<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS, 881w, port forwarding/redirecting www in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375410#M857236</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to delete from the command line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no ip nat inside source static tcp 192.168.1.4 80 64.233.136.114 8888&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Feb 2010 05:39:23 GMT</pubDate>
    <dc:creator>johnd2310</dc:creator>
    <dc:date>2010-02-12T05:39:23Z</dc:date>
    <item>
      <title>IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375402#M857220</link>
      <description>&lt;P&gt;I'm in over my head with this Cisco router we have (881w).&amp;nbsp; If anyone&amp;nbsp; has a recommendation for some dummy-level reading, I'd appreciate a link&amp;nbsp; or title.&amp;nbsp; Cisco documentation presumes a level of knowledge which I&amp;nbsp; don't have.&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt; My specific problem right now is that I'm trying to port&amp;nbsp; forward/redirect external web access using a specific port to an&amp;nbsp; internal device using the standard www port 80.&amp;nbsp; Details:&lt;BR /&gt; &lt;BR /&gt; External IP: 1.2.3.4&lt;BR /&gt; External hostname: alpha.example.com&lt;BR /&gt; External port: 8888&lt;BR /&gt; &lt;BR /&gt; Internal IP: 192.168.1.2&lt;BR /&gt; Internal port: 80&lt;BR /&gt; &lt;BR /&gt; So, I'm trying to hit &lt;SPAN class="active_link"&gt;&lt;A class="jive-link-external-small" href="http://alpha.example.com:8888" target="_blank"&gt;http://alpha.example.com:8888&lt;/A&gt;&lt;/SPAN&gt; from the web and pull&amp;nbsp; the site from 192.168.1.2.&amp;nbsp; (Incidentally, the direct IP access works&amp;nbsp; internally on the LAN with no problems.)&amp;nbsp; &lt;BR /&gt; &lt;BR /&gt; I've added the following lines to the config.&amp;nbsp; They are just copies of&amp;nbsp; sections that work for opening up remote desktop for some users, the&amp;nbsp; only difference being that I'm using the same port numbers externally&amp;nbsp; and internally for that (e.g. alpha.example.com:5555 =&amp;gt;&amp;nbsp; 192.168.1.200:5555).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="alt2" dir="ltr" style="margin: 0px; padding: 6px; border: 1px inset; width: 750px; height: 226px; text-align: left; overflow: auto;"&gt;ip port-map user-protocol--6 port tcp 8888 description Lacie-web-access&lt;BR /&gt;!...&lt;BR /&gt;class-map type inspect match-any Lacie-nat-web-access&lt;BR /&gt; match protocol user-protocol--6&lt;BR /&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-6&lt;BR /&gt; match class-map Lacie-nat-web-access&lt;BR /&gt; match access-group name Lacie-web-access&lt;BR /&gt;!...&lt;BR /&gt;ip access-list extended Lacie-web-access&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 192.168.1.2&lt;BR /&gt;!...&lt;BR /&gt;ip nat inside source static tcp 192.168.1.2 80 1.2.3.4 8888 extendable&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, this works for remote desktop with matching port numbers, so I'm&amp;nbsp; guessing there may be some other http/www traffic restriction that I&amp;nbsp; don't recognize.&amp;nbsp; FWIW, I can't reconfigure the internal device's web&amp;nbsp; port, so I can't test whether the port number mismatch is an issue.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375402#M857220</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2019-03-11T17:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375403#M857222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a test, I've set up Apache on another internal box and changed the listening port to match the incoming port (so, 8888 =&amp;gt; 8888).&amp;nbsp; After changing the IP in the config to that box (192.168.1.4), I still have the same problem.&amp;nbsp; Am I correct in assuming this means it's an http traffic rule that's keeping me out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also noticed this in the translations list (still using the "new" IP and port for testing) while attemptimg to access the test box:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE class="alt2" dir="ltr" style="border: 1px inset; margin: 0px; padding: 6px; overflow: auto; width: 750px; height: 226px; text-align: left;"&gt;ant#sh ip nat tr&lt;BR /&gt;&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;&lt;BR /&gt;tcp 1.2.3.4:8888&amp;nbsp;&amp;nbsp; 192.168.1.4:8888&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.102:1366&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.102:1366&lt;BR /&gt;&lt;BR /&gt;tcp 1.2.3.4:8888&amp;nbsp;&amp;nbsp; 192.168.1.4:8888&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think I specifically mentioned it before, but the browser errors are "connection timed out".