<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Forwarding Cisco 871W in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600342#M595532</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Base on the configuration on the router, you should be able to RDP to 192.168.1.240. The NAT and ACL has allowed accessed for RDP.&lt;/P&gt;&lt;P&gt;Can you please check if 192.168.1.240 has any personal firewall, etc. that might be blocking RDP access from host not in the same subnet? You might want to disable the personal firewall and check the access again. Also I assume that the user can RDP to 192.168.1.240 from within the same network 192.168.1.0/24?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 01 Jan 2011 21:56:54 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-01-01T21:56:54Z</dc:date>
    <item>
      <title>NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600341#M595529</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello everybody, I am currenlty trying to configure a 871W to forward a port 3389 to the internal address 192.168.1.240. I have been playing with this for a couple days now, and I have not been able to figure out what I am doing wrong. Any help is appreciated, and if you see anything else wrong, please don't hesitate to correct me. I am still learning everything here &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; :::BTW Outside interface utilizes DHCP for addressing...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 8415 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname SuperRT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging buffered 100000 debugging&lt;/P&gt;&lt;P&gt;enable secret 5 REMOVED&lt;/P&gt;&lt;P&gt;enable password 7 REMOVED&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;resource policy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;no ip dhcp use vrf connected&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.1.1 192.168.1.100&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 192.168.2.1 192.168.2.100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool VLAN10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; lease 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool VLAN20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; lease 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip inspect name MYFW udp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM appfw SDM_MEDIUM&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM cuseeme&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM dns&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM ftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM h323&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM https&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM icmp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM imap reset&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM pop3 reset&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM netshow&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM rcmd&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM realaudio&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM rtsp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM esmtp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM sqlnet&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM streamworks&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM tftp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM udp&lt;/P&gt;&lt;P&gt;ip inspect name SDM_MEDIUM vdolive&lt;/P&gt;&lt;P&gt;ip name-server 8.8.4.4&lt;/P&gt;&lt;P&gt;ip name-server 8.8.8.8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;appfw policy-name SDM_MEDIUM&lt;/P&gt;&lt;P&gt;&amp;nbsp; application im aol&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name login.oscar.aol.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name toc.oscar.aol.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name oam-d09a.blue.aol.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;/P&gt;&lt;P&gt;&amp;nbsp; application im msn&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name messenger.hotmail.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name gateway.messenger.hotmail.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name webmessenger.msn.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;/P&gt;&lt;P&gt;&amp;nbsp; application http&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; strict-http action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-misuse im action reset alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-misuse p2p action reset alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; port-misuse tunneling action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp; application im yahoo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service default action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; service text-chat action allow alarm&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scs.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsa.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsb.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsc.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name scsd.msg.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs16.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs19.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs42.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs53.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name cs54.msg.dcn.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name ads1.vip.scd.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name radio1.launch.vip.dal.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name in1.msg.vip.re2.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name data1.my.vip.sc5.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name address1.pim.vip.mud.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name edit.messenger.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name messenger.