<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Access-List &amp;amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375130#M960539</link>
    <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside_vlan253,outside) source static Server2 interface service TCP_5001 TCP_5001&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;object service TCP_5001&lt;BR /&gt;&amp;nbsp;service tcp source eq 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did the trick &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was working with the service object:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service 5001&lt;BR /&gt;&amp;nbsp;service tcp source eq 5001 destination eq 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That was'n working. I don't know why. Most likely not enough knowledge from my side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I will try myself, to get a second port to open. (2222)&lt;/P&gt;
&lt;P&gt;Thanks for the help so far &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;S.O.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 29 Apr 2018 17:34:16 GMT</pubDate>
    <dc:creator>software_onbekend</dc:creator>
    <dc:date>2018-04-29T17:34:16Z</dc:date>
    <item>
      <title>ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375005#M960529</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I hope I can get some help with my configuration of my ASA.&lt;/P&gt;
&lt;P&gt;The current situation:&lt;/P&gt;
&lt;P&gt;5 Public IP addresses.&lt;/P&gt;
&lt;P&gt;2 Servers that needs to connect to the internet.&lt;/P&gt;
&lt;P&gt;Server1 is already connect to the internet at the 2nd&amp;nbsp;Public IP.&lt;/P&gt;
&lt;P&gt;Server2 needs to be connected the internet &amp;nbsp;with multiple ports (5001 to 5001&amp;nbsp;&amp;amp; 2222 to 2222) at the 1st Public IP address, so it can be accessed from the WAN site.&lt;/P&gt;
&lt;P&gt;But at this moment I can't even get it working with just 1 port.&lt;/P&gt;
&lt;P&gt;I tried several NAT rules but nothing seams to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone guide me into the right direction?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a nice day.&lt;/P&gt;
&lt;P&gt;S.O.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA Version 9.4(4)16&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-5515&lt;BR /&gt;domain-name xxxxxxx.local&lt;BR /&gt;enable password xxxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool VPN-Clients 172.17.2.1-172.17.2.100 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description WAN Interface&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 1st Public IP 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description LAN Interface&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.3&lt;BR /&gt;&amp;nbsp;description DMZ&lt;BR /&gt;&amp;nbsp;vlan 3&lt;BR /&gt;&amp;nbsp;nameif inside_vlan3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.250&lt;BR /&gt;&amp;nbsp;description Management&lt;BR /&gt;&amp;nbsp;vlan 250&lt;BR /&gt;&amp;nbsp;nameif inside_vlan250&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.250.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.251&lt;BR /&gt;&amp;nbsp;description Server&lt;BR /&gt;&amp;nbsp;vlan 251&lt;BR /&gt;&amp;nbsp;nameif inside_vlan251&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.251.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.252&lt;BR /&gt;&amp;nbsp;description Printer&lt;BR /&gt;&amp;nbsp;vlan 252&lt;BR /&gt;&amp;nbsp;nameif inside_vlan252&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.252.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.253&lt;BR /&gt;&amp;nbsp;description Test&lt;BR /&gt;&amp;nbsp;vlan 253&lt;BR /&gt;&amp;nbsp;nameif inside_vlan253&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.253.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.254&lt;BR /&gt;&amp;nbsp;description Guest&lt;BR /&gt;&amp;nbsp;vlan 254&lt;BR /&gt;&amp;nbsp;nameif inside_vlan254&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.254.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.255&lt;BR /&gt;&amp;nbsp;description Production&lt;BR /&gt;&amp;nbsp;vlan 255&lt;BR /&gt;&amp;nbsp;nameif inside_vlan255&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.255.