Port forwarding with PIX 501

I try to get my PIX 501 to forward traffic on port 1412 with TCP and UDP to use Direct Connect, and the problem I have is I can connect to a DC hub, but cannot establish connections with users.

I added the following to the default configuration from the factory with a partial success:

outside access list permit tcp any host 192.168.100.20 eq 1412

access-list outside permit udp any host 192.168.100.20 eq 1412

public static tcp (indoor, outdoor) interface 1412 192.168.100.20 1412 netmask 255.255.255.255 0 0

public static tcp (indoor, outdoor) interface 1412 192.168.100.20 1412 netmask 255.255.255.255 0 0

In the debug log set to the access list I rule this type of errors:

Deny tcp src outside other.users.ip.addr/3099 dst within the my.public.ip.addr/1412 by access-group "access_outside_in".

TCP request discarded outside my.public.ip.addr/45961 other.users.ip.addr/2362

I'm quite lost as to why it does not work when I think it should. I tried several ways, opening of port ranges and no chance for a transfer of the port sucsessful.

You can change you, outside the ACL to the following:

outside access list permit tcp any host eq 1412

access-list outside permit udp any host eq 1412

outside access-group in external interface

Save again with: write mem and also issue: clear xlate

I would like to know if it works.

Jay

Tags: Cisco Security

Similar Questions

  • Problem of recovery of password with pix 501

    Hello

    my organization uses a firewall 501 pix with version 6.2 of the software. After I lost the password I tried earasing using the faq provided on this site (using the file np62.bin through a TFTP server).

    Unfortunately, I can not connect using the password default "cisco."

    Thank you

    Raphaël Cohen, University of Tel Aviv

    Hello Raphael,.

    You need to connect to the PIX via the port on the PIX console. If you deleted the passwords, then (as mentioned before), there is NO password to access privileged EXEC access just don't hit back, now, you will need to configure a password to "enable" with command > pix # enable password - the password is case-sensitive and can be a combination of characters and numbers the length of the password is limited to 16 characters.

    You can now set access telnet as well i.e. config mode > pix (config) # telnet [masque_sous] [interface_name]

    example: (in config mode) telnet 192.168.10.10 255.255.255.0 inside

    Good idea to use the static IP address for the above, makesure to save your config with cmd: write memory

    Hope this helps - Jay

    PS. Thanks to vote this post if it helped you so that other members can use it if they have the same problem you have - that helps! Thank you.

  • Port redirection with pix

    Hi, I am trying set up port forwarding on a PIX 515 running version 6.3 (3) and nowhere fast.

    The idea is to redirect the traffic from port 25 to port 2525 and the static command, I tried is as follows:-

    static (inside, outside) tcp 25 X.X.X.X Y.Y.Y.Y 2525 netmask 255.255.255.255 0 100

    Where X.X.X.X is a public address and Y.Y.Y.Y is a private address.

    Also, I added a line of the access list to port 25 for incoming host X.X.X.X.

    The redirect does not work. I even went as far as the test on a web server, forwarding port 80 to 8080, but traffic is sent to port 80, regardless of the static command.

    Can someone please tell me what I'm doing wrong? My understanding is that the port redirects were possible with the later pix 6.0 or version software.

    Thanks in advance,

    Rick

    No sweat. I almost always overlook the simplest things so when someone else has a problem, I start easy and move up. Usually solves the problem more quickly.

    As for your other question, Yes, it is normal. Remember that static is bi-directional translations. Thus, when you added the port information in the static command to the SMTP server, the PIX only knows now to translate packets from TCP/2525 (I think that's how you had it). When your mail server tries to send outgoing mail, the source port will be an ephemeral port (IE not 2525 probably). So, I usually people do something like this:

    static (inside, outside) tcp 1.1.1.1 25 10.1.1.1 2525 netmask 255.255.255.255

    NAT (inside) 2 10.1.1.1 255.255.255.255

    Global 2 1.1.1.1 (outside)

    It takes care of everything in both directions of the 10.1.1.1 host (for example).

    Hope that this helps explain the issues. Good luck.

    Scott

  • Problem setting up Port Forwarding with two routers.

    I can't set up by Linksys RT31P2 and routers port forwarding WRT160Nv3.

