<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 - Accessing services from inside to outside. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773536#M8038</link>
    <description>&lt;P&gt;Hi, I can use the private IP to access the web server without any issue. It's just&amp;nbsp;being able to access&amp;nbsp;the web server's public address is also required so now I'm still frustrated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a side note, Accessing the web server's public address from the internet also works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the culprit being this flow :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;=======&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;outside&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;PC:10.0.1.20&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 54.55.56.57&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;==============&amp;nbsp; "&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Web Server:10.0.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;doesn't seem to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Sat, 05 Jan 2019 19:45:12 GMT</pubDate>
    <dc:creator>northernlight</dc:creator>
    <dc:date>2019-01-05T19:45:12Z</dc:date>
    <item>
      <title>ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773332#M8022</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I have a web server sits behind an ASA5505, lets say it has the ip 10.0.1.10&lt;/P&gt;&lt;P&gt;I have configured a NAT rule to forward port 80 from the outside interface , for example 54.55.56.57 to this server. it works flawlessly.&lt;/P&gt;&lt;P&gt;However I have observed if I have a pc&amp;nbsp;on the same subnet&amp;nbsp;as this web server, lets say the PC has the ip of 10.0.1.20, it seems the PC wont be connect to the web server if I type in &lt;A href="http://54.55.56.57" target="_blank"&gt;http://54.55.56.57&lt;/A&gt;. &lt;A href="http://10.0.1.10" target="_blank"&gt;http://10.0.1.10&lt;/A&gt; works without any issue.&lt;/P&gt;&lt;P&gt;Now I'm curious can I make the PC be able to access the web server's external address if it resides&amp;nbsp;on the same subnet as the server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773332#M8022</guid>
      <dc:creator>northernlight</dc:creator>
      <dc:date>2020-02-21T16:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773370#M8023</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes this is possible.&lt;/P&gt;
&lt;P&gt;Take a look on this link on section 1 and section 2:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/security-documents/dns-doctoring-and-u-turning-on-the-asa-quot-when-and-how-to-use/ta-p/3153693" target="_blank"&gt;https://community.cisco.com/t5/security-documents/dns-doctoring-and-u-turning-on-the-asa-quot-when-and-how-to-use/ta-p/3153693&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Section 1 is for DNS-Doctoring (if users are getting DNS resolution from an external DNS) and Section 2 without DNS-Doctoring.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 05:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773370#M8023</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-01-05T05:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773393#M8025</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Francesco,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the information but it seems I'm not allowed to section the "Translate the DNS reply for rules" checkbox which is somehow required to make DNS-Doctoring work. Is there something to do with my NAT?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT.jpg" style="width: 545px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/27130iFB98AD7796BC567B/image-size/large?v=v2&amp;amp;px=999" role="button" title="NAT.jpg" alt="NAT.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 11:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773393#M8025</guid>
      <dc:creator>northernlight</dc:creator>
      <dc:date>2019-01-05T11:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773420#M8026</link>
      <description>&lt;P&gt;kindly please show us your nat rule.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 10:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773420#M8026</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-05T10:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773429#M8028</link>
      <description>&lt;P&gt;Here are my&amp;nbsp;NAT rules. Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 11:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773429#M8028</guid>
      <dc:creator>northernlight</dc:creator>
      <dc:date>2019-01-05T11:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773487#M8030</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please post the output from &lt;EM&gt;show run nat?&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 15:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773487#M8030</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2019-01-05T15:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773493#M8031</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Static NAT is used whenever an outside user would like to access a server that sits in your internal network. In this case, traffic traversing from WAN to&amp;nbsp;Lab_Outside_Gateway.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, someone on the internet is trying to access the web server by HTTP://&lt;SPAN&gt;54.55.56.57. The packet arrives at the ASA and matches the NAT rule, the packet then translated into the private address and forwarded via the correct interface.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I understand that your question is how to use the public IP when accessing from the internal network. Can't you use the private IP when accessing from inside?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However in your case the traffic&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 15:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773493#M8031</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2019-01-05T15:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773509#M8033</link>
