 15 secret 0 &amp;lt;mypassword&amp;gt;&lt;BR /&gt; &lt;BR /&gt;Replace &amp;lt;myuser&amp;gt; and &amp;lt;mypassword&amp;gt; with the username and password you want to &lt;BR /&gt;use.&lt;BR /&gt; &lt;BR /&gt;-----------------------------------------------------------------------&lt;BR /&gt;^C&lt;BR /&gt;banner login ^CAuthorized access only!&lt;BR /&gt; Disconnect IMMEDIATELY if you are not an authorized user!^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; transport output telnet&lt;BR /&gt;line 1&lt;BR /&gt; modem InOut&lt;BR /&gt; stopbits 1&lt;BR /&gt; speed 115200&lt;BR /&gt; flowcontrol hardware&lt;BR /&gt;line aux 0&lt;BR /&gt; transport output telnet&lt;BR /&gt;line vty 0 4&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;!&lt;BR /&gt;webvpn gateway gateway_1&lt;BR /&gt; ip address ###### port 443&amp;nbsp; &lt;BR /&gt; http-redirect port 80&lt;BR /&gt; ssl trustpoint TP-self-signed-4112746227&lt;BR /&gt; inservice&lt;BR /&gt; !&lt;BR /&gt;webvpn install svc flash:/webvpn/svc.pkg sequence 1&lt;BR /&gt; !&lt;BR /&gt;webvpn context ****_VPN&lt;BR /&gt; secondary-color white&lt;BR /&gt; title-color #CCCC66&lt;BR /&gt; text-color black&lt;BR /&gt; ssl authenticate verify all&lt;BR /&gt; !&lt;BR /&gt; !&lt;BR /&gt; policy group policy_1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; functions svc-enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp; svc address-pool "****_VPN"&lt;BR /&gt;&amp;nbsp;&amp;nbsp; svc keep-client-installed&lt;BR /&gt;&amp;nbsp;&amp;nbsp; svc split include 10.11.100.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; svc split include 10.11.101.0 255.255.255.0&lt;BR /&gt; virtual-template 2&lt;BR /&gt; default-group-policy policy_1&lt;BR /&gt; aaa authentication list ciscocp_vpn_xauth_ml_1&lt;BR /&gt; gateway gateway_1&lt;BR /&gt; inservice&lt;BR /&gt;!&lt;BR /&gt;end&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:29:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704133#M563147</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2019-03-11T20:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704134#M563148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please enable the ip inspect log drop-pkt and send us the logs when you try the connection, that will tell us which class-map is dropping the packet so we can modify it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 18:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704134#M563148</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-05T18:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704135#M563149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How would I enable the ip inspect log drop-pkt, and Where would I find the logs once it is enabled? (Sorry if these are dumb questions, I'm pretty new to cisco routers)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 19:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704135#M563149</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-05T19:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704136#M563150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router# config t&lt;/P&gt;&lt;P&gt;router(config)# ip inspect log drop-pkt &lt;/P&gt;&lt;P&gt;router(config)# do term mon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the connection and the logs should appear on your Screen, to stop them&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router(config)# do term no mon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 19:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704136#M563150</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-05T19:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704137#M563151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the log form when I enabled to after I tried to connect via VNC:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	line-height:115%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004165: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:33:56.234 PCTime: %FW-6-DROP_PKT: Dropping Other session 70.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;5.224.1:67 255.255.255.255:68 on zone-pair ccp-zp-out-self class class-default d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;ue to&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004166: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:34:16.398 PCTime: %FW-6-LOG_SUMMARY: 8 packets were dropped f&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;rom 70.65.224.1:67 =&amp;gt; 255.255.255.255:68 (target:class)-(ccp-zp-out-self:class-d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;efault)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004167: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:34:34.182 PCTime: %FW-6-DROP_PKT: Dropping Other session 70.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;5.224.1:67 255.255.255.255:68 on zone-pair ccp-zp-out-self class class-default d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;ue to&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004168: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:35:16.398 PCTime: %FW-6-LOG_SUMMARY: 8 packets were dropped f&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;rom 70.65.224.1:67 =&amp;gt; 255.255.255.255:68 (target:class)-(ccp-zp-out-self:class-d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;efault)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004169: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:35:29.150 PCTime: %FW-6-DROP_PKT: Dropping Other session 70.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;5.224.1:67 255.255.255.255:68 on zone-pair ccp-zp-out-self class class-default d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;ue to&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004170: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:36:07.638 PCTime: %FW-6-DROP_PKT: Dropping Other session 142.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;179.171.145:51928 10.11.100.10:5950 on zone-pair ccp-zp-out-self class class-def&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;ault due to&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;004171: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:36:16.398 PCTime: %FW-6-LOG_SUMMARY: 5 packets were dropped f&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;rom 70.65.224.1:67 =&amp;gt; 255.255.255.255:68 (target:class)-(ccp-zp-out-self:class-d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;efault)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;004172: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:36:16.398 PCTime: %FW-6-LOG_SUMMARY: 2 packets were dropped f&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;rom 142.179.171.145:51928 =&amp;gt; 10.11.100.10:5950 (target:class)-(ccp-zp-out-self:c&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;lass-default)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;004173: *May&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;5 13:36:42.126 PCTime: %FW-6-DROP_PKT: Dropping Other session 70.