<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Forward issue- ASA 5508 version 9.8(1) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forward-issue-asa-5508-version-9-8-1/m-p/3832556#M925524</link>
    <description>&lt;P&gt;So I've figured it out myself but I'm not completely certain why it fixed it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I removed&amp;nbsp; all of the NAT statements from the top section here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$hostname# sh run nat&lt;BR /&gt;nat (Production,Outside) source dynamic any interface&lt;BR /&gt;nat (any,Camera_Management) source dynamic VPN_Clients interface&lt;BR /&gt;nat (any,Production) source dynamic VPN_Clients interface&lt;BR /&gt;nat (Cameras,Outside) source dynamic any interface&lt;BR /&gt;nat (any,Cameras) source dynamic VPN_Clients interface&lt;BR /&gt;!&lt;BR /&gt;object network VMS_TCP8081&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service tcp 8081 8081&lt;BR /&gt;object network VMS_UDP8081&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service udp 8081 8081&lt;BR /&gt;object network VMS_TCP8082&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service tcp 8082 8082&lt;BR /&gt;object network VMS_UDP8082&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service udp 8082 8082&lt;BR /&gt;object network Cameras_network&lt;BR /&gt;nat (Cameras,Outside) dynamic interface&lt;BR /&gt;object network VPN_Cameras&lt;BR /&gt;nat (any,Camera_Management) dynamic interface&lt;BR /&gt;object network Management_Internet&lt;BR /&gt;nat (Camera_Management,Outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then re-input them with the "after-auto" command input in the middle - for example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (Production,Outside) after-auto source dynamic any interface&lt;BR /&gt;nat (any,Production) after-auto source dynamic VPN_Clients interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thought had been that the port forward wasn't working because the traffic was somehow hitting something beforehand, which has proven to be true. What I do not understand is why a NAT for a different network (Production vs Cameras) would have caught this. Any insight would be appreciated.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2019 19:42:24 GMT</pubDate>
    <dc:creator>bmatson37</dc:creator>
    <dc:date>2019-04-04T19:42:24Z</dc:date>
    <item>
      <title>Port Forward issue- ASA 5508 version 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-issue-asa-5508-version-9-8-1/m-p/3831825#M925522</link>
      <description>&lt;P&gt;Hello all-&lt;/P&gt;&lt;P&gt;I am attempting to forward both TCP and UDP 5081 and 5082 traffic hitting the outside interface on my ASA to an internal server at 172.16.200.10. behind the "camera" interface I've done a fair amount of reading on the topic and believe I have it configured properly but for the part where I don't actually see NAT hits. I'll provide all the information I think is relevant below and am happy to provide more should any be required. My best guess is that I have another NAT somehow interfering but I've tried disabling any that I would think may affect this traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname # sh run nat&lt;BR /&gt;nat (Production,Outside) source dynamic any interface&lt;BR /&gt;nat (any,Camera_Management) source dynamic VPN_Clients interface&lt;BR /&gt;nat (any,Production) source dynamic VPN_Clients interface&lt;BR /&gt;nat (Cameras,Outside) source dynamic any interface&lt;BR /&gt;nat (any,Cameras) source dynamic VPN_Clients interface&lt;BR /&gt;!&lt;BR /&gt;object network VMS_TCP8081&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service tcp 8081 8081&lt;BR /&gt;object network VMS_UDP8081&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service udp 8081 8081&lt;BR /&gt;object network VMS_TCP8082&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service tcp 8082 8082&lt;BR /&gt;object network VMS_UDP8082&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service udp 8082 8082&lt;BR /&gt;object network Cameras_network&lt;BR /&gt;nat (Cameras,Outside) dynamic interface&lt;BR /&gt;object network VPN_Cameras&lt;BR /&gt;nat (any,Camera_Management) dynamic interface&lt;BR /&gt;object network Management_Internet&lt;BR /&gt;nat (Camera_Management,Outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname# sh run access-list&lt;BR /&gt;access-list Management standard permit 172.16.200.0 255.255.252.0&lt;BR /&gt;access-list Management standard permit 172.16.75.0 255.255.255.0&lt;BR /&gt;access-list Management standard permit 10.45.0.0 255.255.0.0&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list Production_access_in extended permit ip object VPN_Clients any&lt;BR /&gt;access-list Production_access_in extended permit ip object Production any&lt;BR /&gt;access-list Cameras_access_in extended permit ip object VPN_Clients any&lt;BR /&gt;access-list Cameras_access_in extended permit ip 172.16.200.0 255.255.252.0 any&lt;BR /&gt;access-list Camera_Management_access_in extended permit ip object VPN_Clients interface Camera_Management&lt;BR /&gt;access-list Camera_Management_access_in extended permit ip 172.16.75.0 255.255.255.0 any&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object XSMEDIA_Comcast eq ssh&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object XSMEDIA_Comcast eq www&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object VMS_TCP8081 eq 8081&lt;BR /&gt;access-list Outside_access_in extended permit tcp any object VMS_TCP8082 eq 8082&lt;BR /&gt;access-list Outside_access_in extended permit udp any object VMS_UDP8081 eq 8081&lt;BR /&gt;access-list Outside_access_in extended permit udp any object VMS_UDP8082 eq 8082&lt;BR /&gt;access-list Outside_access_in extended permit tcp any interface Outside eq 8082&lt;BR /&gt;access-list outside-inbound extended permit tcp any object VMS_TCP8081 eq 8081&lt;BR /&gt;access-list outside-inbound extended permit udp any object VMS_UDP8081 eq 8081&lt;BR /&gt;access-list outside-inbound extended permit tcp any object VMS_TCP8082 eq 8082&lt;BR /&gt;access-list outside-inbound extended permit udp any object VMS_UDP8082 eq 8082&lt;BR /&gt;access-list Local_Lan_Access standard permit host 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (Production) to (Outside) source dynamic any interface&lt;BR /&gt;translate_hits = 98291, untranslate_hits = 561&lt;BR /&gt;2 (any) to (Camera_Management) source dynamic VPN_Clients interface&lt;BR /&gt;translate_hits = 19, untranslate_hits = 1&lt;BR /&gt;3 (any) to (Production) source dynamic VPN_Clients interface&lt;BR /&gt;translate_hits = 195, untranslate_hits = 6&lt;BR /&gt;4 (Cameras) to (Outside) source dynamic any interface&lt;BR /&gt;translate_hits = 216, untranslate_hits = 19&lt;BR /&gt;5 (any) to (Cameras) source dynamic VPN_Clients interface&lt;BR /&gt;translate_hits = 185, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (Cameras) to (Outside) source static VMS_TCP8081 interface service tcp 8081 8081 no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (Cameras) to (Outside) source static VMS_TCP8082 interface service tcp 8082 8082 no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (Cameras) to (Outside) source static VMS_UDP8081 interface service udp 8081 8081 no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;4 (Cameras) to (Outside) source static VMS_UDP8082 interface service udp 8082 8082 no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;5 (Outside) to (Camera_Management) source static _vpn_nat_172.16.249.2 71.236.243.113&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;6 (Outside) to (Camera_Management) source static _vpn_nat_172.16.249.5 71.236.243.113&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;7 (Outside) to (Camera_Management) source static _vpn_nat_172.16.249.7 140.211.82.4&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;8 (Camera_Management) to (Outside) source dynamic Management_Internet interface&lt;BR /&gt;translate_hits = 7127, untranslate_hits = 52&lt;BR /&gt;9 (any) to (Camera_Management) source dynamic VPN_Cameras interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;10 (Cameras) to (Outside) source dynamic Cameras_network interface&lt;BR /&gt;translate_hits = 842, untranslate_hits = 23&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hostname# packet-tracer input outside tcp 1.2.3.4 12345 X.X.X.X (public IP) 8082 detailed&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 199.66.196.254 using egress ifc identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac927e600, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=715215, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad9015390, priority=0, domain=permit, deny=true&lt;BR /&gt;hits=579864, user_data=0xa, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any assistance is very much appreciated. It's clear that I'm overlooking something obvious but I'm sort of stuck.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-issue-asa-5508-version-9-8-1/m-p/3831825#M925522</guid>
      <dc:creator>bmatson37</dc:creator>
      <dc:date>2020-02-21T17:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forward issue- ASA 5508 version 9.8(1)</title>
      <link>https://community.cisco.com/t5/network-security/port-forward-issue-asa-5508-version-9-8-1/m-p/3832556#M925524</link>
      <description>&lt;P&gt;So I've figured it out myself but I'm not completely certain why it fixed it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I removed&amp;nbsp; all of the NAT statements from the top section here&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;$hostname# sh run nat&lt;BR /&gt;nat (Production,Outside) source dynamic any interface&lt;BR /&gt;nat (any,Camera_Management) source dynamic VPN_Clients interface&lt;BR /&gt;nat (any,Production) source dynamic VPN_Clients interface&lt;BR /&gt;nat (Cameras,Outside) source dynamic any interface&lt;BR /&gt;nat (any,Cameras) source dynamic VPN_Clients interface&lt;BR /&gt;!&lt;BR /&gt;object network VMS_TCP8081&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service tcp 8081 8081&lt;BR /&gt;object network VMS_UDP8081&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service udp 8081 8081&lt;BR /&gt;object network VMS_TCP8082&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service tcp 8082 8082&lt;BR /&gt;object network VMS_UDP8082&lt;BR /&gt;nat (Cameras,Outside) static interface no-proxy-arp service udp 8082 8082&lt;BR /&gt;object network Cameras_network&lt;BR /&gt;nat (Cameras,Outside) dynamic interface&lt;BR /&gt;object network VPN_Cameras&lt;BR /&gt;nat (any,Camera_Management) dynamic interface&lt;BR /&gt;object network Management_Internet&lt;BR /&gt;nat (Camera_Management,Outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I then re-input them with the "after-auto" command input in the middle - for example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (Production,Outside) after-auto source dynamic any interface&lt;BR /&gt;nat (any,Production) after-auto source dynamic VPN_Clients interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thought had been that the port forward wasn't working because the traffic was somehow hitting something beforehand, which has proven to be true. What I do not understand is why a NAT for a different network (Production vs Cameras) would have caught this. Any insight would be appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 19:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forward-issue-asa-5508-version-9-8-1/m-p/3832556#M925524</guid>
      <dc:creator>bmatson37</dc:creator>
      <dc:date>2019-04-04T19:42:24Z</dc:date>
    </item>
  </channel>
</rss>