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa944-16-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name xxxxxx.local&lt;BR /&gt;object network inside_vlan255&lt;BR /&gt;&amp;nbsp;subnet 192.168.255.0 255.255.255.0&lt;BR /&gt;object network inside_vlan254&lt;BR /&gt;&amp;nbsp;subnet 192.168.254.0 255.255.255.0&lt;BR /&gt;object network inside_vlan253&lt;BR /&gt;&amp;nbsp;subnet 192.168.253.0 255.255.255.0&lt;BR /&gt;object network inside_vlan252&lt;BR /&gt;&amp;nbsp;subnet 192.168.252.0 255.255.255.0&lt;BR /&gt;object network inside_vlan251&lt;BR /&gt;&amp;nbsp;subnet 192.168.251.0 255.255.255.0&lt;BR /&gt;object network inside_vlan250&lt;BR /&gt;&amp;nbsp;subnet 192.168.250.0 255.255.255.0&lt;BR /&gt;object network Server1_TCP_8080-80&lt;BR /&gt;&amp;nbsp;host 172.16.0.1&lt;BR /&gt;object network Server1-external-ip&lt;BR /&gt;&amp;nbsp;host 2nd Public IP&lt;BR /&gt;object network inside_vlan3&lt;BR /&gt;&amp;nbsp;subnet 172.16.0.0 255.255.255.0&lt;BR /&gt;object network Server1_TCP_eq_5001&lt;BR /&gt;&amp;nbsp;host 172.16.0.1&lt;BR /&gt;object network Server1&lt;BR /&gt;&amp;nbsp;host 172.16.0.1&lt;BR /&gt;object service 445&lt;BR /&gt;&amp;nbsp;service tcp destination eq 445&lt;BR /&gt;object service 8080-80&lt;BR /&gt;&amp;nbsp;service tcp source eq www destination eq 8080&lt;BR /&gt;object network Server2&lt;BR /&gt;&amp;nbsp;host 192.168.253.2&lt;BR /&gt;object network Server1-external-ip&lt;BR /&gt;&amp;nbsp;host 1st Public IP&lt;BR /&gt;object network Server2_TCP_eq_5001&lt;BR /&gt;&amp;nbsp;host 192.168.253.2&lt;BR /&gt;object network Server2_TCP_eq_2222&lt;BR /&gt;&amp;nbsp;host 192.168.253.2&lt;BR /&gt;object service 2222&lt;BR /&gt;&amp;nbsp;service tcp source eq 2222 destination eq 2222&lt;BR /&gt;object service 5001&lt;BR /&gt;&amp;nbsp;service tcp source eq 5001 destination eq 5001&lt;BR /&gt;object-group network RFC_1918&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group user VPN-Client&lt;BR /&gt;&amp;nbsp;description Use of Cisco VPN Client&lt;BR /&gt;&amp;nbsp;user LOCAL\user1&lt;BR /&gt;access-list outside_in extended permit tcp any object Server1_TCP_8080-80 eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp any object Server1_TCP_eq_5001 eq 5001&lt;BR /&gt;access-list outside_in extended permit tcp object Server2-external-ip object Server2_TCP_eq_5001 eq 5001&lt;BR /&gt;access-list VPN-Clients_splitTunnelAcl standard permit 192.168.255.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 16&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_vlan3 1500&lt;BR /&gt;mtu inside_vlan250 1500&lt;BR /&gt;mtu inside_vlan251 1500&lt;BR /&gt;mtu inside_vlan252 1500&lt;BR /&gt;mtu inside_vlan253 1500&lt;BR /&gt;mtu inside_vlan254 1500&lt;BR /&gt;mtu inside_vlan255 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;icmp permit any inside_vlan255&lt;BR /&gt;asdm image disk0:/asdm-762-150.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network inside_vlan255&lt;BR /&gt;&amp;nbsp;nat (inside_vlan255,outside) dynamic interface&lt;BR /&gt;object network inside_vlan254&lt;BR /&gt;&amp;nbsp;nat (inside_vlan254,outside) dynamic interface&lt;BR /&gt;object network inside_vlan253&lt;BR /&gt;&amp;nbsp;nat (inside_vlan253,outside) dynamic interface&lt;BR /&gt;object network Server1_TCP_8080-80&lt;BR /&gt;&amp;nbsp;nat (inside_vlan3,outside) static Server1-external-ip service tcp 8080 www&lt;BR /&gt;object network inside_vlan3&lt;BR /&gt;&amp;nbsp;nat (inside_vlan3,outside) dynamic 2nd Public IP&lt;BR /&gt;object network Server1_TCP_eq_5001&lt;BR /&gt;&amp;nbsp;nat (inside_vlan3,outside) static Server1-external-ip service tcp 5001 5001&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 ISP Gateway 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 60&lt;BR /&gt;http 192.168.255.0 255.255.255.0 inside_vlan255&lt;BR /&gt;http 192.168.253.0 255.255.255.0 inside_vlan253&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.253.0 255.255.255.0 inside_vlan253&lt;BR /&gt;ssh 192.168.255.0 255.255.255.0 inside_vlan255&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpn-addr-assign local reuse-delay 1&lt;BR /&gt;dhcpd address 172.16.0.100-172.16.0.102 inside_vlan3&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan3&lt;BR /&gt;dhcpd option 3 ip 172.16.0.254 interface inside_vlan3&lt;BR /&gt;dhcpd enable inside_vlan3&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.253.100-192.168.253.150 inside_vlan253&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan253&lt;BR /&gt;dhcpd option 3 ip 192.168.253.254 interface inside_vlan253&lt;BR /&gt;dhcpd enable inside_vlan253&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.254.100-192.168.254.150 inside_vlan254&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan254&lt;BR /&gt;dhcpd option 3 ip 192.168.254.254 interface inside_vlan254&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.255.100-192.168.255.150 inside_vlan255&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan255&lt;BR /&gt;dhcpd option 3 ip 192.168.255.254 interface inside_vlan255&lt;BR /&gt;dhcpd enable inside_vlan255&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl cipher default custom "DHE-RSA-AES256-SHA:AES256-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "DHE-RSA-AES256-SHA:AES256-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "DHE-RSA-AES256-SHA:AES256-SHA"&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ssl-client&lt;BR /&gt;group-policy VPN-Clients internal&lt;BR /&gt;group-policy VPN-Clients attributes&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;&amp;nbsp;vpn-idle-timeout none&lt;BR /&gt;&amp;nbsp;vpn-session-timeout none&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value VPN-Clients_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;default-domain value hoekstra.local&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username user1 password xxxxx encrypted&lt;BR /&gt;username user1 attributes&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username xxxxxxxxxxxx password xxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group VPN-Clients type remote-access&lt;BR /&gt;tunnel-group VPN-Clients general-attributes&lt;BR /&gt;&amp;nbsp;address-pool VPN-Clients&lt;BR /&gt;&amp;nbsp;default-group-policy VPN-Clients&lt;BR /&gt;tunnel-group VPN-Clients ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map dcerpc&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 16&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 16&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:6632ef964518bf7caeca3ef85c8fe152&lt;BR /&gt;: end&lt;BR /&gt;ASA-5515#&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375005#M960529</guid>
      <dc:creator>software_onbekend</dc:creator>
      <dc:date>2020-02-21T15:41:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375020#M960530</link>
      <description>&lt;P&gt;Try running a packet tracer to see which NAT rules it is hitting&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 12345 **server public IP** 5001&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 09:29:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375020#M960530</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T09:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375027#M960531</link>
      <description>&lt;P&gt;Hello Marius,&lt;/P&gt;
&lt;P&gt;Thank for your time &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Hereby the results&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop&amp;nbsp;"1st Public IP"&amp;nbsp;using egress ifc&amp;nbsp; identity&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 10:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375027#M960531</guid>
      <dc:creator>software_onbekend</dc:creator>
      <dc:date>2018-04-29T10:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375032#M960532</link>
      <description>&lt;P&gt;Could you also run the command for port 8080?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input outside tcp 8.8.8.8 12345 **server public IP** 8080&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 11:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375032#M960532</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T11:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375033#M960533</link>
      <description>&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop&amp;nbsp;**1st Public IP**&amp;nbsp;using egress ifc&amp;nbsp; identity&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 11:46:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375033#M960533</guid>
      <dc:creator>software_onbekend</dc:creator>
      <dc:date>2018-04-29T11:46:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375035#M960534</link>
      <description>&lt;P&gt;Is the configuration above the full configuration of the ASA or did you leave out something?&lt;/P&gt;
&lt;P&gt;Please try moving the NAT statements to manual NAT section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 11:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375035#M960534</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T11:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375073#M960535</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;It is the full configuration. I did only an cleanup for security,&lt;/P&gt;
&lt;P&gt;What do you mean with&amp;nbsp;"Please try moving the NAT statements to manual NAT section."?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did a clean up of the config.&lt;/P&gt;
&lt;P&gt;So we can start from scratch.&lt;/P&gt;