    My setup is Webstar Modem = RT31P2 = WRT160N = Mac OS 10.6.5. (No configurable modem and ISP do not prevent port forwarding. It comes with two Linksys routers).

    I had a Monty Python-going around with the support of Cisco cat; and follow up with telephone assistance in which the agent knew nothing about port forwarding and his supervisor expressed the view that it was not possible with two routers. Sigh.

    If anyone can help me with step by step specific and simple instructions to configure routers. I know that the basic procedures. I'm not clear, what exactly changes on routers.

    I read that portforward.com has to say and it does not work so I must be misunderstanding something.

    The ip address of my computer is 192.168.1.103.  Are the last three digits of this speech concluded the two routers in the area on the port forwarding page? What other changes should be done what router?

    I know the port numbers that I use are OK because I can implement successfully if I connect to one or other of the routers (but not both), and my software of p2p shows port are open.

    Any help and suggestions most welcome.

    If you set up as I have suggested that you have only a single LAN that will be using in your addresses * 192.168.15 case. So in your case:

    1. change the address LAN IP of 192.168.1.1 to 192.168.15.2 WRT.
    2 disable the DHCP server.
    3. connect the LAN of the WRT port to port LAN of the RT.

    That's all. Disable the DHCP server will not affect whatever it is that you're connected LAN - LAN and DHCP server on the RT is still operational.

    After the change, previously the WRT computers may require a reboot to get a new address 192.168.15. *.

    Your computer to which you are transferring must have an IP static and not dynamic (or variable). Check the current IP information on this computer. It must have an IP address like 192.168.15.103, mask 255.255.255.0, gateway 192.168.15.1 subnet and DNS 192.168.15.1 server or maybe two other IP addresses instead. Note DNS servers if you do not 192.168.15.1.

    Then configure a static IP address on the computer. Use something like 192.168.15.10, 255.255.255.0 gateway 192.168.15.1 and the DNS servers you found before.

    After this implement 192.168.15.10 port forwarding.

  • RVS4000, port forwarding - with - IP-based ACL

    G ' Day!

    I want to know if it is possible to enable port forwarding and paste an IP based ACL on the attacker.

    Scenario:

    I replaced my gateway linux with a RVS4000 and reinstalled my linux machine as a file server with sshd running (now residing on my network behind the RVS4000).

    I have forwarded port 22 on the RVS4000 on my linux server - it works as expected. Now I want to restrict which IP addresses which may connect to port 22, that I can't go to work.

    After I forward port 22 to the linux server I can't control it with IP based ACL. Even if I deny all traffic to port 22, it will leave borrowing at the server linux as long as the port is active.

    I am doing something wrong or if this isn't just intended to work the way I want?

    acl based port will not work with the port forwarding on the device. Once you transfer the port are all allowede to enter this port. the acl will not take effect. I think that what you want to do the port binding is not a feature of this device.

  • Opening of port 22 in PIX 501

    I would like to access my PC location xyz. How can I open port 22 access to my pc. I use pix 501.

    Can anyone provide commands to open the port so that I can access my pc.

    Thank you

    totally agree because only 3 commands are needed.

    list of allowed inbound tcp access any eq 22

    public static tcp (indoor, outdoor) interface 22 22 netmask 255.255.255.255 0 0

    clear xlate

    However, all of these commands are missing in the config you have posted.

  • Problems with PIX 501 and Server MS Cert

    Hi all

    I have two problems with my PIX 501:

    1. registration works well. The pix has a certificate and use it with SSL and VPN connections. But after a refill, the pix certificate is lost and it has regenerated again self-signed certificate!

    Yes, I wrote mem and ca records all!

    2. at the request of ca CRL , I get the following debugging:

    Crypto CA thread wakes!

    CRYPTO_PKI: Cannot be named County ava

    CRYPTO_PKI: transaction GetCRL completed

    Crypto CA thread sleeps!

    CI thread wakes!

    And the CRL is empty.

    Does anyone have any idea?

    Bert Koelewijn

    Not sure about 1, but 2 is usually caused by the COP (Point of Distribution of CRL, basically the situation where the PIX can download the Revocation list from) listed in cert CA is in a format the PIX does not, generally an LDAP URL.

