<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hairpinning Port Redirects on ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355959#M738918</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (management) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (management) 10 interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Jan 2010 13:58:00 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2010-01-12T13:58:00Z</dc:date>
    <item>
      <title>Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355958#M738917</link>
      <description>&lt;P&gt;I have an urgent configuration issue. I have port 80 open and forwarded through my firewall which works great from the outside but does not work from within the network.&lt;/P&gt;&lt;P&gt;Have tried the &lt;STRONG&gt;same-security-traffic permit intra-interface &lt;/STRONG&gt;&lt;SPAN&gt;command and everything else I could find online but still get nothing from inside the network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really need this to work from the inside for mail etc.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any Help would be greatly appreciated!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;asdm image disk0:/asdm-508.bin
no asdm history enable
: Saved
:
ASA Version 7.0(8) 
!
hostname ciscoasa
domain-name default.domain.invalid
enable password OTWkIuDnLYMtYMea encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
dns-guard
!
interface Ethernet0/0
 nameif WAN1
 security-level 0
 ip address 64.61.54.114 255.255.255.248 
!
interface Ethernet0/1
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet0/2
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Ethernet0/3
 shutdown
 no nameif
 no security-level
 no ip address
!
interface Management0/0
 nameif management
 security-level 100
 ip address 10.10.3.1 255.255.255.0 
!
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list WAN1_access_in extended permit tcp any any eq www 
access-list WAN1_access_in extended permit icmp any any 
access-list 1 standard permit 10.10.3.0 255.255.255.0 
access-list outside_nat0 extended permit ip 10.10.3.0 255.255.255.0 10.10.3.0 255.255.255.0 
pager lines 24
logging enable
logging asdm informational
mtu WAN1 1500
mtu management 1500
no failover
monitor-interface WAN1
monitor-interface management
icmp permit any WAN1
asdm image disk0:/asdm-508.bin
no asdm history enable
arp timeout 14400
nat-control
global (WAN1) 10 interface
global (management) 1 interface
nat (WAN1) 0 access-list outside_nat0
nat (management) 10 0.0.0.0 0.0.0.0
static (management,WAN1) tcp interface www 10.10.3.60 www netmask 255.255.255.255 
static (management,management) tcp interface www 10.10.3.60 www netmask 255.255.255.255 
access-group WAN1_access_in in interface WAN1
route WAN1 0.0.0.0 0.0.0.0 64.61.54.113 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
group-policy DfltGrpPolicy attributes
 banner none
 wins-server none
 dns-server none
 dhcp-network-scope none
 vpn-access-hours none
 vpn-simultaneous-logins 3
 vpn-idle-timeout 30
 vpn-session-timeout none
 vpn-filter none
 vpn-tunnel-protocol IPSec 
 password-storage disable
 ip-comp disable
 re-xauth disable
 group-lock none
 pfs disable
 ipsec-udp disable
 ipsec-udp-port 10000
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value 1
 default-domain none
 split-dns none
 secure-unit-authentication disable
 user-authentication disable
 user-authentication-idle-timeout 30
 ip-phone-bypass disable
 leap-bypass disable
 nem disable
 backup-servers keep-client-config
 client-firewall none
 client-access-rule none
 webvpn
&amp;nbsp; functions url-entry
&amp;nbsp; port-forward-name value Application Access
http server enable
http 10.10.3.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 10.10.3.2-10.10.3.254 management
dhcpd lease 3600
dhcpd ping_timeout 50
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns maximum-length 512 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect skinny 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect xdmcp 
&amp;nbsp; inspect sip 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect tftp 
!
service-policy global_policy global
Cryptochecksum:5adffc48b154a93b54abf54e2fc59265
: end&lt;/PRE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:56:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355958#M738917</guid>
      <dc:creator>EverydaySolutions</dc:creator>
      <dc:date>2019-03-11T16:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355959#M738918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Change&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (management) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (management) 10 interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jan 2010 13:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355959#M738918</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2010-01-12T13:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355960#M738919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried that already, no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually it turns out after much research that this is impossible on software version 7.0.8, it was first allowed in version 7.2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jan 2010 14:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355960#M738919</guid>
      <dc:creator>EverydaySolutions</dc:creator>
      <dc:date>2010-01-12T14:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355961#M738920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please attach a topology. Is the server in a remote INSIDE LAN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jan 2010 23:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355961#M738920</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-01-12T23:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355962#M738921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;U-Turn translation is not a very good idea. Pls. remove this static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;static (management,management) tcp interface www 10.10.3.60 www netmask 255.255.255.255 &lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. try to access the inside server using only its inside ip address&lt;/P&gt;&lt;PRE&gt;10.10.3.60.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://10.10.3.60" target="_blank"&gt;http://10.10.3.60&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;does work from the inside computers right? &lt;BR /&gt;&lt;BR /&gt;The inside computers in 10.10.3/24 network should be able to access other server in the same 10.10.3.0/24 network&lt;BR /&gt;&lt;BR /&gt;and that traffic should not even come to the firewall.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;-KS&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 00:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355962#M738921</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-13T00:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355963#M738922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a unique environment where using external addresses is necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a very standard setup, one inside interface and one external. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be doing an upgrade from 7.0.8 to 7.2 tommorrow to see if that fixes the problem&lt;/P&gt;&lt;P&gt;Any one else solve this issue by upgrading?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 00:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355963#M738922</guid>
      <dc:creator>EverydaySolutions</dc:creator>
      <dc:date>2010-01-13T00:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355964#M738923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the command was added only for encrypted traffic in 7.0 as you can read here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relese Note 7.0&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa70/release/notes/asa_rn.html#wp207751"&gt;http://www.cisco.com/en/US/docs/security/asa/asa70/release/notes/asa_rn.html#wp207751&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Release Note 7.2&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/release/notes/asarn72.html#wp37875"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/release/notes/asarn72.html#wp37875&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;H3 class="p_H_Head3"&gt;Intra-Interface Communication for Clear Traffic&lt;/H3&gt;&lt;A name="wp62855"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;You can now allow any traffic to enter and exit the same interface, and not just VPN traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1392884table1392882" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;TD&gt;&lt;P class="pB1_Body1"&gt;7.2(1)&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1392897"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;The &lt;STRONG class="cBold"&gt;intra-interface&lt;/STRONG&gt; keyword now allows all traffic to enter and exit the same interface, and not just IPSec traffic.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to upgrade past 7.2.1 to be able to use same security command for clear traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 02:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355964#M738923</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-13T02:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355965#M738924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for confirming that for me, it was driving me crazy!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jan 2010 02:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355965#M738924</guid>
      <dc:creator>EverydaySolutions</dc:creator>
      <dc:date>2010-01-13T02:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Port Redirects on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355966#M738925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jared -&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I also had to perform DNS doctoring/rewrite because of the enforcing of HTTP Headers on our IIS server.&amp;nbsp; You may need that as well.&amp;nbsp; The problem for me was that internal users couldn't browse our website using DNS without the rewrite, and they couldn't use the private internal IP of the website due to the header requirement.&amp;nbsp; Using hairpinning with DNS doctoring worked for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 03:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-port-redirects-on-asa-5510/m-p/1355966#M738925</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2010-01-14T03:37:54Z</dc:date>
    </item>
  </channel>
</rss>