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Feb 2010 21:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375403#M857222</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-11T21:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375404#M857224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does your external intereface access list allow traffic to 1.2.3.4 port 8888?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Feb 2010 23:45:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375404#M857224</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2010-02-11T23:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375405#M857226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, it wasn't specifically listed, so I did this:&lt;/P&gt;&lt;P&gt;permit tcp any host 192.168.1.4 eq 8888&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That worked.&amp;nbsp; Just for kicks, I tried again with the previous ip permission:&lt;/P&gt;&lt;P&gt;permit ip any host 192.168.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That worked this time.&amp;nbsp; The difference was that I tested it from outside the network unlike my previous post's issue where I was testing from inside.&amp;nbsp; Ugh. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also did a little more testing while I had that much working.&amp;nbsp; It seems that any port number works as long as the the internal and external ports match.&amp;nbsp; For example, 8888 works, 8765 works, 8880 works, etc.&amp;nbsp; That wouldn't be a problem except, as stated in the original post, the actual device I'm trying to get this working for doesn't allow the http port to be modified.&amp;nbsp; So, I need to be able to redirect a non-standard port to port 80.&amp;nbsp; Is my problem with how I've handled this line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.1.4 80 1.2.3.4 8888 extendable&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 02:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375405#M857226</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-12T02:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375406#M857228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That command should work. Please post a scrubbed config of the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 03:25:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375406#M857228</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2010-02-12T03:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375407#M857230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've removed the crypto sections and munged a few other fields.&amp;nbsp; Apologies if this is still too much. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.4&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;!&lt;BR /&gt;hostname ant&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;security authentication failure rate 3 log&lt;BR /&gt;security passwords min-length 6&lt;BR /&gt;logging message-counter syslog&lt;BR /&gt;logging buffered 51200&lt;BR /&gt;logging console critical&lt;BR /&gt;enable secret 5 *hash*&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login local_authen local&lt;BR /&gt;aaa authentication login ciscocp_vpn_xauth_ml_1 local&lt;BR /&gt;aaa authorization exec local_author local &lt;BR /&gt;aaa authorization network ciscocp_vpn_group_ml_1 local &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;clock timezone Chicago -6&lt;BR /&gt;clock summer-time Chicago date Apr 6 2003 2:00 Oct 26 2003 2:00&lt;BR /&gt;service-module wlan-ap 0 bootimage autonomous&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip source-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.1.1&lt;BR /&gt;ip dhcp excluded-address 10.0.0.1 10.0.0.99&lt;BR /&gt;ip dhcp excluded-address 10.0.0.121 10.0.0.254&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool sdm-pool1&lt;BR /&gt;&amp;nbsp;&amp;nbsp; import all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; dns-server 1.2.3.10 1.2.3.11 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; default-router 192.168.1.1 &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip cef&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip domain name eapdd.com&lt;BR /&gt;ip name-server 1.2.3.10&lt;BR /&gt;ip name-server 1.2.3.11&lt;BR /&gt;ip port-map user-protocol--2 port tcp 8833 description RDP-2&lt;BR /&gt;ip port-map user-protocol--3 port tcp 8829 description RDP-3&lt;BR /&gt;ip port-map user-protocol--1 port tcp 8832 description RDP-1&lt;BR /&gt;ip port-map user-protocol--6 port tcp 8888 description Lacie-web-access&lt;BR /&gt;ip port-map user-protocol--4 port tcp 8830 description RDP-4&lt;BR /&gt;ip port-map user-protocol--5 port tcp 8828 description SSH-Fileserver&lt;BR /&gt;!