<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525234#M611659</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally been able to get back to working on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error i get when trying to add that line to the asa is this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "nat (inside,outside) static interface service tcp 80 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 80 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Sep 2010 17:57:43 GMT</pubDate>
    <dc:creator>johnson955</dc:creator>
    <dc:date>2010-09-23T17:57:43Z</dc:date>
    <item>
      <title>Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525226#M611651</link>
      <description>&lt;P&gt;I have read the documentation and tried many things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All i want currently is to forward port 80 to an internal webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use logmein to access my home pc to the test the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The log file just says&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP access denied by ACL from xx.xx.xx.143 to outside xx.xx.xx.195/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can access the internet from the internal computer just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have it working with the webvpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not a Cisco person so i prefer working through the ASDM&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name bongards.com&lt;BR /&gt;enable password&amp;nbsp; encrypted&lt;BR /&gt;passwd&amp;nbsp; encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 99&lt;BR /&gt; ip address 192.168.1.38 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 12.28.106.195 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.1.27&lt;BR /&gt; name-server 192.168.1.37&lt;BR /&gt; domain-name bongards.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-192.168.1.0 &lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj-152.152.152.0 &lt;BR /&gt; subnet 152.152.152.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_152.152.152.0_24 &lt;BR /&gt; subnet 152.152.152.0 255.255.255.0&lt;BR /&gt;object network A_12.28.106.194 &lt;BR /&gt; host 12.28.106.194&lt;BR /&gt;object network A_12.28.106.196 &lt;BR /&gt; host 12.28.106.196&lt;BR /&gt;object network A_ &lt;BR /&gt;object network PatronPage &lt;BR /&gt; host 192.168.1.25&lt;BR /&gt; description Web Server &lt;BR /&gt;object network obj_any &lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network PP &lt;BR /&gt; host 12.28.106.195&lt;BR /&gt; description PP &lt;BR /&gt;access-list vpngrp1_splitTunnelAcl standard permit any &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip interface inside any &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 152.152.152.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit ip 152.152.152.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit ip any 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip any 30.30.30.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit tcp any object PP eq www &lt;BR /&gt;access-list outside_access_in extended permit ip 152.152.152.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit ip any 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp interface inside any eq www inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any object PatronPage eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any object PP eq www &lt;BR /&gt;access-list outside_access_in extended permit ip any object PP &lt;BR /&gt;access-list outside_nat0_outbound extended permit ip 152.152.152.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list vpngrp2_splitTunnelAcl standard permit any &lt;BR /&gt;access-list global_access extended permit tcp any interface outside eq www &lt;BR /&gt;access-list global_access extended permit icmp interface inside interface inside &lt;BR /&gt;access-list global_access extended permit tcp object PatronPage any eq www &lt;BR /&gt;access-list test extended permit ip any interface outside &lt;BR /&gt;access-list test2 standard permit any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool Vpn 152.152.152.1-152.152.152.254 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,any) source static obj-192.168.1.0 obj-192.168.1.0 destination static obj-152.152.152.0 obj-152.152.152.0&lt;BR /&gt;nat (inside,any) source static any any destination static obj-152.152.152.0 obj-152.152.152.0&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_152.152.152.0_24 NETWORK_OBJ_152.152.152.0_24&lt;BR /&gt;nat (any,inside) source static NETWORK_OBJ_152.152.152.0_24 NETWORK_OBJ_152.152.152.0_24 dns&lt;BR /&gt;nat (inside,inside) source static any any&lt;BR /&gt;!&lt;BR /&gt;object network PP&lt;BR /&gt; nat (outside,inside) dynamic PatronPage&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 12.28.106.193 1&lt;BR /&gt;route inside 10.10.10.0 255.255.255.0 192.168.1.1 4&lt;BR /&gt;route inside 20.20.20.0 255.255.255.0 192.168.1.1 3&lt;BR /&gt;route inside 30.30.30.0 255.255.255.0 30.30.30.1 2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.38 tunneled&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;vpn-addr-assign local reuse-delay 180&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.39-192.168.1.254 inside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; csd image disk0:/csd_3.4.2048.pkg&lt;BR /&gt; csd enable&lt;BR /&gt; port-forward RDP 3369 appserver2.bongards.com 3369 RDP&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec webvpn&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value inside_nat0_outbound&lt;BR /&gt; intercept-dhcp 255.255.255.0 enable&lt;BR /&gt; ip-phone-bypass enable&lt;BR /&gt; leap-bypass enable&lt;BR /&gt; nem enable&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc firewall-rule client-interface public value inside_nat0_outbound&lt;BR /&gt;&amp;nbsp; svc firewall-rule client-interface private value inside_nat0_outbound&lt;BR /&gt;group-policy vpngrp2 internal&lt;BR /&gt;group-policy vpngrp2 attributes&lt;BR /&gt; dns-server value 192.168.1.27 192.168.1.37&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value vpngrp2_splitTunnelAcl&lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;group-policy remotevpn internal&lt;BR /&gt;group-policy remotevpn attributes&lt;BR /&gt; wins-server value 192.168.1.25 192.168.1.37&lt;BR /&gt; dns-server value 192.168.1.27 192.168.1.37&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt;group-policy remote internal&lt;BR /&gt;group-policy remote attributes&lt;BR /&gt; wins-server value 192.168.1.37&lt;BR /&gt; dns-server value 192.168.1.37 192.168.1.27&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt;group-policy CiscoVPN internal&lt;BR /&gt;group-policy CiscoVPN attributes&lt;BR /&gt; wins-server value 192.168.1.25 192.168.1.37&lt;BR /&gt; dns-server value 192.168.1.27 192.168.1.37&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt;username georgej password 7qWTAlO19tqEYnAV encrypted&lt;BR /&gt;username georgej attributes&lt;BR /&gt; vpn-group-policy DfltGrpPolicy&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Admin&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;username remotevpn password 5C9zA4WCqZXiXFOz encrypted&lt;BR /&gt;username Shoplogix password ux7PTSQq6U0mPa19 encrypted&lt;BR /&gt;username Shoplogix attributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;&amp;nbsp; url-list value Shoplogix&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;username justinr password uXkNnGqn9C7DQcsV encrypted privilege 0&lt;BR /&gt;username justinr attributes&lt;BR /&gt; vpn-group-policy DfltGrpPolicy&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; file-browsing enable&lt;BR /&gt;&amp;nbsp; file-entry enable&lt;BR /&gt;&amp;nbsp; hidden-shares none&lt;BR /&gt;&amp;nbsp; url-list value Admin&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group vpngrp2 type remote-access&lt;BR /&gt;tunnel-group vpngrp2 general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt; default-group-policy vpngrp2&lt;BR /&gt;tunnel-group vpngrp2 ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group CiscoVPN type remote-access&lt;BR /&gt;tunnel-group CiscoVPN general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt;tunnel-group CiscoVPN ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group remotevpn type remote-access&lt;BR /&gt;tunnel-group remotevpn general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt; default-group-policy remotevpn&lt;BR /&gt;tunnel-group remotevpn ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt; radius-sdi-xauth&lt;BR /&gt;tunnel-group remote type remote-access&lt;BR /&gt;tunnel-group remote general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt; default-group-policy remote&lt;BR /&gt;tunnel-group remote ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:e7d1deeafe86c0caffbef7fda584321d&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525226#M611651</guid>
      <dc:creator>johnson955</dc:creator>
      <dc:date>2019-03-11T18:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525227#M611652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the IP address of your internal web server?&amp;nbsp; Is it 192.168.1.25?&amp;nbsp; From the outside, what IP address are you accessing in attempt to reach your internal web server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Sep 2010 21:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525227#M611652</guid>
      <dc:creator>Allen P Chen</dc:creator>
      <dc:date>2010-09-13T21:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525228#M611653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you need the following added to the config - assuming 192.168.1.25 is the webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network PatronPage &lt;BR /&gt; nat(inside,outside) static interface service tcp 80 80 &lt;BR /&gt; &lt;BR /&gt; access-list outside_access_in extended permit tcp any host 192.168.1.25 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 04:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525228#M611653</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-09-14T04:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525229#M611654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When i tried to add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network PatronPage &lt;BR /&gt; nat(inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i got an error message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.25 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;did go through and the packet tracer now says it is successful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when i remote my home pc and try to access the webpage via&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://12.28.106.195/DSIWeb"&gt;http://12.28.106.195/DSIWeb&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i get the log veiwer saying TCP access denied by ACL from xx.xx.xxx.143/59282 to outside:12.28.106.195/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also just FYI when i am testing the webpage i am changing the gateway of the webserver from 192.168.1.1 to 192.168.1.38 which is the internal ip of the cisco box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When it is set to 192.168.1.1 the webpage can be access from &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://bongardscheese.com/DSIWeb"&gt;http://bongardscheese.com/DSIWeb&lt;/A&gt;&lt;SPAN&gt;, which is our old firewall we want to replace.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 13:36:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525229#M611654</guid>
      <dc:creator>johnson955</dc:creator>
