<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access to hosts from outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139852#M877419</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have logging enable? Using ASDM, you can trace the packet and see where the deny occurs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Jan 2009 20:12:24 GMT</pubDate>
    <dc:creator>Tshi M</dc:creator>
    <dc:date>2009-01-21T20:12:24Z</dc:date>
    <item>
      <title>Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139849#M877416</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to enable access to server on ip address: 192.168.100.30 on port 22 located in inside interface from internet (outside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have ASA 5520 Cisco Adaptive Security Appliance Software Version 8.0(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config (only relevant lines):&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 172.146.147.13 255.255.255.248 standby 172.146.147.12&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 172.146.147.1 255.255.255.248 standby 172.146.147.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.3 255.255.255.0 standby 192.168.200.2&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit ip 192.168.100.30 any&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host 172.146.147.15 eq ssh&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;global (Outside) 1 172.146.147.11 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.33.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.34.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.35.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.36.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.39.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.41.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.42.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.44.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.1.99.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.40.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 10.40.24.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.250.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.96.0 255.255.248.0&lt;/P&gt;&lt;P&gt;static (Inside,Outside) tcp 172.146.147.14 ssh 192.168.100.30 ssh netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;access-group DMZ_access_in in interface DMZ&lt;/P&gt;&lt;P&gt;access-group Inside_access_in in interface Inside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 172.146.147.14 1&lt;/P&gt;&lt;P&gt;route Inside 10.0.0.0 255.0.0.0 192.168.200.1 1&lt;/P&gt;&lt;P&gt;route Outside 172.16.101.72 255.255.255.252 195.146.147.14 1&lt;/P&gt;&lt;P&gt;route Inside 192.168.0.0 255.255.0.0 192.168.200.1 1&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i type telnet 172.146.147.15 22 from public internet i cant open port 22....so i dont know - is something missing or wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139849#M877416</guid>
      <dc:creator>lubosbella</dc:creator>
      <dc:date>2019-03-11T14:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139850#M877417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"access-list Outside_access_in extended permit tcp any host 172.146.147.15 eq ssh"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"static (Inside,Outside) tcp 172.146.147.14 ssh 192.168.100.30 ssh netmask 255.255.255.255"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless this is a typo, the access-list has to be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; access-list Outside_access_in extended permit tcp any host 172.146.147.14 eq ssh (not 172.146.147.15)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 15:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139850#M877417</guid>
      <dc:creator>Mo'ath Al Rawashdeh</dc:creator>
      <dc:date>2009-01-21T15:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139851#M877418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry i copied bad line....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right statements are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit tcp any host 172.146.147.15 eq ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Inside,Outside) tcp 172.146.147.15 ssh 192.168.100.30 ssh netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but this is not working ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestion? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 19:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139851#M877418</guid>
      <dc:creator>lubosbella</dc:creator>
      <dc:date>2009-01-21T19:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139852#M877419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have logging enable? Using ASDM, you can trace the packet and see where the deny occurs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 20:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139852#M877419</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-01-21T20:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139853#M877420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No logging is not enable for now....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe can help this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Outside_access_in line 7 extended permit tcp any host 172.146.147.15 eq ssh (hitcnt=0) 0xb6f77e86&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_access_in line 29 extended permit ip host 192.168.100.30 any (hitcnt=77) 0x4db26635&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show xlate:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAT Global 172.146.147.15(22) Local 192.168.100.30(22)&lt;/P&gt;&lt;P&gt;PAT Global 172.146.147.11(30) Local 192.168.100.30(123)&lt;/P&gt;&lt;P&gt;PAT Global 172.146.147.11(34204) Local 10.1.44.51(52658)&lt;/P&gt;&lt;P&gt;....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 21:25:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139853#M877420</guid>
      <dc:creator>lubosbella</dc:creator>
      <dc:date>2009-01-21T21:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139854#M877421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you are not hitting your PAT address. hit counts on 172.146.147.15 is zero. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 21:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139854#M877421</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-01-21T21:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139855#M877422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;below is your outside interface config&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0 &lt;/P&gt;&lt;P&gt;nameif Outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 172.146.147.13 255.255.255.248 standby 172.146.147.12 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are using 255.255.255.248 as the subnet which makes 172.146.147.15 as your broadcast address. That being said, you won't be able to access it. You need to use a different address in that range. the available addresses are 172.146.147.9 to 172.146.147.14.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Jan 2009 21:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139855#M877422</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-01-21T21:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139856#M877424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much...it`s working ;). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2009 12:41:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139856#M877424</guid>
      <dc:creator>lubosbella</dc:creator>
      <dc:date>2009-01-22T12:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: Access to hosts from outside</title>
      <link>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139857#M877426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am glad to here!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Jan 2009 12:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-hosts-from-outside/m-p/1139857#M877426</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-01-22T12:45:02Z</dc:date>
    </item>
  </channel>
</rss>