&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;username myadmin privilege 15 secret 5 *hash*&lt;BR /&gt;! &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip tcp synwait-time 10&lt;BR /&gt;ip ftp username cisco881w&lt;BR /&gt;ip ftp password 7 *hash*&lt;BR /&gt;ip ssh time-out 60&lt;BR /&gt;ip ssh authentication-retries 2&lt;BR /&gt;!&lt;BR /&gt;class-map type inspect match-any Lacie-nat-web-access&lt;BR /&gt; match protocol user-protocol--6&lt;BR /&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-6&lt;BR /&gt; match class-map Lacie-nat-web-access&lt;BR /&gt; match access-group name Lacie-web-access&lt;BR /&gt;class-map type inspect match-any SDM_HTTPS&lt;BR /&gt; match access-group name SDM_HTTPS&lt;BR /&gt;class-map type inspect match-any SDM_SSH&lt;BR /&gt; match access-group name SDM_SSH&lt;BR /&gt;class-map type inspect match-any SDM_SHELL&lt;BR /&gt; match access-group name SDM_SHELL&lt;BR /&gt;class-map type inspect match-any sdm-cls-access&lt;BR /&gt; match class-map SDM_HTTPS&lt;BR /&gt; match class-map SDM_SSH&lt;BR /&gt; match class-map SDM_SHELL&lt;BR /&gt;class-map type inspect match-any SSH-nat-Fileserver&lt;BR /&gt; match protocol user-protocol--5&lt;BR /&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-4&lt;BR /&gt; match class-map SSH-nat-Fileserver&lt;BR /&gt; match access-group name SSH-Fileserver&lt;BR /&gt;class-map type inspect imap match-any ccp-app-imap&lt;BR /&gt; match&amp;nbsp; invalid-command&lt;BR /&gt;class-map type inspect match-any RDP-nat-4&lt;BR /&gt; match protocol user-protocol--4&lt;BR /&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-3&lt;BR /&gt; match class-map RDP-nat-4&lt;BR /&gt; match access-group name RDP-4&lt;BR /&gt;class-map type inspect match-any ccp-cls-protocol-p2p&lt;BR /&gt; match protocol edonkey signature&lt;BR /&gt; match protocol gnutella signature&lt;BR /&gt; match protocol kazaa2 signature&lt;BR /&gt; match protocol fasttrack signature&lt;BR /&gt; match protocol bittorrent signature&lt;BR /&gt;class-map type inspect match-any RDP-nat-3&lt;BR /&gt; match protocol user-protocol--3&lt;BR /&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-2&lt;BR /&gt; match class-map RDP-nat-3&lt;BR /&gt; match access-group name RDP-3&lt;BR /&gt;class-map type inspect match-all sdm-nat-user-protocol--1-1&lt;BR /&gt; match access-group 102&lt;BR /&gt; match protocol user-protocol--1&lt;BR /&gt;class-map type inspect match-any RDP-nat-2&lt;BR /&gt; match protocol user-protocol--2&lt;BR /&gt;class-map type inspect match-all sdm-cls-sdm-pol-NATOutsideToInside-1-1&lt;BR /&gt; match class-map RDP-nat-2&lt;BR /&gt; match access-group name RDP-2&lt;BR /&gt;class-map type inspect match-any SDM_AH&lt;BR /&gt; match access-group name SDM_AH&lt;BR /&gt;class-map type inspect match-any MySymantec&lt;BR /&gt; match access-group name MySymantec&lt;BR /&gt;class-map type inspect match-any CCP-Voice-permit&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol skinny&lt;BR /&gt; match protocol sip&lt;BR /&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;BR /&gt; match protocol cuseeme&lt;BR /&gt; match protocol dns&lt;BR /&gt; match protocol ftp&lt;BR /&gt; match protocol h323&lt;BR /&gt; match protocol https&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol imap&lt;BR /&gt; match protocol pop3&lt;BR /&gt; match protocol netshow&lt;BR /&gt; match protocol shell&lt;BR /&gt; match protocol realmedia&lt;BR /&gt; match protocol rtsp&lt;BR /&gt; match protocol smtp extended&lt;BR /&gt; match protocol sql-net&lt;BR /&gt; match protocol streamworks&lt;BR /&gt; match protocol tftp&lt;BR /&gt; match protocol vdolive&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-all ccp-insp-traffic&lt;BR /&gt; match class-map ccp-cls-insp-traffic&lt;BR /&gt;class-map type inspect match-any SDM_IP&lt;BR /&gt; match access-group name SDM_IP&lt;BR /&gt;class-map type inspect gnutella match-any ccp-app-gnutella&lt;BR /&gt; match&amp;nbsp; file-transfer &lt;BR /&gt;class-map type inspect match-any SDM_ESP&lt;BR /&gt; match access-group name SDM_ESP&lt;BR /&gt;class-map type inspect match-any SDM_EASY_VPN_SERVER_TRAFFIC&lt;BR /&gt; match protocol isakmp&lt;BR /&gt; match protocol ipsec-msft&lt;BR /&gt; match class-map SDM_AH&lt;BR /&gt; match class-map SDM_ESP&lt;BR /&gt;class-map type inspect match-all SDM_EASY_VPN_SERVER_PT&lt;BR /&gt; match class-map SDM_EASY_VPN_SERVER_TRAFFIC&lt;BR /&gt;class-map type inspect msnmsgr match-any ccp-app-msn-otherservices&lt;BR /&gt; match&amp;nbsp; service any &lt;BR /&gt;class-map type inspect ymsgr match-any ccp-app-yahoo-otherservices&lt;BR /&gt; match&amp;nbsp; service any &lt;BR /&gt;class-map type inspect match-any MY-TFTP&lt;BR /&gt; match protocol tftp&lt;BR /&gt;class-map type inspect match-all sdm-cls-ccp-inspect-1&lt;BR /&gt; match class-map MY-TFTP&lt;BR /&gt; match access-group name internal-tftp&lt;BR /&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;BR /&gt; match protocol icmp&lt;BR /&gt; match protocol tcp&lt;BR /&gt; match protocol udp&lt;BR /&gt;class-map type inspect match-any ccp-cls-protocol-im&lt;BR /&gt; match protocol ymsgr yahoo-servers&lt;BR /&gt; match protocol msnmsgr msn-servers&lt;BR /&gt; match protocol aol aol-servers&lt;BR /&gt;class-map type inspect aol match-any ccp-app-aol-otherservices&lt;BR /&gt; match&amp;nbsp; service any &lt;BR /&gt;class-map type inspect match-all ccp-protocol-pop3&lt;BR /&gt; match protocol pop3&lt;BR /&gt;class-map type inspect pop3 match-any ccp-app-pop3&lt;BR /&gt; match&amp;nbsp; invalid-command&lt;BR /&gt;class-map type inspect match-all sdm-access&lt;BR /&gt; match class-map sdm-cls-access&lt;BR /&gt; match access-group 101&lt;BR /&gt;class-map type inspect kazaa2 match-any ccp-app-kazaa2&lt;BR /&gt; match&amp;nbsp; file-transfer &lt;BR /&gt;class-map type inspect match-all ccp-protocol-p2p&lt;BR /&gt; match class-map ccp-cls-protocol-p2p&lt;BR /&gt;class-map type inspect msnmsgr match-any ccp-app-msn&lt;BR /&gt; match&amp;nbsp; service text-chat &lt;BR /&gt;class-map type inspect ymsgr match-any ccp-app-yahoo&lt;BR /&gt; match&amp;nbsp; service text-chat &lt;BR /&gt;class-map type inspect match-all ccp-protocol-im&lt;BR /&gt; match class-map ccp-cls-protocol-im&lt;BR /&gt;class-map type inspect match-all ccp-icmp-access&lt;BR /&gt; match class-map ccp-cls-icmp-access&lt;BR /&gt;class-map type inspect match-all ccp-invalid-src&lt;BR /&gt; match access-group 100&lt;BR /&gt;class-map type inspect http match-any ccp-app-httpmethods&lt;BR /&gt; match&amp;nbsp; request method bcopy&lt;BR /&gt; match&amp;nbsp; request method bdelete&lt;BR /&gt; match&amp;nbsp; request method bmove&lt;BR /&gt; match&amp;nbsp; request method bpropfind&lt;BR /&gt; match&amp;nbsp; request method bproppatch&lt;BR /&gt; match&amp;nbsp; request method connect&lt;BR /&gt; match&amp;nbsp; request method copy&lt;BR /&gt; match&amp;nbsp; request method delete&lt;BR /&gt; match&amp;nbsp; request method edit&lt;BR /&gt; match&amp;nbsp; request method getattribute&lt;BR /&gt; match&amp;nbsp; request method getattributenames&lt;BR /&gt; match&amp;nbsp; request method getproperties&lt;BR /&gt; match&amp;nbsp; request method index&lt;BR /&gt; match&amp;nbsp; request method lock&lt;BR /&gt; match&amp;nbsp; request method mkcol&lt;BR /&gt; match&amp;nbsp; request method mkdir&lt;BR /&gt; match&amp;nbsp; request method move&lt;BR /&gt; match&amp;nbsp; request method notify&lt;BR /&gt; match&amp;nbsp; request method options&lt;BR /&gt; match&amp;nbsp; request method poll&lt;BR /&gt; match&amp;nbsp; request method propfind&lt;BR /&gt; match&amp;nbsp; request method proppatch&lt;BR /&gt; match&amp;nbsp; request method put&lt;BR /&gt; match&amp;nbsp; request method revadd&lt;BR /&gt; match&amp;nbsp; request method revlabel&lt;BR /&gt; match&amp;nbsp; request method revlog&lt;BR /&gt; match&amp;nbsp; request method revnum&lt;BR /&gt; match&amp;nbsp; request method save&lt;BR /&gt; match&amp;nbsp; request method search&lt;BR /&gt; match&amp;nbsp; request method setattribute&lt;BR /&gt; match&amp;nbsp; request method startrev&lt;BR /&gt; match&amp;nbsp; request method stoprev&lt;BR /&gt; match&amp;nbsp; request method subscribe&lt;BR /&gt; match&amp;nbsp; request method trace&lt;BR /&gt; match&amp;nbsp; request method unedit&lt;BR /&gt; match&amp;nbsp; request method unlock&lt;BR /&gt; match&amp;nbsp; request method unsubscribe&lt;BR /&gt;class-map type inspect edonkey match-any ccp-app-edonkey&lt;BR /&gt; match&amp;nbsp; file-transfer &lt;BR /&gt; match&amp;nbsp; text-chat &lt;BR /&gt; match&amp;nbsp; search-file-name &lt;BR /&gt;class-map type inspect