I am going to first apologize if my post is confusing or unclear.
Here's what I am trying to accomplish:
Apply an extended ACL allowing inbound SSL on my WAN port then port forward to an internal server.
I've created the following port forwarding and ACL entries listed below then applied the ACL to my outside WAN port. When the "ip access-group" is entered all outbound LAN and inbound WAN traffic appears blocked.
"Other permit statements in ACL can be remarked - trying to allow other traffic"
ACL entry when applied to outside interface:
ip access-group Outside_Access_in in --- after command is entered all traffic is blocked.
I've attached the entire running-config for anyone that has any thoughts. Background: I do understand that when you apply a Cisco ACL to an interface that there is an “implicit deny all” hidden at the end and this probably explains the complete loss of Internet connectivity.
you have to permit it through the firewall, i think it is the firewall blocking
ip access-list extended 161
permit tcp any host 192.168.14.5 eq 443
class-map type inspect match-all out_to_in match access-group 161
policy-map type inspect sdm-pol-NATOutsideToInside-1 class type inspect sdm-cls-sdm-pol-NATOutsideToInside-1-1 inspect class type inspect sdm-nat-smtp-1 inspect class type inspect sdm-nat-user-protocol--1-1 inspect
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :