Solved

ASA5505 open ports for to phone applicance

Posted on 2014-03-10
7
293 Views
Last Modified: 2014-03-11
I need to open a port for the phone guy to access the phone appliance.  He says:
Coming in on port 80 need access to 192.168.xxx.xxx?

Thank you,
Brooks
0
Comment
Question by:gbnorton
  • 4
  • 3
7 Comments
 
LVL 7

Expert Comment

by:tankergoblin
Comment Utility
port 80 is use by web server go to http://www.yougetsignal.com/tools/open-ports/ to double check whether it is open or not..
0
 
LVL 7

Expert Comment

by:tankergoblin
Comment Utility
go to this video a guide show you how to open port
http://www.youtube.com/watch?v=MW2_Rc9vj3o
0
 

Author Comment

by:gbnorton
Comment Utility
I should have specified I need the CLI commands.  The ASDM is not working at this time.  I am renewing SmartNet, but won't have it available for a few days.

I will look at the video when I have the ASDM fixed.
Thank you, Brooks
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 
LVL 7

Accepted Solution

by:
tankergoblin earned 500 total points
Comment Utility
asa5505(config)# object network PhoneAppliance
asa5505(config-network-object)# host 192.168.xxx.xxx
sa5505(config-network-object)# nat (inside,outside) static interface service tcp 80 80
asa5505(config)# access-list outside_access_in permit tcp any object PhoneAppliance eq                    80 any


ensure you port 80 is not use by any other server...
0
 

Author Comment

by:gbnorton
Comment Utility
Excellent.  I'll be able to try in a couple hours.  I'll report back afterwards.
Thanks,
Brooks
0
 
LVL 7

Expert Comment

by:tankergoblin
Comment Utility
who is brooks??
0
 

Author Closing Comment

by:gbnorton
Comment Utility
g 'brooks' norton
I did not have to try your code after all.  but I'll keep it for next time.  Thanks for your help.
Brooks
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

There are many useful and sometimes not well documented or forgotten IOS or ASA/PIX commands. See IPE article here , there was also one on PacketU and on Cisco Tips & Tricks. Below are my favorites. I give also a few most often used for Cisco IPS an…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now