<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 Port Forward Range in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370487#M830614</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so the reason why the ACL is necessary is because it is the RETURN traffic in a flow? &lt;/P&gt;&lt;P&gt;I thought there was no need to permit with an ACL traffic flowing from a high to low zone?&amp;nbsp; Is that only for traffic initiated by the inside interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue isn't with SIP (udp 5060), it's with the RTP traffic (udp 15000-15511).&amp;nbsp; I need to NAT the traffic on the way out from 192.168.9.9 to 66.x.x.3 and on the way back in (66.x.x.3 to 192.168.9.9).&amp;nbsp; Will the static command take care of this bi-directional flow?&amp;nbsp; Or do I need a nat (inside) / global (outside) pairing for traffic leaving the firewall, and the static for return traffic?&amp;nbsp; Should the port-object range work for this?&amp;nbsp; Or will this not work without being able to inspect the RTP traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 Jan 2010 05:03:59 GMT</pubDate>
    <dc:creator>Scott Pickles</dc:creator>
    <dc:date>2010-01-14T05:03:59Z</dc:date>
    <item>
      <title>ASA 5505 Port Forward Range</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370483#M830493</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/0/3/7/2730-CityVoice%20Diagram.png" alt="CityVoice Diagram.png" class="jive-image-thumbnail jive-image" height="451" onclick="" width="859" /&gt;&lt;/P&gt;&lt;P&gt;I have spent the last few days trying to get my VoIP box exposed to the internet using a static public IP and port forwarding.&amp;nbsp; However, most of the posts I have read thus far only deal with forwarding one or two ports, usually a single IP on the outside, and mostly just traffic from outside to inside.&amp;nbsp; In my scenario, I need to statically NAT traffic from the VoIP box inside at 192.168.9.9 to a public IP on the outside on the same subnet as the ASA outside interface (66.x.x.0 / 24) where .2 is the ASA, .3 is the VoIP server.&amp;nbsp; I have created my static NAT, object-group for services and ACLs.&amp;nbsp; I can connect to my outbound VoIP proxy (ITSP) and make a call, but I get no audio.&amp;nbsp; The Allworx uses udp ports 15000-15511 for RTP, and this is exactly what I'm forwarding as a range.&amp;nbsp; My config is posted below.&amp;nbsp; Do I need a static NAT in both directions?&amp;nbsp; Should I use a nat (inside) and global (outside) for outbound and static NAT for the return?&amp;nbsp; Is port forwarding a range even possible?&amp;nbsp; I have tried many different variations of my config to no avail.&amp;nbsp; One other burning question is this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny udp src inside:Allworx_Inside/15376 dst outside:199.173.81.34/50222 by access-group "inside_access_in" [0x0, 0x0]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Viewing the log during the setup the ASA indicates that my RTP traffic is denied by the inbound ACL on the inside interface.&amp;nbsp; Is this still required if I'm using a static NAT and allowing that traffic to the outside interface?&amp;nbsp; I thought that by using static NAT you're creating the bit pipe or hole through the firewall, and all that was necessary was an ACL permitting traffic to the pipe entry, and that it would then reach the inside device without the need for an ACL on the inside interface.&amp;nbsp; What is more, the ASA wants me to permit traffic inbound to the inside interface when the source is inside and the destination is outside.&amp;nbsp; Why on earth would I need an inbound ACL on the inside interface for traffic that needs to leave the inside interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname asa5505&lt;BR /&gt;domain-name vpnsystems.vpn&lt;BR /&gt;enable password 5Guh/zkcc.rD2nN1 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.9.9 Allworx_Inside description Allworx Inside&lt;BR /&gt;name 66.x.x.3 Allworx_Outside description Allworx Outside&lt;BR /&gt;name 66.x.x.2 ASA5505_Outside description ASA5505 Outside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description Trust - 192.168.0.18/30&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.0.18 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; description Untrust - 66.x.x.2/24&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address ASA5505_Outside 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description Untrust - 66.x.x.2/24&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description Trust - 192.168.0.18/30&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name xxxxxxxxxxxxxx&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service Allworx_TCP tcp&lt;BR /&gt; port-object eq 8081&lt;BR /&gt; port-object eq 8080&lt;BR /&gt;object-group service Allworx_UDP udp&lt;BR /&gt; port-object range 15000 15511&lt;BR /&gt; port-object eq 2088&lt;BR /&gt; port-object eq sip&lt;BR /&gt;access-list outside_access_in extended permit icmp any host Allworx_Outside &lt;BR /&gt;access-list outside_access_in extended permit udp any host Allworx_Outside object-group Allworx_UDP &lt;BR /&gt;access-list outside_access_in extended permit tcp any host Allworx_Outside object-group Allworx_TCP&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) Allworx_Outside Allworx_Inside netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;router eigrp 100&lt;BR /&gt; no auto-summary&lt;BR /&gt; eigrp router-id 