&lt;P&gt;Can you guide me stap by step?&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;S.O.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Goal:&lt;/P&gt;
&lt;P&gt;Access the inside "Server2" (IP 192.168.253.2:5001) from the "1st Public IP" (also the IP address for the outside interface) on port 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hereby the current configuration.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA-5515# show run&lt;BR /&gt;: Saved&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;: Serial Number: xxxxxxx&lt;BR /&gt;: Hardware:&amp;nbsp;&amp;nbsp; ASA5515, 8192 MB RAM, CPU Clarkdale 3058 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.4(4)16&lt;BR /&gt;!&lt;BR /&gt;hostname ASA-5515&lt;BR /&gt;domain-name xxxxxxx.local&lt;BR /&gt;enable password xxxxxxx encrypted&lt;BR /&gt;passwd xxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool VPN-Clients 172.17.2.1-172.17.2.100 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description WAN Interface&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address **1st Public IP** 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description LAN Interface&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.3&lt;BR /&gt;&amp;nbsp;description DMZ&lt;BR /&gt;&amp;nbsp;vlan 3&lt;BR /&gt;&amp;nbsp;nameif inside_vlan3&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.250&lt;BR /&gt;&amp;nbsp;description Management&lt;BR /&gt;&amp;nbsp;vlan 250&lt;BR /&gt;&amp;nbsp;nameif inside_vlan250&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.250.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.251&lt;BR /&gt;&amp;nbsp;description Server&lt;BR /&gt;&amp;nbsp;vlan 251&lt;BR /&gt;&amp;nbsp;nameif inside_vlan251&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.251.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.252&lt;BR /&gt;&amp;nbsp;description Printer&lt;BR /&gt;&amp;nbsp;vlan 252&lt;BR /&gt;&amp;nbsp;nameif inside_vlan252&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.252.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.253&lt;BR /&gt;&amp;nbsp;description Test&lt;BR /&gt;&amp;nbsp;vlan 253&lt;BR /&gt;&amp;nbsp;nameif inside_vlan253&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.253.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.254&lt;BR /&gt;&amp;nbsp;description Guest&lt;BR /&gt;&amp;nbsp;vlan 254&lt;BR /&gt;&amp;nbsp;nameif inside_vlan254&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.254.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.255&lt;BR /&gt;&amp;nbsp;description Production&lt;BR /&gt;&amp;nbsp;vlan 255&lt;BR /&gt;&amp;nbsp;nameif inside_vlan255&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.255.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa944-16-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name hoekstra.local&lt;BR /&gt;object network inside_vlan255&lt;BR /&gt;&amp;nbsp;subnet 192.168.255.0 255.255.255.0&lt;BR /&gt;object network inside_vlan254&lt;BR /&gt;&amp;nbsp;subnet 192.168.254.0 255.255.255.0&lt;BR /&gt;object network inside_vlan253&lt;BR /&gt;&amp;nbsp;subnet 192.168.253.0 255.255.255.0&lt;BR /&gt;object network inside_vlan252&lt;BR /&gt;&amp;nbsp;subnet 192.168.252.0 255.255.255.0&lt;BR /&gt;object network inside_vlan251&lt;BR /&gt;&amp;nbsp;subnet 192.168.251.0 255.255.255.0&lt;BR /&gt;object network inside_vlan250&lt;BR /&gt;&amp;nbsp;subnet 192.168.250.0 255.255.255.0&lt;BR /&gt;object network DS509_TCP_8080-80&lt;BR /&gt;&amp;nbsp;host 172.16.0.1&lt;BR /&gt;object network DS509-external-ip&lt;BR /&gt;&amp;nbsp;host **2nd Public IP**&lt;BR /&gt;object network inside_vlan3&lt;BR /&gt;&amp;nbsp;subnet 172.16.0.0 255.255.255.0&lt;BR /&gt;object network DS509_TCP_eq_5001&lt;BR /&gt;&amp;nbsp;host 172.16.0.1&lt;BR /&gt;object network DS509&lt;BR /&gt;&amp;nbsp;host 172.16.0.1&lt;BR /&gt;object service 5001&lt;BR /&gt;&amp;nbsp;service tcp source eq 5001 destination eq 5001&lt;BR /&gt;object-group network RFC_1918&lt;BR /&gt;&amp;nbsp;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.0.0 255.240.0.0&lt;BR /&gt;&amp;nbsp;network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group user VPN-Client&lt;BR /&gt;&amp;nbsp;description Use of Cisco VPN Clinet&lt;BR /&gt;&amp;nbsp;user LOCAL\user1&lt;BR /&gt;access-list outside_in extended permit tcp any object DS509_TCP_8080-80 eq 8080&lt;BR /&gt;access-list outside_in extended permit tcp any object DS509_TCP_eq_5001 eq 5001&lt;BR /&gt;access-list VPN-Clients_splitTunnelAcl standard permit 192.168.255.