<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to enable access from outside to inside network to SQL server? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800410#M7329</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Then in the above configuration just replace SQL_PUBLIC with the keyword &lt;STRONG&gt;&lt;EM&gt;interface&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;/EM&gt; and replace the IP address in the SQL_SERVER objcet to the required IP.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Feb 2019 20:13:43 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2019-02-12T20:13:43Z</dc:date>
    <item>
      <title>How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3792892#M7321</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am having proglem to get work from outside network to inside network. I have made nat rules etc already and giving permissson, tried use tcp and udp ports. Inside network everything is working. I have tried 1433 and 3838 ports both are working inside. What I have done is used that single port 3838 with tcp and udp on only tcp.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is somebody&amp;nbsp;have done&amp;nbsp;this. If you would give help or correct command to no it right and getting work.&lt;/P&gt;&lt;P&gt;Config would bee 192.168.13.100 is SQL server, and port 1433 and 3838 are in sql configuration in use are working inside network.&lt;/P&gt;&lt;P&gt;public address xx.xx.xx.42.&lt;/P&gt;&lt;P&gt;Firewall is ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would need to get this work asap.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully somebody can help about.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:44:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3792892#M7321</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2020-02-21T16:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3792920#M7322</link>
      <description>&lt;P&gt;Without seeing your configuration we can not tell you what is wrong with it.&amp;nbsp; Your NAT and access-list rules might be correct but there is another NAT rule which is being hit.&amp;nbsp; But here is an example of how it would be done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network&amp;nbsp;&lt;SPAN&gt;REAL-IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;host 10.10.10.10&lt;/P&gt;
&lt;P&gt;object network NAT-IP&lt;/P&gt;
&lt;P&gt;host 20.20.20.10&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static&amp;nbsp;&lt;SPAN&gt;REAL-IP NAT-IP service tcp 1433 1433&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list outside-in extended permit tcp any host 10.10.10.10 eq 1433&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-group in interface outside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Feb 2019 14:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3792920#M7322</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-01T14:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3798645#M7323</link>
      <description>&lt;P&gt;Hi, I got fallowing error message in attached files&lt;/P&gt;&lt;P&gt;I checked running config:&lt;/P&gt;&lt;P&gt;ASA Version 9.5(1)&lt;/P&gt;&lt;P&gt;access-list WAN-in extended permit tcp any host (inside ip) eq 1433&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host (inside ip) eq 1433&lt;/P&gt;&lt;P&gt;access-list wan-in extended permit tcp any host (inside ip) eq 1433&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How I can delete these access list from config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network CSI-LAN host (inside ip)&lt;/P&gt;&lt;P&gt;object network CSI-WAN host (public ip)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0 nameif WAN&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1 nameif LAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This kind existing, should access list be this kind?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit tcp any object SECUREMAIL eq https&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 11:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3798645#M7323</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2019-02-10T11:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3798714#M7324</link>
      <description>&lt;P&gt;To remove access list entries from the configuration in ASDM, just find the rule, select the rule and click delete at the top of the ASDM page (or just right click the rule and select delete.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The access-group command failed because I forgot to include the name of the ACL in the command.&amp;nbsp; But if you already have an access-list in place then you do not need this command. You would just need to amend the access-list entry so it references the correct access-list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The NAT statement failed as there is a syntax error in it.&amp;nbsp; You need to create a service object and refere to that for the service.&amp;nbsp; But it is better to do this through ASDM if you are not very comfortable with CLI.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 17:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3798714#M7324</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-10T17:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3799901#M7325</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would somebody be kind and send command to get this work.&lt;/P&gt;&lt;P&gt;Now i will tried with new ASA, to get this work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Inside: 192.168.1.1&lt;/P&gt;&lt;P&gt;ASA Outside: 84.50.160.82 (not real address).&lt;/P&gt;&lt;P&gt;SQL Server: 192.168.1.106 (gw 192.168.1.1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SQL port 1433&lt;/P&gt;&lt;P&gt;SQL Client would be connection to 84.50.160.82.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 09:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3799901#M7325</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2019-02-12T09:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3799917#M7326</link>