    Check the following prayer:

    Open the administration tool of CA (Certification Authority) then

    (1) right click on the name of CA and choose 'properties '.

    2) click on the tab "Policy Module".

    3) click on the button "configure."

    4) click on the tab "X.509 extensions".

    > From there, it can display the list of the "CRL Distribution Points".

    Turn off everything that isn't HTTP.

    You need to reinstall the CERT in the PIX, I think, but then it should be able to download the CRL through HTTP instead of LDAP.

  • Limited number of ports forwarding with WAG54G2?

    Hello, I have a simple question... I'm looking to buy a WAG54G2, I downloaded the manual to check if there was a limit of ports to send because I know that it was a limitation on previous models, but I've found no information about it.

    Please can someone tell me if there is still such a restriction on this model (I think limit 10 ports on WAG54G)?

    Thank you

    Colin.

    WAG54G2 have still 10 entries for Port Forwarding (see this ), however, you can give a range of ports if you have more than 10 entries... (for example: If you have 11, 36, 48, 1014, 5214, 6452, you can just give him a range say: 11-6452, it will cover all ports between 11 and 6452)...

  • VPN with PIX 501

    Help!

    I'm trying to set up VPN on my PIX 501. I have no experience of the PIX and have no idea where to start!

    Any help will be greatly appreciated.

    Thank you

    Bennie

    access list allow accord a

    where is the name of the access list that you applied the entrants to your external interface. You may also allow accord coming out, if you have a list of incoming configured access to your inside interface.

  • Problem with PIX 501-> L2L 1721 VPN

    I am setting up a site to site vpn according to the http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008051a69a.shtml.

    I want to connect 192.168.105.0/24 and 192.168.106.0/24.

    PIX01 is 192.168.106.1, with dynamic external IP (B.B.B.B)

    RTR01 is 192.168.105.1, with dynamic external IP address (I'm just using DHCP current address of the ISP as A.A.A.A in the config of PIX01 - this is a temporary application, not critical where I can update the address if necessary)

    It seems that the VPN tunnel is established but traffic does not return the router to the pix.  I temporarily hosted all of the traffic on indoor/outdoor PIX interfaces (and icmp).

    If I enable icmp debug I see ping requests from the client to 192.168.106.100 internal interface of the router (192.168.105.1), but no return icmp:

    On PIX01:

    180:-Interior ICMP echo request: 192.168.105.1 ID = 1 length = 40 seq = 298 192.168.106.100
    181:-Interior ICMP echo request: 192.168.105.1 ID = 1 length = 40 seq = 299 192.168.106.100
    182:-Interior ICMP echo request: 192.168.105.1 ID = 1 length = 40 seq = 300 192.168.106.100
    183:-Interior ICMP echo request: 192.168.105.1 ID = 1 seq = length 301 = 40 192.168.106.100

    On RTR01:
    * 03:40:46.885 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100
    * 03:40:51.713 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100
    * 03:40:56.713 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100
    * 03:41:01.709 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100

    Output of running sh crypto isakmp his:

    PIX01 (config) # sh crypto isakmp his
    Total: 1
    Embryonic: 0
    Src DST in the meantime created State
    A.A.A.A B.B.B.B 0 1 QM_IDLE

    RTR01 #sh crypto isakmp his
    status of DST CBC State conn-id slot
    A.A.A.A B.B.B.B QM_IDLE 1 0 ACTIVE

    Out of HS crypto ipsec his:

    PIX01 (config) # sh crypto ipsec his

    Interface: outside
    Crypto map tag: IPSEC, local addr. B.B.B.B

    local ident (addr, mask, prot, port): (192.168.106.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.105.0/255.255.255.0/0/0)
    current_peer: A.A.A.A:500
    LICENCE, flags is {origin_is_acl},
    #pkts program: 103, #pkts encrypt: collection of #pkts 103, 103
    #pkts decaps: 0, #pkts decrypt: 0, #pkts check 0
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0, #pkts decompress failed: 0
    #send 12, #recv errors 0

    local crypto endpt. : B.B.B.B, remote Start crypto. : A.A.A.A
    Path mtu 1500, overload ipsec 56, media, mtu 1500
    current outbound SPI: 7cb75998

