cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1953
Views
0
Helpful
6
Replies

Port Forward on 5505

David Thulin
Level 1
Level 1

Hi!

OK, clearly I am in over my head here. I am trying to do a port forward for Plex running on a NAS inside the 5505. I have tried tens of different ways, and now I have run out of guides... What is the smoothest way of doing a port forward?

David

6 Replies 6

David Thulin
Level 1
Level 1

Hi!

 

I just found a new way here: http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html

It seems promising...but still does not work. In ASDM thee rule looks like this:

 

Is there anything obviously wrong?

D

Hello David,

Have you opened the outside ACL for the needed service port ?

can you please send me the show running in a file and i can give you the complete needed configuration for this.

regards,

Tariq

Hi!

I think I have. In the ACL Manager I can see the rules allowing traffic to and from .114 on port 32400. Same on Access Rules. And on NAT Rules I see .114 as original on 32400 and "outside" as Translated.

I am including my config dump - as you can see, this is the first "tweak" I have added.

D

: Saved
:
ASA Version 8.2(5) 
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
 description WAN
 switchport access vlan 2
!
interface Ethernet0/1
 description LAN
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.0.1.10 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
ftp mode passive
object-group service plex tcp
 description plex
 port-object eq 32400
 port-object eq www
access-list INSIDE-IN remark Allow all traffic from LAN
access-list INSIDE-IN extended permit ip 10.0.1.0 255.255.255.0 any 
access-list INSIDE-IN extended permit tcp host 10.0.1.114 any eq 32400 
access-list outside_access_in extended permit tcp any host 10.0.1.114 eq 32400 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (inside) 1 10.0.1.0
global (outside) 1 interface
nat (inside) 1 10.0.1.0 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 32400 10.0.1.114 32400 netmask 255.255.255.255 
access-group INSIDE-IN in interface inside
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 inside
http 10.0.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
sysopt noproxyarp inside
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd dns 213.80.98.2 213.80.101.3
!
dhcpd address 10.0.1.20-10.0.1.105 inside
dhcpd lease 86400 interface inside
dhcpd enable inside
!

threat-detection basic-threat
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:4c7b345bf4cb619e9a6651631e765ddb
: end
no asdm history enable

Ok the problem in the outside access list:

access-list outside_access_in extended permit tcp any host 10.0.1.114 eq 32400 

it should be like this:

access-list outside_access_in extended permit tcp any interface outside eq 32400 

In ASA 8.2 -> you have to specify the public address in the access list, the opposite happens in 8.3 and later versions.

Its related to the fact that the ACL check comes before NAT in 8.2 versions

 

 

Hi!

I can see the change made in my config. But still no luck... Is there any way to check if the port actually is opened? I was looking at my switch and saw "ACL" - maybe the problem is somewhere else. My latest config attached - does it to your trained eyes look as if the FW is open on port 32400?

D

Update: Not sure that it means anything - I checked a few "is the port open"-sites, they all said 32400 is closed.

Update 2: Standard ACL is empty. Should it be?

Update 3: Pretty please (with sugar and syrup)?

: Saved
:
ASA Version 8.2(5) 
!
hostname ciscoasa
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
 description WAN
 switchport access vlan 2
!
interface Ethernet0/1
 description LAN
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.0.1.10 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
ftp mode passive
object-group service plex tcp
 description plex
 port-object eq 32400
 port-object eq www
access-list INSIDE-IN remark Allow all traffic from LAN
access-list INSIDE-IN extended permit ip 10.0.1.0 255.255.255.0 any 
access-list INSIDE-IN extended permit tcp host 10.0.1.114 any eq 32400 
access-list outside_access_in extended permit tcp any interface outside eq 32400 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (inside) 1 10.0.1.0
global (outside) 1 interface
nat (inside) 1 10.0.1.0 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 32400 10.0.1.114 32400 netmask 255.255.255.255 
access-group INSIDE-IN in interface inside
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 inside
http 10.0.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
sysopt noproxyarp inside
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd dns 213.80.98.2 213.80.101.3
!
dhcpd address 10.0.1.20-10.0.1.105 inside
dhcpd lease 86400 interface inside
dhcpd enable inside
!

threat-detection basic-threat
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
webvpn
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
  inspect icmp 
  inspect icmp error 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:17b25f82f3930761322d41737bbbe65f
: end
no asdm history enable

hate to resurrect an ancient post, but I'm running into a similar issue. Does someone have any idea how to set this up through ASDM? screenshot would be super helpful.

Review Cisco Networking products for a $25 gift card