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;5.224.1:67 255.255.255.255:68 on zone-pair ccp-zp-out-self class class-default d&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;STRONG&gt;ue to&lt;SPAN&gt;&amp;nbsp; &lt;/SPAN&gt;DROP action found in policy-map with ip ident 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;THe lat 2 entries (the bolded ones) appeared after I tried to connect with VNC.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 19:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704137#M563151</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-05T19:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704138#M563152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls remove the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="value"&gt;&lt;SPAN class="pBody postableBody"&gt;ip nat pool VNC 10.11.100.10 10.11.100.10 netmask 255.255.255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mikey&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 21:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704138#M563152</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-05T21:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704139#M563153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I typed in no &lt;SPAN class="value"&gt;&lt;SPAN class="pBody postableBody"&gt;ip nat pool VNC 10.11.100.10 10.11.100.10 netmask 255.255.255.0 at the terminal config, and it seems to have removed the ip nat entry, but I still vnc into the computer.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 22:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704139#M563153</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-05T22:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704140#M563154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you take out the zone-pair from out to self just for testing purposes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 22:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704140#M563154</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-05T22:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704141#M563155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do I do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 22:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704141#M563155</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-05T22:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704142#M563156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;router(config)#no &lt;SPAN class="value"&gt;&lt;SPAN class="pBody postableBody"&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If after that it doesnt work, collect the logs again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 23:05:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704142#M563156</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-05T23:05:16Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704143#M563157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: left;"&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;After reviewing your configuration it looks like the access-list "VNC_Port_Forwarding" is misconfigured. Can you remove the source port 5950 and test again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;ip access-list extended VNC_Port_Forwarding&lt;/P&gt;&lt;P style="text-align: left;"&gt;permit tcp any host 10.11.100.10 eq 5950&lt;BR /&gt;no permit tcp any eq 5950 host 10.11.100.10 eq 5950&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;Loren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 May 2011 23:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704143#M563157</guid>
      <dc:creator>Loren Kolnes</dc:creator>
      <dc:date>2011-05-05T23:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704144#M563158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-para-margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;What does the command no zone-pair security ccp-zp-out-self source out-zone destination self actually do? Because I was doing this over a remote connection and as soon as I entered the command I lost connection and havent been able to restore it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 14:28:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704144#M563158</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-06T14:28:38Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704145#M563159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It takes out the security policy from outside to the router, (connections to the router such as telnet, ssh etc). You shouldnt have any problems connecting to the router. However, if you are, you can still connect from the Inside, did the VNC worked?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 16:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704145#M563159</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-06T16:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704146#M563160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VNC still isn't working from the outside. The site to site vpn the is set up (VPN to a 2nd office with a similar set up) is still working, but I can't ping the router from inside the site to site vpn. I can ping the internal computer with VINC on it (10.11.100.10), but I can't VNC into it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 17:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704146#M563160</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-06T17:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704147#M563161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try to ssh to the Outside IP of the router without connecting to VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 21:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704147#M563161</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-06T21:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704148#M563162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, it doesn't look like I can ssh either. I just get network time out errors.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 21:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704148#M563162</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-06T21:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704149#M563163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That doesnt sound right... Can you try to remote desktop to one of the internal machines and do SSH or telnet to the route from the remote desktop? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 May 2011 22:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704149#M563163</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-05-06T22:46:44Z</dc:date>
    </item>
    <item>
      <title>Re: Port forwarding not working properly</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704150#M563164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Loren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That got everything working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 May 2011 19:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-not-working-properly/m-p/1704150#M563164</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-05-12T19:02:44Z</dc:date>
    </item>
  </channel>
</rss>