192.168.0.18&lt;BR /&gt; eigrp stub connected&lt;BR /&gt; network 192.168.0.16 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ASA5505_Outside 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 60&lt;BR /&gt;http server session-timeout 60&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 60&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 132.236.56.250 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt;username Administrator password QbzTukvNpIQksWih encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:41cebbde244c4496766306905d39002a&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370483#M830493</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2019-03-11T16:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Port Forward Range</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370484#M830519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not see this access-list inside_access_in in the config. If this is SIP then, I don't see sip inspection either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/P&gt;&lt;P&gt; inspect sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give it a shot once done. You are correct there is no need for acl to be applied on the higher security interface by default high to low traffic is allowed on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 03:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370484#M830519</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-14T03:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Port Forward Range</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370485#M830559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry about the ACL inside_access_in.&amp;nbsp; I removed it from the config b/c I didn't think I needed it.&amp;nbsp; As for sip inspection, Allworx support told me I had to remove it in order for their product to work.&amp;nbsp; The Allworx uses sip to register to the ITSP and that works.&amp;nbsp; Call setup is fine.&amp;nbsp; It's the RTP audio that doesn't work.&amp;nbsp; I also didn't understand the need for the inside_access_in ACL governing traffic from and inside host to an outside host, that should be implicitly allowed.&amp;nbsp; Look again closely at the log entry I posted.&amp;nbsp; The ASA is blocking udp traffic coming into the inside interface, but states that the source is an inside host destined for an outside host.&amp;nbsp; That is totally backwards and makes no sense to me.&amp;nbsp; If the ASA is complaining about inbound traffic to the inside interface, I would expect the source to be outside, destination inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 03:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370485#M830559</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2010-01-14T03:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Port Forward Range</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370486#M830578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;inspection does two things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. fixes up address in the packets -&lt;/P&gt;&lt;P&gt;2. opens pin holes to allow flow on a diff. source port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, there was an acl applied on the inside interface and you do not have sip inspection enabled.&amp;nbsp; There was no acl allowing the flow and there was no inspection to automatically allow the traffic from inside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With no acl applied on the inside interface now, try the flow again and see if it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see anything wrong in the syslog.&amp;nbsp; The ACL is blocking the voice traffic going from inside to outside - due the fact acl wasn't allowing because inspection wasn't there to automatically allow the flow when the acl wasn't specifically allowing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rule if you remove inspection then you need allow permission via access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 04:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370486#M830578</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-14T04:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 Port Forward Range</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370487#M830614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so the reason why the ACL is necessary is because it is the RETURN traffic in a flow? &lt;/P&gt;&lt;P&gt;I thought there was no need to permit with an ACL traffic flowing from a high to low zone?&amp;nbsp; Is that only for traffic initiated by the inside interface? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue isn't with SIP (udp 5060), it's with the RTP traffic (udp 15000-15511).&amp;nbsp; I need to NAT the traffic on the way out from 192.168.9.9 to 66.x.x.3 and on the way back in (66.x.x.3 to 192.168.9.9).&amp;nbsp; Will the static command take care of this bi-directional flow?&amp;nbsp; Or do I need a nat (inside) / global (outside) pairing for traffic leaving the firewall, and the static for return traffic?&amp;nbsp; Should the port-object range work for this?&amp;nbsp; Or will this not work without being able to inspect the RTP traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jan 2010 05:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-port-forward-range/m-p/1370487#M830614</guid>
      <dc:creator>Scott Pickles</dc:creator>
      <dc:date>2010-01-14T05:03:59Z</dc:date>
    </item>
  </channel>
</rss>