      <description>&lt;P&gt;since you can not use the DNS. the other solution could be something like this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network HOST-OUT&lt;BR /&gt;&amp;nbsp;host 54.55.56.57&lt;BR /&gt;&amp;nbsp;nat (WAN,Lab_Outside_Gateway) static 10.0.1.21&lt;BR /&gt;!&lt;BR /&gt;access-list OUT-IN extended permit tcp any host 10.0.1.21 eq 80&lt;BR /&gt;access-group OUT-IN in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if this fulfill your purpose and something you look like this. in that case from your Lab_Outside_Gateway pc and &lt;A href="http://54.55.56.57.&amp;nbsp;" target="_blank"&gt;http://54.55.56.57.&amp;nbsp;&lt;/A&gt; once this rule is place you can not http 10.0.1.21.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You have to reserve this IP address 10.0.1.21 for the use to this server binded to 54.55.56.57. howerver,&lt;BR /&gt;having said that this can be useful if you have a spare public ip address.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 16:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773509#M8033</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-05T16:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773533#M8035</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the NAT tip. However my&amp;nbsp;&lt;SPAN&gt;54.55.56.57 public IP actually comes from DHCP from ISP. I do not have a static IP at the moment&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In this case,&amp;nbsp;&amp;nbsp;Can I bind the host to the outside interface instead of 54.55.56.57 for the NAT rule to work?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 19:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773533#M8035</guid>
      <dc:creator>northernlight</dc:creator>
      <dc:date>2019-01-05T19:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773536#M8038</link>
      <description>&lt;P&gt;Hi, I can use the private IP to access the web server without any issue. It's just&amp;nbsp;being able to access&amp;nbsp;the web server's public address is also required so now I'm still frustrated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a side note, Accessing the web server's public address from the internet also works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the culprit being this flow :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;=======&amp;gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;outside&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;PC:10.0.1.20&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 54.55.56.57&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;"&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;==============&amp;nbsp; "&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Web Server:10.0.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;doesn't seem to work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 19:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773536#M8038</guid>
      <dc:creator>northernlight</dc:creator>
      <dc:date>2019-01-05T19:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773541#M8040</link>
      <description>&lt;P&gt;I think i know what you want. might i can help you. but it will be a different approach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;first of all you tell me. if you sitting inside your network why you want to use the public ip address to access the server. you can easily use the private RFC 1918 addresses. having said that, in your mind you have some thing like this. you want to access this &lt;A href="http://54.x.x.x" target="_blank"&gt;http://54.x.x.x&lt;/A&gt; from outside at internet if you not at home or you some where in another country so your server is always access able to you regards if the address from dhcp change.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you answer this i can guide you.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 19:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773541#M8040</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-05T19:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773543#M8041</link>
      <description>&lt;P&gt;if i understand you topology which you draw you should be able to get connected to your web server from internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;go to &lt;A href="https://www.browserling.com/" target="_blank"&gt;https://www.browserling.com/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;type the address &lt;A href="http://54.55.x.x" target="_blank"&gt;http://54.55.x.x&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or do a packet tracer and past the result here&lt;/P&gt;&lt;P&gt;packet tracer input WAN tcp 8.8.8.8 123 10.0.1.10 80 detail&lt;/P&gt;&lt;P&gt;also give us show run access-list&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 20:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773543#M8041</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-05T20:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 - Accessing services from inside to outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773857#M8227</link>
      <description>Can you share please your show run then i can adapt your config. &lt;BR /&gt;The object you want to nat is the one called Web-Server?&lt;BR /&gt;&lt;BR /&gt;Also can you share the output of the following command please:&lt;BR /&gt;&lt;BR /&gt;packet-tracer input Lab_Outside_Gateway tcp A.A.A.A 12345 B.B.B.B 443 detail&lt;BR /&gt;&lt;BR /&gt;==&amp;gt; A.A.A.A should be replaced by any inside IP&lt;BR /&gt;==&amp;gt; B.B.B.B should be replaced by your public interface IP.&lt;BR /&gt;</description>
      <pubDate>Mon, 07 Jan 2019 04:32:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-accessing-services-from-inside-to-outside/m-p/3773857#M8227</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-01-07T04:32:49Z</dc:date>
    </item>
  </channel>
</rss>