      <description>Current config (only ip added)&lt;BR /&gt;ASA Version 9.6(1)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;names&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 84.50.160.82 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip addres&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 84.50.160.81 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.20 inside&lt;BR /&gt;!&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:d3557ef79fa29ea436850fa22156771e&lt;BR /&gt;: end&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Feb 2019 10:01:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3799917#M7326</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2019-02-12T10:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800387#M7327</link>
      <description>&lt;P&gt;&lt;SPAN&gt;remove this NAT statement first:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network obj_any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no nat (any,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then configure this (remember to replace IPs with real IPs, you can also change the object names if you like):&lt;/P&gt;
&lt;P&gt;object network SQL_SERVER&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 192.168.1.10&lt;/P&gt;
&lt;P&gt;object network SQL_PUBLIC&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host 1.2.3.4&lt;/P&gt;
&lt;P&gt;object service TCP_SQL&lt;/P&gt;
&lt;P&gt;&amp;nbsp; service tcp source eq 1433&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static SQL_SERVER SQL_PUBLIC service TCP_SQL&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.1.10 eq 1433&lt;/P&gt;
&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 19:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800387#M7327</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-12T19:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800391#M7328</link>
      <description>This ip 1.2.3.4 is public address.&lt;BR /&gt;&lt;BR /&gt;In this configuration isp is giving only one ip, what is givent to outside interface. In config would this 1.2.3.4 be changed to 84.50.160.82</description>
      <pubDate>Tue, 12 Feb 2019 19:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800391#M7328</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2019-02-12T19:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800410#M7329</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Then in the above configuration just replace SQL_PUBLIC with the keyword &lt;STRONG&gt;&lt;EM&gt;interface&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;/EM&gt; and replace the IP address in the SQL_SERVER objcet to the required IP.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 20:13:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800410#M7329</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-12T20:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800458#M7330</link>
      <description>So configuration is then:&lt;BR /&gt;&lt;BR /&gt;remove this NAT statement first:&lt;BR /&gt;&lt;BR /&gt;object network obj_any&lt;BR /&gt;no nat (any,outside) dynamic interface&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Then configure this (remember to replace IPs with real IPs, you can also change the object names if you like):&lt;BR /&gt;&lt;BR /&gt;object network SQL_SERVER&lt;BR /&gt;host 192.168.1.106&lt;BR /&gt;&lt;BR /&gt;object service TCP_SQL&lt;BR /&gt;service tcp source eq 1433&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static SQL_SERVER interface service TCP_SQL&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.1.106 eq 1433&lt;BR /&gt;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;&lt;BR /&gt;Is this correct then?</description>
      <pubDate>Tue, 12 Feb 2019 22:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800458#M7330</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2019-02-12T22:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800643#M7331</link>
      <description>&lt;P&gt;Just an explanation on removing the dynamic NAT.&amp;nbsp; You have two dynamic NAT on in Auto NAT and the other in after-auto. so for keeping the configuration tidy I suggest removing the dynamic NAT in the Auto NAT section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than that, yes, this configuration looks correct.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 06:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800643#M7331</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-13T06:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800688#M7332</link>
      <description>Hopefully last one&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static SQL_SERVER interface service TCP_SQL&lt;BR /&gt;ERROR: % Incomplete command</description>
      <pubDate>Wed, 13 Feb 2019 08:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800688#M7332</guid>
      <dc:creator>hyvonto</dc:creator>
      <dc:date>2019-02-13T08:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to enable access from outside to inside network to SQL server?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800862#M7333</link>
      <description>&lt;P&gt;Just an FYI you can use the "?" (without quotes) in CLI to see what is missing at the end of the command.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You might need to add andother TCP_SQL at the end.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) source static SQL_SERVER interface service TCP_SQL TCP_SQL&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 12:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-enable-access-from-outside-to-inside-network-to-sql/m-p/3800862#M7333</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-13T12:03:10Z</dc:date>
    </item>
  </channel>
</rss>