    SAS of the esp on arrival:
    SPI: 0xb896f6c6 (3096901318)
    transform: esp - esp-md5-hmac.
    running parameters = {Tunnel}
    slot: 0, conn id: 1, crypto card: IPSEC
    calendar of his: service life remaining (k/s) key: (4608000/3151)
    Size IV: 8 bytes
    support for replay detection: Y

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0x7cb75998 (2092390808)
    transform: esp - esp-md5-hmac.
    running parameters = {Tunnel}
    slot: 0, conn id: 2, crypto card: IPSEC
    calendar of his: service life remaining (k/s) key: (4607999/3151)
    Size IV: 8 bytes
    support for replay detection: Y

    outgoing ah sas:

    outgoing CFP sas:

    RTR01 #sh crypto ipsec his

    Interface: Vlan600
    Crypto map tag: IPSEC, local addr A.A.A.A

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (192.168.105.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.106.0/255.255.255.0/0/0)
    current_peer B.B.B.B port 500
    LICENCE, flags is {}
    program #pkts: 10, #pkts encrypt: 10, #pkts digest: 10
    decaps #pkts: 10, #pkts decrypt: 10, #pkts check: 10
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    Errors #send 0, #recv 0 errors

    local crypto endpt. : A.A.A.A, remote Start crypto. : B.B.B.B
    Path mtu 1500, mtu 1500 ip, ip mtu BID Vlan600
    current outbound SPI: 0xB896F6C6 (3096901318)

    SAS of the esp on arrival:
    SPI: 0x7CB75998 (2092390808)
    transform: esp - esp-md5-hmac.
    running parameters = {Tunnel}
    Conn ID: 2002, flow_id: SW:2, crypto card: IPSEC
    calendar of his: service life remaining (k/s) key: (4556997/3076)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0xB896F6C6 (3096901318)
    transform: esp - esp-md5-hmac.
    running parameters = {Tunnel}
    Conn ID: 2001, flow_id: SW:1, crypto card: IPSEC
    calendar of his: service life remaining (k/s) key: (4556997/3076)
    Size IV: 8 bytes
    support for replay detection: Y
    Status: ACTIVE

    outgoing ah sas:

    outgoing CFP sas:

    I can provide more information if necessary.

    Thanks in advance for any help,

    CJ

    ISAKMP uses UDP/500 and it is true he helped through phase 1 being upwards (QM_IDLE).

    IPSec uses ESP or UDP/4500, and this is what must be authorized by the FW.

  • Help the PIX 501 - cannot access startup.html

    I'm new to the network and has received a job to configure the PIX 501 firewall.

    The fact is:

    We use IP table rules as a firewall on a linux machine. My pc is connected to a switch. So I use the yellow network cable to connect the port of the Pix 501 0 to the port in the switch. Then I disconnect my pc of swich cable and plug into the port of the Pix 501 1.

    My pc is to use a static ip address before. I try to change to automatically get an IP address, but it will not work. So I changed the setting and use the IP address originally. Pop up message network connection icon says that the local connection is enabled. But when I try to ping 192.168.1.1, request time-out. Also I can't acess the https://192.168.1.1/startup.html.

    I have a look at Books Online cisco and shootings of disorder, but most of them talk about the configuration or more advance features. I'm still on the very basic level to try to connect to the firewall.

    I hope someone can help me. All ideas and questions are welcome. Thank you.

    Your IP address should be fine. You do not want to have the PIX connected to your local network, even if you have the Linux firewall as well as this will cause a conflict. Keep the PIX the LAN for now. Your DNS configuration will have no effect because the url you are trying to reach is based on the IP address and not the domain name if your PC has nothing to look for.

    You have to check the cable that you use - if your PIX has only an 'inside' interface, then you must use a crossover cable. If he has four so it's built in switch for a straight cable will be fine. Is what PIX model?

    After checking the cable - see if you can console in the firewall - use the blue cable that came with the PIX and set up a connection (hyper terminal) terminal with the help of 9600, 8, no 1. If you can console and then you can stick in a basic configuration you can get.

  • port forwarding issues

    I played with port forwarding with my two cams of linksys and other 3 g wireless network web pages on my local network I want to access from the outside world.  I have one to configure them to use other port 8081, but after a few experiments see it as useless.