      <dc:date>2010-09-14T13:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525230#M611655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What error did you get? Could you pls. copy and past that error?&lt;/P&gt;&lt;P&gt;Also, what is the reason for this line in the config?&lt;/P&gt;&lt;PRE&gt;nat (inside,inside) source static any any&lt;BR /&gt;&lt;BR /&gt;can you remove this line and try?&lt;BR /&gt;&lt;BR /&gt;-KS&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 13:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525230#M611655</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-09-14T13:51:38Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525231#M611656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "object network PatronPage"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command has been sent to the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result of the command: "nat(inside,outside) static interface service tcp 80 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside,outside) static interface service tcp 80 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the inside, inside rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp; Sep 14 2010&amp;nbsp;&amp;nbsp;&amp;nbsp; 09:44:58&amp;nbsp;&amp;nbsp;&amp;nbsp; 710003&amp;nbsp;&amp;nbsp;&amp;nbsp; xx.xx.xxx.143&amp;nbsp;&amp;nbsp;&amp;nbsp; 61000&amp;nbsp;&amp;nbsp;&amp;nbsp; 12.28.106.195&amp;nbsp;&amp;nbsp;&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP access denied by ACL from xx.xx.xxx.143/61000 to outside:12.28.106.195/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config is now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name bongards.com&lt;BR /&gt;enable password 1rEyPzDTxdq.gL.M encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 99&lt;BR /&gt; ip address 192.168.1.38 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 12.28.106.195 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.1.27&lt;BR /&gt; name-server 192.168.1.37&lt;BR /&gt; domain-name bongards.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-192.168.1.0 &lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj-152.152.152.0 &lt;BR /&gt; subnet 152.152.152.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_152.152.152.0_24 &lt;BR /&gt; subnet 152.152.152.0 255.255.255.0&lt;BR /&gt;object network A_12.28.106.194 &lt;BR /&gt; host 12.28.106.194&lt;BR /&gt;object network A_12.28.106.196 &lt;BR /&gt; host 12.28.106.196&lt;BR /&gt;object network A_ &lt;BR /&gt;object network PatronPage &lt;BR /&gt; host 192.168.1.25&lt;BR /&gt; description Web Server &lt;BR /&gt;object network obj_any &lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network PP &lt;BR /&gt; host 12.28.106.195&lt;BR /&gt; description PP &lt;BR /&gt;access-list vpngrp1_splitTunnelAcl standard permit any &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip interface inside any &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 152.152.152.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit ip 152.152.152.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit ip any 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip any 30.30.30.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit tcp any object PP eq www &lt;BR /&gt;access-list outside_access_in extended permit ip 152.152.152.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit ip any 152.152.152.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp interface inside any eq www inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any object PatronPage eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any object PP eq www &lt;BR /&gt;access-list outside_access_in extended permit ip any object PP &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.1.25 eq www &lt;BR /&gt;access-list outside_nat0_outbound extended permit ip 152.152.152.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list vpngrp2_splitTunnelAcl standard permit any &lt;BR /&gt;access-list global_access extended permit tcp any interface outside eq www &lt;BR /&gt;access-list global_access extended permit icmp interface inside interface inside &lt;BR /&gt;access-list global_access extended permit tcp object PatronPage any eq www &lt;BR /&gt;access-list test extended permit ip any interface outside &lt;BR /&gt;access-list test2 standard permit any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool Vpn 152.152.152.1-152.152.152.254 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,any) source static obj-192.168.1.0 obj-192.168.1.0 destination static obj-152.152.152.0 obj-152.152.152.0&lt;BR /&gt;nat (inside,any) source static any any destination static obj-152.152.152.0 obj-152.152.152.0&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_152.152.152.0_24 NETWORK_OBJ_152.152.152.0_24&lt;BR /&gt;nat (any,inside) source static NETWORK_OBJ_152.152.152.0_24 NETWORK_OBJ_152.152.152.0_24 dns&lt;BR /&gt;!&lt;BR /&gt;object network PP&lt;BR /&gt; nat (outside,inside) dynamic PatronPage&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 12.28.106.193 1&lt;BR /&gt;route inside 10.10.10.0 255.255.255.0 192.168.1.1 4&lt;BR /&gt;route inside 20.20.20.0 255.255.255.0 192.168.1.1 3&lt;BR /&gt;route inside 30.30.30.0 255.255.255.0 30.30.30.1 2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.38 tunneled&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;vpn-addr-assign local reuse-delay 180&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.39-192.168.1.254 inside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; csd image disk0:/csd_3.4.2048.pkg&lt;BR /&gt; csd enable&lt;BR /&gt; port-forward RDP 3369 appserver2.bongards.com 3369 RDP&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec webvpn&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value inside_nat0_outbound&lt;BR /&gt; intercept-dhcp 255.255.255.0 enable&lt;BR /&gt; ip-phone-bypass enable&lt;BR /&gt; leap-bypass enable&lt;BR /&gt; nem enable&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc firewall-rule client-interface public value inside_nat0_outbound&lt;BR /&gt;&amp;nbsp; svc firewall-rule client-interface private value inside_nat0_outbound&lt;BR /&gt;group-policy vpngrp2 internal&lt;BR /&gt;group-policy vpngrp2 attributes&lt;BR /&gt; dns-server value 192.168.1.27 192.168.1.37&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value