http match-any ccp-http-blockparam&lt;BR /&gt; match&amp;nbsp; request port-misuse im&lt;BR /&gt; match&amp;nbsp; request port-misuse p2p&lt;BR /&gt; match&amp;nbsp; req-resp protocol-violation&lt;BR /&gt;class-map type inspect edonkey match-any ccp-app-edonkeydownload&lt;BR /&gt; match&amp;nbsp; file-transfer &lt;BR /&gt;class-map type inspect match-all ccp-protocol-imap&lt;BR /&gt; match protocol imap&lt;BR /&gt;class-map type inspect aol match-any ccp-app-aol&lt;BR /&gt; match&amp;nbsp; service text-chat &lt;BR /&gt;class-map type inspect edonkey match-any ccp-app-edonkeychat&lt;BR /&gt; match&amp;nbsp; search-file-name &lt;BR /&gt; match&amp;nbsp; text-chat &lt;BR /&gt;class-map type inspect http match-any ccp-http-allowparam&lt;BR /&gt; match&amp;nbsp; request port-misuse tunneling&lt;BR /&gt;class-map type inspect match-all ccp-protocol-http&lt;BR /&gt; match protocol http&lt;BR /&gt;class-map type inspect fasttrack match-any ccp-app-fasttrack&lt;BR /&gt; match&amp;nbsp; file-transfer &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ccp-permit-icmpreply&lt;BR /&gt; class type inspect ccp-icmp-access&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect p2p ccp-action-app-p2p&lt;BR /&gt; class type inspect edonkey ccp-app-edonkeychat&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect edonkey ccp-app-edonkeydownload&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect fasttrack ccp-app-fasttrack&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect gnutella ccp-app-gnutella&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect kazaa2 ccp-app-kazaa2&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt;policy-map type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt; class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-nat-user-protocol--1-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-3&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-2&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-4&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-6&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect im ccp-action-app-im&lt;BR /&gt; class type inspect aol ccp-app-aol&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect msnmsgr ccp-app-msn&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect ymsgr ccp-app-yahoo&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt; class type inspect aol ccp-app-aol-otherservices&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt; class type inspect msnmsgr ccp-app-msn-otherservices&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt; class type inspect ymsgr ccp-app-yahoo-otherservices&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;policy-map type inspect imap ccp-action-imap&lt;BR /&gt; class type inspect imap ccp-app-imap&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;policy-map type inspect pop3 ccp-action-pop3&lt;BR /&gt; class type inspect pop3 ccp-app-pop3&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;policy-map type inspect ccp-inspect&lt;BR /&gt; class type inspect sdm-cls-ccp-inspect-1&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-invalid-src&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt; class type inspect ccp-protocol-http&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect ccp-protocol-imap&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp; service-policy imap ccp-action-imap&lt;BR /&gt; class type inspect ccp-protocol-pop3&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp; service-policy pop3 ccp-action-pop3&lt;BR /&gt; class type inspect ccp-protocol-p2p&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp; service-policy p2p ccp-action-app-p2p&lt;BR /&gt; class type inspect ccp-protocol-im&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt;&amp;nbsp; service-policy im ccp-action-app-im&lt;BR /&gt; class type inspect ccp-insp-traffic&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class type inspect CCP-Voice-permit&lt;BR /&gt;&amp;nbsp; inspect &lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt;policy-map type inspect http ccp-action-app-http&lt;BR /&gt; class type inspect http ccp-http-blockparam&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt; class type inspect http ccp-app-httpmethods&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt; class type inspect http ccp-http-allowparam&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp; allow&lt;BR /&gt;policy-map type inspect ccp-permit&lt;BR /&gt; class type inspect SDM_EASY_VPN_SERVER_PT&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;policy-map type inspect sdm-permit-ip&lt;BR /&gt; class type inspect SDM_IP&lt;BR /&gt;&amp;nbsp; pass&lt;BR /&gt; class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;!