    I have a router linksys WRT54GL running dd - wrt V23 SP2 firmware and ports 80,81 and 443 (all in the field "port of") transmitted to cam1, cam2 and Western Digital NAS drive respectively. I found that because I'm port forwarding in any case, the two cams can continue to use port 80 and I 80 and 81 in the ' port of "or side defined WAN port 8080 bothers me to my router gui.

    There's the rub for me, it is, I cannot use 80,81 and 443 of the side ports WAN routers forward my port, if I use a different port, I can't access anything whatsoever that is served as a web page. I discovered this when I installed the Transmission torrent client on my NAS drive, it has a web interface as well and uses the port 9091, however when I port transfer it via my router I can't web interface from outside my local network. If I change the WAN or 'port' 80 or 81 and let the 'port' to 9091 I get fine, but I need to disable the port front of webcam that uses this port.

    I was going to get a 3rd and 4th IP Cam but will have the same problem, because it seems that only I can use ports 80, 81 and 443, and they are already exhausted. (I use 443 for secure access to my NAS drive) Change the port number in settings/options to 1024 or anything else works that if I leave it on the side of port forwarding LAN, WAN-side must always be 80 or 81.

    The only way I can see around this is to create a page that will reside on my router or my drive NAS I can show more out of a camera on it - something, I want to do in any case.

    PS. I do not use TZO, but I use dyndns so my dns is myname.dyndns.org.

    Finally understood that there is a problem with blocked ports from my place of work, which is where I tried to connect from. When I connected to the internet with my laptop computer and aircard, I was able to get to ok. My solution when I want to check on the torrents of the work is to connect to my router GUI work, changing the port 80 or 81 and disable the webcam on this address.

  • port forwarding TCP on pix 501

    can you tell me how to port forward or open tcp 21 and 1024-2774 for the end user of a backup system remotely via the pix Manager or regular here is a copy of my config thanks my apologies if this is a little wave building configuration...

    : Saved

    :

    6.2 (2) version PIX

    ethernet0 nameif outside security0

    nameif ethernet1 inside the security100

    activate the password

    pixfirewall hostname

    domain ciscopix.com

    fixup protocol ftp 21

    fixup protocol http 80

    fixup protocol h323 h225 1720

    fixup protocol h323 ras 1718-1719

    fixup protocol they 389

    fixup protocol rsh 514

    fixup protocol rtsp 554

    fixup protocol smtp 25

    fixup protocol sqlnet 1521

    fixup protocol sip 5060

    fixup protocol 2000 skinny

    names of

    list of access allow-permit tcp any any eq www

    access list permits allow tcp everything any https eq

    list of access allow-permit udp any any eq isakmp

    list of access allow-permit udp any any eq field

    list of access allow-permit tcp any any eq telnet

    list of access allow-permit tcp any any eq ftp

    access list permit to allow icmp a whole

    access list allow allow an entire esp

    list of access allow-permit tcp any any eq ssh

    list of access allow-permit tcp any any eq - ica citrix

    list of access allow-permit tcp any any eq pop3

    list of access allow-permit tcp any any eq smtp

    list of access allow-permit tcp any any eq aol

    access list, allow-in allow an entire esp

    access list allow component snap permit udp any any eq isakmp

    access list, allow-in allow icmp a whole

    access list allow component snap permit tcp any any eq ssh

    pager lines 24

    interface ethernet0 10baset

    interface ethernet1 10full

    Outside 1500 MTU

    Within 1500 MTU

    IP address outside x.x.x.226 255.255.255.240

    IP address inside 192.168.1.1 255.255.255.0

    alarm action IP verification of information

    alarm action attack IP audit

    location of PDM 192.168.1.3 255.255.255.255 inside

    location of PDM 192.168.1.5 255.255.255.255 inside

    location of PDM 192.168.1.6 255.255.255.255 inside

    location of PDM 192.168.1.7 255.255.255.255 inside

    location of PDM 192.168.1.8 255.255.255.255 inside

    location of PDM 192.168.1.9 255.255.255.255 inside

    PDM location x.x.x.88 255.255.255.255 outside

    location of PDM 192.168.1.10 255.255.255.255 inside

    location of PDM 192.168.1.11 255.255.255.255 inside

    PDM logging 100 information

    history of PDM activate

    ARP timeout 14400

    Global 1 interface (outside)