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging facility 16&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_vlan3 1500&lt;BR /&gt;mtu inside_vlan250 1500&lt;BR /&gt;mtu inside_vlan251 1500&lt;BR /&gt;mtu inside_vlan252 1500&lt;BR /&gt;mtu inside_vlan253 1500&lt;BR /&gt;mtu inside_vlan254 1500&lt;BR /&gt;mtu inside_vlan255 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp deny any outside&lt;BR /&gt;icmp permit any inside_vlan255&lt;BR /&gt;asdm image disk0:/asdm-762-150.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network inside_vlan255&lt;BR /&gt;&amp;nbsp;nat (inside_vlan255,outside) dynamic interface&lt;BR /&gt;object network inside_vlan254&lt;BR /&gt;&amp;nbsp;nat (inside_vlan254,outside) dynamic interface&lt;BR /&gt;object network inside_vlan253&lt;BR /&gt;&amp;nbsp;nat (inside_vlan253,outside) dynamic interface&lt;BR /&gt;object network DS509_TCP_8080-80&lt;BR /&gt;&amp;nbsp;nat (inside_vlan3,outside) static DS509-external-ip service tcp 8080 www&lt;BR /&gt;object network inside_vlan3&lt;BR /&gt;&amp;nbsp;nat (inside_vlan3,outside) dynamic **2nd Public IP**&lt;BR /&gt;object network DS509_TCP_eq_5001&lt;BR /&gt;&amp;nbsp;nat (inside_vlan3,outside) static DS509-external-ip service tcp 5001 5001&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 **ISP Gateway** 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 60&lt;BR /&gt;http 192.168.255.0 255.255.255.0 inside_vlan255&lt;BR /&gt;http 192.168.253.0 255.255.255.0 inside_vlan253&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-256&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes-192&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;&amp;nbsp;authentication crack&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;&amp;nbsp;authentication rsa-sig&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.253.0 255.255.255.0 inside_vlan253&lt;BR /&gt;ssh 192.168.255.0 255.255.255.0 inside_vlan255&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpn-addr-assign local reuse-delay 1&lt;BR /&gt;dhcpd address 172.16.0.100-172.16.0.102 inside_vlan3&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan3&lt;BR /&gt;dhcpd option 3 ip 172.16.0.254 interface inside_vlan3&lt;BR /&gt;dhcpd enable inside_vlan3&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.253.100-192.168.253.150 inside_vlan253&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan253&lt;BR /&gt;dhcpd option 3 ip 192.168.253.254 interface inside_vlan253&lt;BR /&gt;dhcpd enable inside_vlan253&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.254.100-192.168.254.150 inside_vlan254&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan254&lt;BR /&gt;dhcpd option 3 ip 192.168.254.254 interface inside_vlan254&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.255.100-192.168.255.150 inside_vlan255&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside_vlan255&lt;BR /&gt;dhcpd option 3 ip 192.168.255.254 interface inside_vlan255&lt;BR /&gt;dhcpd enable inside_vlan255&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl cipher default custom "DHE-RSA-AES256-SHA:AES256-SHA"&lt;BR /&gt;ssl cipher tlsv1 custom "DHE-RSA-AES256-SHA:AES256-SHA"&lt;BR /&gt;ssl cipher dtlsv1 custom "DHE-RSA-AES256-SHA:AES256-SHA"&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ssl-client&lt;BR /&gt;group-policy VPN-Clients internal&lt;BR /&gt;group-policy VPN-Clients attributes&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;&amp;nbsp;vpn-idle-timeout none&lt;BR /&gt;&amp;nbsp;vpn-session-timeout none&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value VPN-Clients_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;default-domain value hoekstra.local&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username user1 password xxxxxxx encrypted&lt;BR /&gt;username user1 attributes&lt;BR /&gt;&amp;nbsp;service-type remote-access&lt;BR /&gt;username xxxxxxx password xxxxxxx encrypted privilege 15&lt;BR /&gt;tunnel-group VPN-Clients type remote-access&lt;BR /&gt;tunnel-group VPN-Clients general-attributes&lt;BR /&gt;&amp;nbsp;address-pool VPN-Clients&lt;BR /&gt;&amp;nbsp;default-group-policy VPN-Clients&lt;BR /&gt;tunnel-group VPN-Clients ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map dcerpc&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 16&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 16&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:1bbb66e29a8ee4a88fa0cab3345bb827&lt;BR /&gt;: end&lt;BR /&gt;ASA-5515#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 14:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375073#M960535</guid>
      <dc:creator>software_onbekend</dc:creator>
      <dc:date>2018-04-29T14:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375098#M960536</link>
