02-01-2015 08:20 AM - edited 03-11-2019 10:25 PM
Hi!
OK, clearly I am in over my head here. I am trying to do a port forward for Plex running on a NAS inside the 5505. I have tried tens of different ways, and now I have run out of guides... What is the smoothest way of doing a port forward?
David
02-02-2015 08:10 AM
Hi!
I just found a new way here: http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html
It seems promising...but still does not work. In ASDM thee rule looks like this:
Is there anything obviously wrong?
D
02-02-2015 11:30 PM
Hello David,
Have you opened the outside ACL for the needed service port ?
can you please send me the show running in a file and i can give you the complete needed configuration for this.
regards,
Tariq
02-03-2015 02:34 AM
Hi!
I think I have. In the ACL Manager I can see the rules allowing traffic to and from .114 on port 32400. Same on Access Rules. And on NAT Rules I see .114 as original on 32400 and "outside" as Translated.
I am including my config dump - as you can see, this is the first "tweak" I have added.
D
: Saved : ASA Version 8.2(5) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted names ! interface Ethernet0/0 description WAN switchport access vlan 2 ! interface Ethernet0/1 description LAN ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 100 ip address 10.0.1.10 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address dhcp setroute ! ftp mode passive object-group service plex tcp description plex port-object eq 32400 port-object eq www access-list INSIDE-IN remark Allow all traffic from LAN access-list INSIDE-IN extended permit ip 10.0.1.0 255.255.255.0 any access-list INSIDE-IN extended permit tcp host 10.0.1.114 any eq 32400 access-list outside_access_in extended permit tcp any host 10.0.1.114 eq 32400 pager lines 24 logging enable logging asdm informational mtu inside 1500 mtu outside 1500 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 global (inside) 1 10.0.1.0 global (outside) 1 interface nat (inside) 1 10.0.1.0 255.255.255.0 nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface 32400 10.0.1.114 32400 netmask 255.255.255.255 access-group INSIDE-IN in interface inside access-group outside_access_in in interface outside timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy http server enable http 192.168.1.0 255.255.255.0 inside http 10.0.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart sysopt noproxyarp inside crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd dns 213.80.98.2 213.80.101.3 ! dhcpd address 10.0.1.20-10.0.1.105 inside dhcpd lease 86400 interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200 webvpn ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp inspect icmp error ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:4c7b345bf4cb619e9a6651631e765d db : end no asdm history enable
02-03-2015 02:44 AM
Ok the problem in the outside access list:
access-list outside_access_in extended permit tcp any host 10.0.1.114 eq 32400
it should be like this:
access-list outside_access_in extended permit tcp any interface outside eq 32400
In ASA 8.2 -> you have to specify the public address in the access list, the opposite happens in 8.3 and later versions.
Its related to the fact that the ACL check comes before NAT in 8.2 versions
02-05-2015 05:44 AM
Hi!
I can see the change made in my config. But still no luck... Is there any way to check if the port actually is opened? I was looking at my switch and saw "ACL" - maybe the problem is somewhere else. My latest config attached - does it to your trained eyes look as if the FW is open on port 32400?
D
Update: Not sure that it means anything - I checked a few "is the port open"-sites, they all said 32400 is closed.
Update 2: Standard ACL is empty. Should it be?
Update 3: Pretty please (with sugar and syrup)?
: Saved : ASA Version 8.2(5) ! hostname ciscoasa enable password 8Ry2YjIyt7RRXU24 encrypted passwd 2KFQnbNIdI.2KYOU encrypted names ! interface Ethernet0/0 description WAN switchport access vlan 2 ! interface Ethernet0/1 description LAN ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! interface Vlan1 nameif inside security-level 100 ip address 10.0.1.10 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address dhcp setroute ! ftp mode passive object-group service plex tcp description plex port-object eq 32400 port-object eq www access-list INSIDE-IN remark Allow all traffic from LAN access-list INSIDE-IN extended permit ip 10.0.1.0 255.255.255.0 any access-list INSIDE-IN extended permit tcp host 10.0.1.114 any eq 32400 access-list outside_access_in extended permit tcp any interface outside eq 32400 pager lines 24 logging enable logging asdm informational mtu inside 1500 mtu outside 1500 icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 global (inside) 1 10.0.1.0 global (outside) 1 interface nat (inside) 1 10.0.1.0 255.255.255.0 nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface 32400 10.0.1.114 32400 netmask 255.255.255.255 access-group INSIDE-IN in interface inside access-group outside_access_in in interface outside timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy http server enable http 192.168.1.0 255.255.255.0 inside http 10.0.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart sysopt noproxyarp inside crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd dns 213.80.98.2 213.80.101.3 ! dhcpd address 10.0.1.20-10.0.1.105 inside dhcpd lease 86400 interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200 webvpn ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp inspect icmp error ! service-policy global_policy global prompt hostname context no call-home reporting anonymous Cryptochecksum:17b25f82f3930761322d41737bbbe6 5f : end no asdm history enable
11-12-2019 10:14 PM
hate to resurrect an ancient post, but I'm running into a similar issue. Does someone have any idea how to set this up through ASDM? screenshot would be super helpful.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide