<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Punching a hole.... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826723#M957200</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do apologize , missed keyword &lt;B&gt;eq&lt;/B&gt; . please try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq https &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 12 Jan 2008 00:06:48 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-01-12T00:06:48Z</dc:date>
    <item>
      <title>Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826718#M957195</link>
      <description>&lt;P&gt;I need to punch a whole through this ASA to get port 25 and 443 traffic through can someone give me the command to do that? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently it's a mail server on the other side of an ASA. I have the following Static on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 216.110.x.22 smtp 172.16.200.4 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 216.110.x.22 https 172.16.200.4 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added a line similar that went from (Outsie,Inside) but that didn't work. There's also an ACL saying to allow anything from the Internet to hit those servers for 25 and 443 any help would be greatly appreaciate as they havent had mail in 3 days.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826718#M957195</guid>
      <dc:creator>ixholla69</dc:creator>
      <dc:date>2019-03-11T11:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826719#M957196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using  outside interface IP address for your static translation? if so try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface  smtp 172.16.200.4 smtp netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface  https 172.16.200.4 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then your access list should be applied to your outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 216.110.x.22 eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 216.110.x.22 eq https&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 21:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826719#M957196</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-01-11T21:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826720#M957197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah that didn't seem to work &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 21:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826720#M957197</guid>
      <dc:creator>ixholla69</dc:creator>
      <dc:date>2008-01-11T21:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826721#M957198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, then try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;remove acl &lt;/B&gt;&lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any host 216.110.x.22 eq smtp &lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any host 216.110.x.22 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;re-enter acl&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside https&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 22:55:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826721#M957198</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-01-11T22:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826722#M957199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I get a &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside smtp&lt;/P&gt;&lt;P&gt;                                                                        ^&lt;/P&gt;&lt;P&gt;ERROR: % Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2008 23:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826722#M957199</guid>
      <dc:creator>ixholla69</dc:creator>
      <dc:date>2008-01-11T23:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826723#M957200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do apologize , missed keyword &lt;B&gt;eq&lt;/B&gt; . please try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any interface outside eq https &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jan 2008 00:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826723#M957200</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-01-12T00:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826724#M957201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are using MS Exchange servers, you need to disable fixup (or inspect) for smtp. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Satya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jan 2008 00:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826724#M957201</guid>
      <dc:creator>sbaddipu</dc:creator>
      <dc:date>2008-01-12T00:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826725#M957202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;%ASA-4-106023: Deny tcp src outside:24.20.x.93/1599 dst outside:216.110.x.22/25 by access-g                                     roup "outside_access_in"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jan 2008 00:16:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826725#M957202</guid>
      <dc:creator>ixholla69</dc:creator>
      <dc:date>2008-01-12T00:16:05Z</dc:date>
    </item>
    <item>
      <title>Re: Punching a hole....</title>
      <link>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826726#M957203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wonder why that destination's showing up as Outside when it's coming in to an inside network ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Jan 2008 00:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/punching-a-hole/m-p/826726#M957203</guid>
      <dc:creator>ixholla69</dc:creator>
      <dc:date>2008-01-12T00:56:14Z</dc:date>
    </item>
  </channel>
</rss>