      <description>&lt;P&gt;I set this up in my home lab and got it working with the following config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network DS509&lt;BR /&gt; host 172.16.0.1&lt;BR /&gt;object network PUBLIC-IP&lt;BR /&gt; host 62.1.1.1&lt;BR /&gt;object service TCP_5001&lt;BR /&gt; service tcp source eq 5001 &lt;BR /&gt;access-list outside-in extended permit tcp any host 172.16.0.1 eq 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (Inside,Outside) source static DS509 PUBLIC-IP service TCP_5001 TCP_5001&lt;BR /&gt;access-group outside-in in interface Outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA# show conn &lt;BR /&gt;1 in use, 1 most used&lt;BR /&gt;TCP Outside 192.1.20.2:62709 Inside 172.16.0.1:5001, idle 0:00:05, bytes 4036, flags UIOB&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 15:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375098#M960536</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T15:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375108#M960537</link>
      <description>&lt;P&gt;HI Marius,&lt;/P&gt;
&lt;P&gt;The config you show me is a config from the DMZ zone.&lt;/P&gt;
&lt;P&gt;That&amp;nbsp;was already&amp;nbsp;working&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I was looking for a solution to get the port 5001 &amp;amp; 2222 to the inside IP 192.168.253.2 working.&lt;/P&gt;
&lt;P&gt;That has to link to the 1st Public IP address. (is also the outside interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I did the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network Server2&lt;/P&gt;
&lt;P&gt;host 192.168.253.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network Server2_external_ip&lt;/P&gt;
&lt;P&gt;host **1st Public IP**&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service TCP_5001&lt;/P&gt;
&lt;P&gt;service tcp source eq 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside_in extended permit tcp any host 192.168.253.2 eq 5001&lt;/P&gt;
&lt;P&gt;At this point everything looks fine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside-vlan253,outside) source static Server2 **1st Public IP** service TCP_5001 TCP_5001&lt;/P&gt;
&lt;P&gt;ERROR: Address **1st Public IP** overlaps with outside interface address.&lt;/P&gt;
&lt;P&gt;ERROR: NAT Policy is not downloaded.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So here it goes wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;S.O.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 16:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375108#M960537</guid>
      <dc:creator>software_onbekend</dc:creator>
      <dc:date>2018-04-29T16:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375123#M960538</link>
      <description>&lt;P&gt;This is a typical error you would get if you are using an object that is configured with the ASA interface IP you are trying to NAT to.&amp;nbsp; Use the interface keyword instead of the object.&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 16:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375123#M960538</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-04-29T16:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Access-List &amp; NAT Ruls Multiple Public IP addresses to expose a server to the internet</title>
      <link>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375130#M960539</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside_vlan253,outside) source static Server2 interface service TCP_5001 TCP_5001&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;object service TCP_5001&lt;BR /&gt;&amp;nbsp;service tcp source eq 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did the trick &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was working with the service object:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service 5001&lt;BR /&gt;&amp;nbsp;service tcp source eq 5001 destination eq 5001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That was'n working. I don't know why. Most likely not enough knowledge from my side.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I will try myself, to get a second port to open. (2222)&lt;/P&gt;
&lt;P&gt;Thanks for the help so far &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;S.O.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 29 Apr 2018 17:34:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-access-list-amp-nat-ruls-multiple-public-ip-addresses-to/m-p/3375130#M960539</guid>
      <dc:creator>software_onbekend</dc:creator>
      <dc:date>2018-04-29T17:34:16Z</dc:date>
    </item>
  </channel>
</rss>

