<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa5505 / Port forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110357#M878320</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After further testing, I realize that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ensures that all my outgoing connections are translated to outside vlan's address and that's why it works. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hooray &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Erik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 04 Jan 2009 23:28:59 GMT</pubDate>
    <dc:creator>godinerik</dc:creator>
    <dc:date>2009-01-04T23:28:59Z</dc:date>
    <item>
      <title>asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110348#M878304</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using a 5505 in routed mode.  I currently have the following nat, global and static statements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# show run nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Firewall# show run global&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 74.213.XXX.XXX 192.168.100.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plus a few more internal IPs routed to different external IPs.   As it stands, each internal IP has it's own external IP.  Translation occurs between the internal and the internal IPs, ports remaining unchanged.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the above external IP, one exception needs to be made.  I'd like to have port 12345 re-directed to 192.168.100.2 port 22 (so in other words I'd like to close port 22 to the public and instead use a high-numbered port)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the other ports can remain the same.  I've already tried the obvious (adding another static entry) but I get an error message saying it overlaps with an existing entry.  I've even tried assigning another internal IP to the host and creating a new NATid, but I still run into the same problem.  Surely this goal doesn't require it's own external IP!?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110348#M878304</guid>
      <dc:creator>godinerik</dc:creator>
      <dc:date>2019-03-11T14:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110349#M878306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since your using 1-to-1 NATs it will require a new public IP. Try using a new public IP, but doing a port translation-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 74.213.X.Y 12345 192.168.100.X 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then add other high ports pointing to other boxes (but the same public IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 74.213.X.Y 23456 192.168.100.Z 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 74.213.X.Y 34567 192.168.100.A 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Dec 2008 14:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110349#M878306</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-12-30T14:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110350#M878308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Collin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Dec 2008 19:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110350#M878308</guid>
      <dc:creator>godinerik</dc:creator>
      <dc:date>2008-12-30T19:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110351#M878311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why do need to waste extra public IP addresses for that?  There is a much simpler way &lt;/P&gt;&lt;P&gt;to accomplish this.  It's called policy NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Private host IP:   192.168.100.2&lt;/P&gt;&lt;P&gt;Public NAT IP:	   1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Objective:  you want to NAT 192.168.100.2 to 1.2.3.4 and keep everything the same on the &lt;/P&gt;&lt;P&gt;port usage except that you want to port 12345 for IP address 1.2.3.4 to be translated to&lt;/P&gt;&lt;P&gt;port 22 on 192.168.100.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you have to read the syntax on the ASA for this.  I do not have one in front of me &lt;/P&gt;&lt;P&gt;but I will use Checkpoint NAT as an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule #  Src	 Dst	   Service      Trans-Src   	Trans-Dst       Service&lt;/P&gt;&lt;P&gt;  1     Any     1.2.3.4	   12345	Original	192.168.100.2	22&lt;/P&gt;&lt;P&gt;  2     Any	1.2.3.4    any          Original        192.168.100.2   Original&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The idea here is that the NAT rule #1 will take care of the SSH translation while rule #2 &lt;/P&gt;&lt;P&gt;will take care of the rest for NAT.  This is a much efficient use of public IP addresses.&lt;/P&gt;&lt;P&gt;There is no  need to use additional public IP addresses in this situation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Dec 2008 19:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110351#M878311</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-12-30T19:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110352#M878312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could anyone possibly give an example of what the parent post stated, in the context of an ASA5500?  I've tried a few different things however I'm having no such luck.  Also, I'm presuming that if I'd be doing policy nat, I should remove the static NAT entry?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Dec 2008 05:31:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110352#M878312</guid>
      <dc:creator>godinerik</dc:creator>
      <dc:date>2008-12-31T05:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110353#M878314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In regards to the parent post you can try something like this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACCESS LIST NAME permit tcp any 192.168.100.2 eg 22 &lt;/P&gt;&lt;P&gt;global  outside 1 1.2.3.4 netmask xx.xx.xx.xx eq 1234&lt;/P&gt;&lt;P&gt;nat inside 1 access-list ACLName . HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check out this web link for examples of Policy Based NAT &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#IN1" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#IN1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Dec 2008 21:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110353#M878314</guid>
      <dc:creator>sdoremus33</dc:creator>
      <dc:date>2008-12-31T21:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110354#M878316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your suggestion, unfortunately this isn't possible on an ASA5505.  Looking at the example in the reference guide for the5505, I see that the address we want the real address mapped to is specified by the global commad, but unfortunately that command doesn't have an "eq" parm which lets you specify the port.  Although it seems like you can easily re-write the mapped addr based on source/dst, it doesn't look like the port can be re-written.  I was really hoping for a solution similar to what the checkpoint post refers to.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Dec 2008 21:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110354#M878316</guid>
      <dc:creator>godinerik</dc:creator>
      <dc:date>2008-12-31T21:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110355#M878318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) interface 12345 192.168.100.2 22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will use ANY address that you have specified or assigned by the ISP. Us the word "interface" where I have it, and don't use an address there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jan 2009 14:47:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110355#M878318</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2009-01-02T14:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110356#M878319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Collin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wanted to let you know that your solution was definitely the best solution.  I looked in to policy NAT, however it doesn't do what I'm trying to accomplish.  One of my initial concerns with your suggestion is that every outgoing connection would have to be defined in a static statement, however by testing out this solution, I found out this wasn't the case.  I'm not sure why this doesn't need to happen (if you can explain to me the reason/concept/logic it would be much appreciated!) but what counts is that it doesn't. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Erik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Jan 2009 08:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110356#M878319</guid>
      <dc:creator>godinerik</dc:creator>
      <dc:date>2009-01-04T08:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: asa5505 / Port forwarding</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110357#M878320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After further testing, I realize that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ensures that all my outgoing connections are translated to outside vlan's address and that's why it works. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hooray &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Erik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Jan 2009 23:28:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-port-forwarding/m-p/1110357#M878320</guid>
      <dc:creator>godinerik</dc:creator>
      <dc:date>2009-01-04T23:28:59Z</dc:date>
    </item>
  </channel>
</rss>

