Solved

Cisco > ASA5500 > Setting up a NAT address to a port.

Posted on 2006-11-28
8
266 Views
Last Modified: 2010-04-10
I have having trouble setting up a NAT translation rule for a port that I want to redirect to a server.  I currently have one that does work, and I have basically copied that rule, changing the port number but still no luck.

I would like some help to setup a rule that will forward request to <IP address>:448/blah/ or http://servername.domain.com:448/blah/ to go to 192.168.223.253 on port 448.
0
Comment
Question by:iceman19330
  • 4
  • 4
8 Comments
 
LVL 7

Expert Comment

by:knightrider2k2
ID: 18030923
Example

static (inside,outside) tcp 4.3.2.1 448 192.168.223.253 448 netmask 255.255.255.255

Access-list outside_in extended permit any host 4.3.2.1 eq 448
0
 

Author Comment

by:iceman19330
ID: 18030948
Are those command line entries?
0
 
LVL 7

Expert Comment

by:knightrider2k2
ID: 18030967
yes.
0
 

Author Comment

by:iceman19330
ID: 18031007
Access-list outside_in extended permit any host 4.3.2.1 eq 448

Result of the command: "Access-list outside_in extended permit any host 4.3.2.1 eq 448"

Access-list outside_in extended permit any host 4.3.2.1 448
                                                        ^
ERROR: % Invalid input detected at '^' marker.
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 
LVL 7

Expert Comment

by:knightrider2k2
ID: 18031050
sorry

access-list outside_in extended permit tcp any host 4.3.2.1 eq 448
0
 
LVL 7

Accepted Solution

by:
knightrider2k2 earned 500 total points
ID: 18031068
also

access-group outside_in in interface outside
0
 

Author Comment

by:iceman19330
ID: 18031179
I dont seem to be getting anything forwarded to port 25 any longer?
Could something have been disabled?
0
 

Author Comment

by:iceman19330
ID: 18031279
Okay that was freaky, but it looks okay now.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

I've written instructions for one router type, but this principle may be useful for others of the same brand and even other brands of router. Problem: I had an issue especially with mobile devices that refused to use DNS information supplied via…
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now