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name http.pager.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name privacy.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name csa.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name csb.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server permit name csc.yahoo.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; audit-trail on&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-3692985937&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-3692985937&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-3692985937&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-3692985937&lt;/P&gt;&lt;P&gt; certificate self-signed 01&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30820240 308201A9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030&lt;/P&gt;&lt;P&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;/P&gt;&lt;P&gt;&amp;nbsp; 69666963 6174652D 33363932 39383539 3337301E 170D3032 30333031 30303133&lt;/P&gt;&lt;P&gt;&amp;nbsp; 31345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649&lt;/P&gt;&lt;P&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 36393239&lt;/P&gt;&lt;P&gt;&amp;nbsp; 38353933 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281&lt;/P&gt;&lt;P&gt;&amp;nbsp; 8100AF61 3D71E7FC A5126C66 AE63222A F8A7194F C2E02069 673A8689 C0458EAC&lt;/P&gt;&lt;P&gt;&amp;nbsp; 44E1AA1A E6FD61F4 89C254A4 69B6A9E2 73FDDD40 A140F9B3 D1D2EB46 3198F509&lt;/P&gt;&lt;P&gt;&amp;nbsp; 190D84D3 B77B5314 3FC40310 DF726EFF E99A53A7 C4FE6C05 732BBAC8 9CEF8FE6&lt;/P&gt;&lt;P&gt;&amp;nbsp; 25A8F4A8 F1F81D5F 7F9644E7 50CD4ED5 2E953A02 CA2583E2 8C3FA9C8 BE411909&lt;/P&gt;&lt;P&gt;&amp;nbsp; 35450203 010001A3 68306630 0F060355 1D130101 FF040530 030101FF 30130603&lt;/P&gt;&lt;P&gt;&amp;nbsp; 551D1104 0C300A82 08537570 65725254 2E301F06 03551D23 04183016 80140A57&lt;/P&gt;&lt;P&gt;&amp;nbsp; B1CF7305 680DA4C3 E7C761BA CB02A278 256E301D 0603551D 0E041604 140A57B1&lt;/P&gt;&lt;P&gt;&amp;nbsp; CF730568 0DA4C3E7 C761BACB 02A27825 6E300D06 092A8648 86F70D01 01040500&lt;/P&gt;&lt;P&gt;&amp;nbsp; 03818100 77B8E5CD 5C1EA0F6 7A8FCC98 91A3448D F4E28353 DBF76E01 1EB57A8F&lt;/P&gt;&lt;P&gt;&amp;nbsp; C062C979 7859DBB5 1A2B1DB5 536B283B 32B9323B 78B618F6 5178DECF 95805E78&lt;/P&gt;&lt;P&gt;&amp;nbsp; 4821B674 A8B51DFA 15F2AE68 EF372884 7902A2E2 FAF483A6 D9E425DF 32B9F606&lt;/P&gt;&lt;P&gt;&amp;nbsp; EBA4D5DB BE49AC84 30E1118D 4CEE9CC0 D10ABC2D 8744E815 6FFD19ED 448E0502 D7444FBB&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;username root privilege 15 password 7 REMOVED&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge irb&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt; spanning-tree portfast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt; description $ETH-WAN$$FW_OUTSIDE$$ES_WAN$&lt;/P&gt;&lt;P&gt; ip address dhcp client-id FastEthernet4&lt;/P&gt;&lt;P&gt; ip access-group 101 in&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; encryption vlan 10 mode ciphers tkip&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; encryption vlan 20 mode ciphers tkip&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid GuestWireless&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlan 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication open&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication key-management wpa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; wpa-psk ascii 7 REMOVED&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; ssid SuperWRT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication open&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication key-management wpa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; guest-mode&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; wpa-psk ascii 7 REMOVED&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; speed basic-1.0 basic-2.0 basic-5.5 6.0 9.0 basic-11.0 12.0 18.0 24.0 36.0 48.0 54.0&lt;/P&gt;&lt;P&gt; channel 2452&lt;/P&gt;&lt;P&gt; station-role root&lt;/P&gt;&lt;P&gt; no dot11 extension aironet&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.10&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 10&lt;/P&gt;&lt;P&gt; no snmp trap link-status&lt;/P&gt;&lt;P&gt; bridge-group 10&lt;/P&gt;&lt;P&gt; bridge-group 10 subscriber-loop-control&lt;/P&gt;&lt;P&gt; bridge-group 10 spanning-disabled&lt;/P&gt;&lt;P&gt; bridge-group 10 block-unknown-source&lt;/P&gt;&lt;P&gt; no bridge-group 10 source-learning&lt;/P&gt;&lt;P&gt; no bridge-group 10 unicast-flooding&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dot11Radio0.20&lt;/P&gt;&lt;P&gt; encapsulation dot1Q 20&lt;/P&gt;&lt;P&gt; no snmp trap link-status&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; bridge-group 10&lt;/P&gt;&lt;P&gt; bridge-group 10 spanning-disabled&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Dialer1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; ip access-group Internet-inbound-ACL in&lt;/P&gt;&lt;P&gt; ip inspect MYFW out&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI10&lt;/P&gt;&lt;P&gt; description Bridge to Internal Network$FW_INSIDE$&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group 100 in&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip nat log translations syslog&lt;/P&gt;&lt;P&gt;ip nat inside source list 2 interface FastEthernet4 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.240 3389 interface FastEthernet4 3389&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended Internet-inbound-ACL&lt;/P&gt;&lt;P&gt; permit udp any eq bootps any eq bootpc&lt;/P&gt;&lt;P&gt; permit icmp any any echo&lt;/P&gt;&lt;P&gt; permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt; permit icmp any any traceroute&lt;/P&gt;&lt;P&gt; permit gre any any&lt;/P&gt;&lt;P&gt; permit esp any any&lt;/P&gt;&lt;P&gt; permit tcp any any eq 4000&lt;/P&gt;&lt;P&gt; permit tcp any any eq 3389&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;access-list 1 remark