vpngrp2_splitTunnelAcl&lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;group-policy remotevpn internal&lt;BR /&gt;group-policy remotevpn attributes&lt;BR /&gt; wins-server value 192.168.1.25 192.168.1.37&lt;BR /&gt; dns-server value 192.168.1.27 192.168.1.37&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt;group-policy remote internal&lt;BR /&gt;group-policy remote attributes&lt;BR /&gt; wins-server value 192.168.1.37&lt;BR /&gt; dns-server value 192.168.1.37 192.168.1.27&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt;group-policy CiscoVPN internal&lt;BR /&gt;group-policy CiscoVPN attributes&lt;BR /&gt; wins-server value 192.168.1.25 192.168.1.37&lt;BR /&gt; dns-server value 192.168.1.27 192.168.1.37&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value bongards.com&lt;BR /&gt;username georgej password 7qWTAlO19tqEYnAV encrypted&lt;BR /&gt;username georgej attributes&lt;BR /&gt; vpn-group-policy DfltGrpPolicy&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Admin&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;username remotevpn password 5C9zA4WCqZXiXFOz encrypted&lt;BR /&gt;username Shoplogix password ux7PTSQq6U0mPa19 encrypted&lt;BR /&gt;username Shoplogix attributes&lt;BR /&gt; service-type remote-access&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-entry disable&lt;BR /&gt;&amp;nbsp; url-list value Shoplogix&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;username justinr password uXkNnGqn9C7DQcsV encrypted privilege 0&lt;BR /&gt;username justinr attributes&lt;BR /&gt; vpn-group-policy DfltGrpPolicy&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; file-browsing enable&lt;BR /&gt;&amp;nbsp; file-entry enable&lt;BR /&gt;&amp;nbsp; hidden-shares none&lt;BR /&gt;&amp;nbsp; url-list value Admin&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group vpngrp2 type remote-access&lt;BR /&gt;tunnel-group vpngrp2 general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt; default-group-policy vpngrp2&lt;BR /&gt;tunnel-group vpngrp2 ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group CiscoVPN type remote-access&lt;BR /&gt;tunnel-group CiscoVPN general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt;tunnel-group CiscoVPN ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group remotevpn type remote-access&lt;BR /&gt;tunnel-group remotevpn general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt; default-group-policy remotevpn&lt;BR /&gt;tunnel-group remotevpn ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt; radius-sdi-xauth&lt;BR /&gt;tunnel-group remote type remote-access&lt;BR /&gt;tunnel-group remote general-attributes&lt;BR /&gt; address-pool Vpn&lt;BR /&gt; default-group-policy remote&lt;BR /&gt;tunnel-group remote ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:7d0ac7a4d66fe2f247fa83f70aeeecd3&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 14:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525231#M611656</guid>
      <dc:creator>johnson955</dc:creator>
      <dc:date>2010-09-14T14:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525232#M611657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There needs to be a space between the nat and the "(".&amp;nbsp; For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please give that a try.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 17:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525232#M611657</guid>
      <dc:creator>Allen P Chen</dc:creator>
      <dc:date>2010-09-14T17:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525233#M611658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will give it a try tomorrow the web server is starting to not play nice with anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to make sure that if the cisco config is right it will actually work, hate to find out my config was right but never worked because it was the server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Sep 2010 19:21:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525233#M611658</guid>
      <dc:creator>johnson955</dc:creator>
      <dc:date>2010-09-14T19:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525234#M611659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally been able to get back to working on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error i get when trying to add that line to the asa is this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "nat (inside,outside) static interface service tcp 80 80"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 80 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2010 17:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525234#M611659</guid>
      <dc:creator>johnson955</dc:creator>
      <dc:date>2010-09-23T17:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525235#M611660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to define the static nat within the object:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network PatronPage &lt;BR /&gt; nat (inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please give that a try, thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2010 18:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525235#M611660</guid>
      <dc:creator>Allen P Chen</dc:creator>
      <dc:date>2010-09-23T18:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525236#M611661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow i got it working, i followed the directions at&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.gregledet.net/?p=537"&gt;http://www.gregledet.net/?p=537&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What i had missed was the Advanced Nat Settings, i think thats what the command we where trying to do CLI would have done.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Sep 2010 18:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/1525236#M611661</guid>
      <dc:creator>johnson955</dc:creator>
      <dc:date>2010-09-23T18:16:41Z</dc:date>
    </item>
  </channel>
</rss>