&lt;BR /&gt;zone security out-zone&lt;BR /&gt;zone security in-zone&lt;BR /&gt;zone security ezvpn-zone&lt;BR /&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;BR /&gt; service-policy type inspect ccp-permit-icmpreply&lt;BR /&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;BR /&gt; service-policy type inspect ccp-inspect&lt;BR /&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;BR /&gt; service-policy type inspect ccp-permit&lt;BR /&gt;zone-pair security sdm-zp-NATOutsideToInside-1 source out-zone destination in-zone&lt;BR /&gt; service-policy type inspect sdm-pol-NATOutsideToInside-1&lt;BR /&gt;zone-pair security sdm-zp-in-ezvpn1 source in-zone destination ezvpn-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security sdm-zp-out-ezpn1 source out-zone destination ezvpn-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security sdm-zp-ezvpn-out1 source ezvpn-zone destination out-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;zone-pair security sdm-zp-ezvpn-in1 source ezvpn-zone destination in-zone&lt;BR /&gt; service-policy type inspect sdm-permit-ip&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Loopback0&lt;BR /&gt; ip address 192.168.8.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Null0&lt;BR /&gt; no ip unreachables&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet3&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet4&lt;BR /&gt; description $ES_WAN$$FW_OUTSIDE$&lt;BR /&gt; ip address 1.2.3.4 255.255.255.0&lt;BR /&gt; ip verify unicast reverse-path&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security out-zone&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt; snmp trap ip verify drop-rate&lt;BR /&gt;!&lt;BR /&gt;interface Virtual-Template1 type tunnel&lt;BR /&gt; ip unnumbered Loopback0&lt;BR /&gt; zone-member security ezvpn-zone&lt;BR /&gt; tunnel mode ipsec ipv4&lt;BR /&gt; tunnel protection ipsec profile CiscoCP_Profile1&lt;BR /&gt;!&lt;BR /&gt;interface wlan-ap0&lt;BR /&gt; description Service module interface to manage the embedded AP&lt;BR /&gt; ip unnumbered Vlan1&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip flow ingress&lt;BR /&gt; arp timeout 0&lt;BR /&gt;!&lt;BR /&gt;interface Wlan-GigabitEthernet0&lt;BR /&gt; description Internal switch interface connecting to the embedded AP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; ip access-group Port25Blocker out&lt;BR /&gt; no ip redirects&lt;BR /&gt; no ip unreachables&lt;BR /&gt; no ip proxy-arp&lt;BR /&gt; ip nbar protocol-discovery&lt;BR /&gt; ip flow ingress&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt; ip tcp adjust-mss 1452&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; no ip address&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; zone-member security in-zone&lt;BR /&gt;!&lt;BR /&gt;ip local pool SDM_POOL_1 192.168.1.81 192.168.1.89&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 64.233.136.113&lt;BR /&gt;ip http server&lt;BR /&gt;ip http access-class 2&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;BR /&gt;!&lt;BR /&gt;ip flow-top-talkers&lt;BR /&gt; top 20&lt;BR /&gt; sort-by bytes&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list 1 interface FastEthernet4 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.1.111 8828 1.2.3.4 8828 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.101 8829 1.2.3.4 8829 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.102 8830 1.2.3.4 8830 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.105 8832 1.2.3.4 8832 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.106 8833 1.2.3.4 8833 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.1.4 80 1.2.3.4 8888 extendable&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended Lacie-web-access&lt;BR /&gt; remark Allow web access to Lacie device&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 192.168.1.4&lt;BR /&gt; permit tcp any host 192.168.1.4 eq 8888&lt;BR /&gt;ip access-list extended MySymantec&lt;BR /&gt; remark 20090902 Opening for SymantecAV. Manually cloned from SDM_SSH.&lt;BR /&gt; permit tcp 192.168.1.0 0.0.0.255 192.168.1.0 0.0.0.255 eq 8014&lt;BR /&gt; permit tcp 192.168.1.0 0.0.0.255 192.168.1.0 0.0.0.255 eq 8443&lt;BR /&gt; permit tcp 192.168.1.0 0.0.0.255 192.168.1.0 0.0.0.255 eq 9090&lt;BR /&gt;ip access-list extended Port25Blocker&lt;BR /&gt; remark Block smtp to prevent virus spamming.