    NAT (inside) 1 0.0.0.0 0.0.0.0 0 0

    public static x.x.x.227 (Interior, exterior) 192.168.1.9 netmask

    255.255.255.255 0 0

    public static x.x.x.228 (Interior, exterior) 192.168.1.8 netmask

    255.255.255.255 0 0

    public static x.x.x.229 (Interior, exterior) 192.168.1.3 netmask

    255.255.255.255 0 0

    public static x.x.x.230 (Interior, exterior) 192.168.1.5 mask

    255.255.255.255 0 0

    public static x.x.x.231 (Interior, exterior) 192.168.1.7 netmask

    255.255.255.255 0 0

    public static x.x.x.232 (Interior, exterior) 192.168.1.6 netmask

    255.255.255.255 0 0

    Access - allows to group in the interface outside

    allow-out access-group in the interface inside

    Route outside 0.0.0.0 0.0.0.0 216.215.244.225 1

    Timeout xlate 0:05:00

    Timeout conn 0 half-closed 01:00:10: 00 udp 0: CPP 02:00 0:10:00 h323

    0:05:00 sip 0:30:00 sip_media 0:02:00

    Timeout, uauth 0:05:00 absolute

    GANYMEDE + Protocol Ganymede + AAA-server

    RADIUS Protocol RADIUS AAA server

    AAA-server local LOCAL Protocol

    Enable http server

    http 192.168.1.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    SNMP-Server Community public

    No trap to activate snmp Server

    enable floodguard

    Permitted connection ipsec sysopt

    No sysopt route dnat

    Telnet 192.168.1.0 255.255.255.0 inside

    Telnet timeout 5

    SSH timeout 5

    dhcpd address 192.168.1.2 - 192.168.1.33 inside

    dhcpd dns 64.89.70.2 64.89.74.2

    dhcpd lease 2000000

    dhcpd ping_timeout 750

    dhcpd outside auto_config

    dhcpd allow inside

    Terminal width 80

    Cryptochecksum:XXXXX

    : end

    [OK]

    Hello

    Port forwarding is different to allow ports through the firewall. I guess you meant allow tcp/21 and 21 1024-2774, right port?

    You need the following lines

    access list allow component snap permit tcp any any eq ftp

    access list allow component snap allowed tcp everything any 1024 2774 Beach

    You can be more specific and can replace "any" with the actual IP addresses

    Thank you

    Nadeem

  • Port Fowarding PIX 501

    Is it possible to forward port 80 to internal ip on a PIX 501?

    I have a PIX 501, which made PAT / internal DHCP for my network. I want to forward all queries [80] http to an internal web server.

    Thank you

    Sepyh...

    You can use port forwarding to get there.

    Here is an example configuration:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_tech_note09186a0080094aad.shtml#port

    Hope this helps,

    -Nairi

  • Need help with the port forwarding for a XBox remote Streaming

    I have a router R6200v2 and need help with port forwarding.

    I came across this set of instructions for setting up stream port forwarding XBox remotely from anywhere

    http://kinkeadtech.com/2015/07/how-to-stream-Xbox-one-to-Windows-10-from-anywhere-with-Internet/

    I have no idea when it comes to such things and I want to make sure I do it correctly without messing up my existing home network.

    Port Forwarding and triggering Port pages setup look very different from what the guy uses. Can someone walk me through what I do to set up please?

    Hi @varxtis,

    You must enter them in the field for a start external Port and external completion Port. You will need to send individually except for the range of 49000-65000. The steps are as follows.

    1. create a Service name (it could be something else that you cannot use the same service name twice. Ex. XBOX1, XBOX2 and so forth.)

    2. Select the type of service (TCP, UDP or both)

    3 entry 5050 times a start external Port and external endpoints.

    4. Select the IP address of your XBOX.

    5. Select apply.

    6 do the same for other port numbers. To the beach, use 49000 for the external departure Port and for the external completion Port 65000.

    Kind regards

    Dexter

    The community team

Maybe you are looking for