<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Forwarding in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877277#M969225</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are all the acl?s&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.10.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.20.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.40.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.10.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.10.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.40.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.10.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_100 permit ip host mvxapp host 10.23.125.185 &lt;/P&gt;&lt;P&gt;access-list acl_intentia_ipsec permit ip 10.23.125.184 255.255.255.248 host intentia-host &lt;/P&gt;&lt;P&gt;access-list static-intentia-srv1 permit ip host mvxapp host intentia-host &lt;/P&gt;&lt;P&gt;access-list static-intentia-srv2 permit ip host 192.168.10.12 host intentia-host &lt;/P&gt;&lt;P&gt;access-list nat-intentia-srv1 permit ip host mvxapp host intentia-host &lt;/P&gt;&lt;P&gt;access-list nat-intentia-srv2 permit ip host 192.168.10.12 host intentia-host &lt;/P&gt;&lt;P&gt;access-list split-labicer-admin permit ip 192.168.10.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split-labicer-admin permit ip 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_valorceram_ipsec permit ip 192.168.10.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_valorceram_ipsec permit ip 192.168.40.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1417 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1418 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1419 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1420 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit udp any interface outside eq 407 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are the nat and global statments&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 5 10.23.125.185&lt;/P&gt;&lt;P&gt;global (outside) 6 10.23.125.186&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;global (outside) 7 10.23.125.187&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list nat-intentia-srv1 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 6 access-list nat-intentia-srv2 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 10 192.168.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Sep 2007 09:49:59 GMT</pubDate>
    <dc:creator>yupinho</dc:creator>
    <dc:date>2007-09-19T09:49:59Z</dc:date>
    <item>
      <title>Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877275#M969223</link>
      <description>&lt;P&gt;Hi there!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are trying to configure a pix firewall 506e to redirect outside traffic to an inside machine.&lt;/P&gt;&lt;P&gt;We're using the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 82.173.121.53 1417 192.168.10.137 1417 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 82.173.121.53 1418 192.168.10.137 1418 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 82.173.121.53 1419 192.168.10.137 1419 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 82.173.121.53 1420 192.168.10.137 1420 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 82.173.121.53 407 192.168.10.137 407 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1417&lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1418&lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1419&lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1420&lt;/P&gt;&lt;P&gt;access-list outside-inbound permit udp any interface outside eq 407&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside-inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can see received packets on the hit count of the access list but only udp and we can't connect anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-inbound line 1 permit tcp any interface outside eq 1417 (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list outside-inbound line 2 permit tcp any interface outside eq 1418 (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list outside-inbound line 3 permit tcp any interface outside eq 1419 (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list outside-inbound line 4 permit tcp any interface outside eq 1420 (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list outside-inbound line 5 permit udp any interface outside eq 407 (hitcnt=1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877275#M969223</guid>
      <dc:creator>yupinho</dc:creator>
      <dc:date>2019-03-11T11:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877276#M969224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please paste the relevant part of the config that would include :&lt;/P&gt;&lt;P&gt;inside access lists , nat and the global statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 10:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877276#M969224</guid>
      <dc:creator>rajbhatt</dc:creator>
      <dc:date>2007-09-18T10:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: Port Forwarding</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877277#M969225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are all the acl?s&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.10.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.20.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_access_in permit ip 192.168.40.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.10.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.10.0 255.255.255.0 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.40.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip 192.168.10.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_100 permit ip host mvxapp host 10.23.125.185 &lt;/P&gt;&lt;P&gt;access-list acl_intentia_ipsec permit ip 10.23.125.184 255.255.255.248 host intentia-host &lt;/P&gt;&lt;P&gt;access-list static-intentia-srv1 permit ip host mvxapp host intentia-host &lt;/P&gt;&lt;P&gt;access-list static-intentia-srv2 permit ip host 192.168.10.12 host intentia-host &lt;/P&gt;&lt;P&gt;access-list nat-intentia-srv1 permit ip host mvxapp host intentia-host &lt;/P&gt;&lt;P&gt;access-list nat-intentia-srv2 permit ip host 192.168.10.12 host intentia-host &lt;/P&gt;&lt;P&gt;access-list split-labicer-admin permit ip 192.168.10.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split-labicer-admin permit ip 192.168.20.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_valorceram_ipsec permit ip 192.168.10.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list acl_valorceram_ipsec permit ip 192.168.40.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1417 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1418 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1419 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit tcp any interface outside eq 1420 &lt;/P&gt;&lt;P&gt;access-list outside-inbound permit udp any interface outside eq 407 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here are the nat and global statments&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 5 10.23.125.185&lt;/P&gt;&lt;P&gt;global (outside) 6 10.23.125.186&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;global (outside) 7 10.23.125.187&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list nat-intentia-srv1 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 6 access-list nat-intentia-srv2 0 0&lt;/P&gt;&lt;P&gt;nat (inside) 10 192.168.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 09:49:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding/m-p/877277#M969225</guid>
      <dc:creator>yupinho</dc:creator>
      <dc:date>2007-09-19T09:49:59Z</dc:date>
    </item>
  </channel>
</rss>