&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; deny&amp;nbsp;&amp;nbsp; tcp any any eq smtp log&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended RDP-2&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 192.168.1.106&lt;BR /&gt;ip access-list extended RDP-3&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 192.168.1.101&lt;BR /&gt;ip access-list extended RDP-4&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 192.168.1.102&lt;BR /&gt;ip access-list extended SDM_AH&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit ahp any any&lt;BR /&gt;ip access-list extended SDM_ESP&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit esp any any&lt;BR /&gt;ip access-list extended SDM_HTTPS&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq 443&lt;BR /&gt;ip access-list extended SDM_IP&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit ip any any&lt;BR /&gt;ip access-list extended SDM_SHELL&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq cmd&lt;BR /&gt;ip access-list extended SDM_SSH&lt;BR /&gt; remark CCP_ACL Category=1&lt;BR /&gt; permit tcp any any eq 22&lt;BR /&gt;ip access-list extended SSH-Fileserver&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip any host 192.168.1.111&lt;BR /&gt;ip access-list extended internal-tftp&lt;BR /&gt; remark CCP_ACL Category=128&lt;BR /&gt; permit ip host 192.168.1.1 host 192.168.1.102&lt;BR /&gt; permit ip host 192.168.5.1 host 192.168.1.102&lt;BR /&gt;!&lt;BR /&gt;logging trap debugging&lt;BR /&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;BR /&gt;access-list 1 remark CCP_ACL Category=2&lt;BR /&gt;access-list 1 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 2 remark HTTP Access-class list&lt;BR /&gt;access-list 2 remark CCP_ACL Category=1&lt;BR /&gt;access-list 2 permit 192.168.1.0 0.0.0.255&lt;BR /&gt;access-list 2 deny&amp;nbsp;&amp;nbsp; any&lt;BR /&gt;access-list 100 permit ip 1.2.3.0 0.0.0.255 any&lt;BR /&gt;access-list 101 remark CCP_ACL Category=128&lt;BR /&gt;access-list 101 permit ip any any&lt;BR /&gt;access-list 102 remark CCP_ACL Category=0&lt;BR /&gt;access-list 102 permit ip any host 192.168.1.105&lt;BR /&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt; no modem enable&lt;BR /&gt; transport output telnet&lt;BR /&gt;line aux 0&lt;BR /&gt; transport output telnet&lt;BR /&gt;line 2&lt;BR /&gt; no activation-character&lt;BR /&gt; no exec&lt;BR /&gt; transport preferred none&lt;BR /&gt; transport input all&lt;BR /&gt;line vty * *&lt;BR /&gt; authorization exec local_author&lt;BR /&gt; login authentication local_authen&lt;BR /&gt; transport input telnet ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler max-task-time 5000&lt;BR /&gt;scheduler allocate 4000 1000&lt;BR /&gt;scheduler interval 500&lt;BR /&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 03:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375407#M857230</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-12T03:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375408#M857232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Have you tried changing "ip nat inside source static tcp 192.168.1.4 80 1.2.3.4 8888 extendable" to "ip nat inside source static tcp 192.168.1.4 80 FastEthernet4 8888"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 04:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375408#M857232</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2010-02-12T04:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375409#M857234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just tried that, and I've also previous tried&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.4 80 64.233.136.114 8888&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.4 80 interface FastEthernet4 8888 extendable&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.4 80 interface FastEthernet4 8888&lt;/P&gt;&lt;P&gt;and now&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.4 80 FastEthernet4 8888&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.4 80 FastEthernet4 8888 extendable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But for all of them, the conf replace tftp always dies and rolls back, failing to load that single line.&amp;nbsp; I saw that format used on some of the places I've been reading, but mine doesn't like it for some reason.&amp;nbsp; I've even tried removing just the "extendable", but it still fails to load (again, through the conf replace tftp process).