INSIDE_IF=BVI10&lt;/P&gt;&lt;P&gt;access-list 1 remark SDM_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 2 remark SDM_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 2 permit 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 remark auto generated by SDM firewall configuration&lt;/P&gt;&lt;P&gt;access-list 100 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any any&lt;/P&gt;&lt;P&gt;access-list 101 remark auto generated by SDM firewall configuration&lt;/P&gt;&lt;P&gt;access-list 101 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any log&lt;/P&gt;&lt;P&gt;access-list 101 permit udp host 8.8.4.4 eq domain any&lt;/P&gt;&lt;P&gt;access-list 101 permit udp host 8.8.8.8 eq domain any&lt;/P&gt;&lt;P&gt;access-list 101 permit udp any eq bootps any eq bootpc&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 101 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;bridge 10 route ip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 REMOVED&lt;/P&gt;&lt;P&gt; no modem enable&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password 7 REMOVED&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler max-task-time 5000&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600341#M595529</guid>
      <dc:creator>joshbuss2007</dc:creator>
      <dc:date>2019-03-11T19:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600342#M595532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Base on the configuration on the router, you should be able to RDP to 192.168.1.240. The NAT and ACL has allowed accessed for RDP.&lt;/P&gt;&lt;P&gt;Can you please check if 192.168.1.240 has any personal firewall, etc. that might be blocking RDP access from host not in the same subnet? You might want to disable the personal firewall and check the access again. Also I assume that the user can RDP to 192.168.1.240 from within the same network 192.168.1.0/24?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 01 Jan 2011 21:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600342#M595532</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-01T21:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600343#M595534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have verified that there are no personal firewalls on the host. I have also tried changing which host I am forwarding to and it doesnt matter which host I forward to on any port. I can remote within the LAN, but not from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have verified that the ISP does not block any ports by connecting the host directly to the ISP (bypassing the router). Any ideas or suggestions are welcome. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Jan 2011 22:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600343#M595534</guid>
      <dc:creator>joshbuss2007</dc:creator>
      <dc:date>2011-01-02T22:59:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600344#M595535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try to change the following:&lt;/P&gt;&lt;P&gt;FROM: &lt;STRONG&gt;ip nat inside source static tcp 192.168.1.240 3389 interface FastEthernet4 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;TO: &lt;STRONG&gt;ip nat inside source static tcp 192.168.1.240 3389 interface FastEthernet4 3389 extendable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, are you able to telnet on port 3389 from the Internet towards the FastEthernet4 ip address?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jan 2011 00:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600344#M595535</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-03T00:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600345#M595537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not able to perform the command that you have given me, the only way that I can make it extendable, is if I set by IP, not inteface. I reconfigured some items in order to achieve this but still same results...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried telneting into FE4 via port3389 from the outside(internet) and am still not able to connect...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jan 2011 07:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600345#M595537</guid>
      <dc:creator>joshbuss2007</dc:creator>
      <dc:date>2011-01-03T07:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600346#M595539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the traffic actually hit the 871 fa4 interface? Does your ACL "Internet-inbound-ACL" have any hitcount on the "permit tcp any any eq 3389" line when you try to RDP to it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jan 2011 07:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600346#M595539</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-03T07:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600347#M595541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I had traffic hitting the router's ACls, but it just would not translate...I upgraded to the newer 150-1.XA IOS, and with the same config, it is working 100%. I'm not sure, bu i think there is a bug in the older 12.4 4t ios...or atleast with DHCP'ed outside interaces. I appreciate your help and have given you credit for makeing sure that my configs were correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 00:59:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600347#M595541</guid>
      <dc:creator>joshbuss2007</dc:creator>
      <dc:date>2011-01-04T00:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Forwarding Cisco 871W</title>
      <link>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600348#M595543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cheers, and thanks for the update, and it's good to know it's working now. Thanks for the ratings too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 02:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-forwarding-cisco-871w/m-p/1600348#M595543</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-04T02:53:15Z</dc:date>
    </item>
  </channel>
</rss>