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 04:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375409#M857234</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-12T04:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375410#M857236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should be able to delete from the command line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no ip nat inside source static tcp 192.168.1.4 80 64.233.136.114 8888&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 05:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375410#M857236</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2010-02-12T05:39:23Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375411#M857238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, doing it from the CLI does allow me to remove and add the lines.&amp;nbsp; So now it has:&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.4 80 interface FastEthernet4 8888&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, it still doesn't work for the redirection 8888 =&amp;gt; 80.&amp;nbsp; But it does still work when the same port number is used on both sides 8888 =&amp;gt; 8888. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Feb 2010 14:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375411#M857238</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-12T14:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375412#M857239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm still getting the same behavior.&amp;nbsp; Does anyone have any suggestions for resolving this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Feb 2010 15:17:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375412#M857239</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-13T15:17:31Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375413#M857241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If no one has suggestions for fixing this, are there any recommendations for forums (or anywhere else) that may be able to help?&amp;nbsp; Maybe I've misunderstood the purpose of this forum.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Feb 2010 15:49:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375413#M857241</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-15T15:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375414#M857244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"However, it still doesn't work for the redirection 8888 =&amp;gt; 80.&amp;nbsp; But it does still work when the same port number is used on both sides 8888 =&amp;gt; 8888."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If someone is coming from the outside hitting port 8888 and that is sent to your internal server on the same port and it works then port forwarding works.&lt;/P&gt;&lt;P&gt;If it still breaks when you use port 80 to translate 8888 then I could guess that the internal sevrer does not work or listen on port 80. I would assume that portforwarding does not selectively forward port 8888 to 8888 correctly and 8888 to 80 incorrectly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This forum like any other forum is best effort, I would suggest opening a case with TAC if there are issues the forum cannot address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Feb 2010 18:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375414#M857244</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-02-15T18:10:20Z</dc:date>
    </item>
    <item>
      <title>Re: IOS, 881w, port forwarding/redirecting www</title>
      <link>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375415#M857246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can confirm that the test web server does indeed work when configured for port 80 - from inside the network when using the internal IP directly.&amp;nbsp; Same for any port I've used for testing.&amp;nbsp; A little more testing seems to show that &lt;EM&gt;any&lt;/EM&gt; "cross-port" forward/redirect does not work, though.&amp;nbsp; For example, 8888 =&amp;gt; 8765 fails the same as 8888 =&amp;gt; 80. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've found a link for opening a case, so I'll try that route.&amp;nbsp; Will update here with whatever information I receive.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Feb 2010 18:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ios-881w-port-forwarding-redirecting-www/m-p/1375415#M857246</guid>
      <dc:creator>tomws1787</dc:creator>
      <dc:date>2010-02-15T18:24:42Z</dc:date>
    </item>
  </channel>
</rss>

