I configured some NAT port forwarding through SDM(as a newbie) but none of them worked for me. For example, I have a web server behind the router, so I setup a IP forwarding from my external static IP to the web server's internal IP 192.168.1.xxx through port 80, but after that when I type in the web server's domain name xxxx.com, it will forward me to the router SDM Express remote login site. Same thing happens for https through port 443.
Without that, my first thought is that you need to tell asdm where to listen. You do this by modifying what interfaces the internal http server listens on. The command is 'http 192.168.1.0 inside', with your subnet listed of course. Make sure that statement doesn't say "outside" or your router is listening for http requests to its external ip address.
If this is a needed functionality, you would probably have to provision another static ip address that's not your router's external interface, that way the router won't think the http packet is for it.
The only place I use the gui on Cisco gear is on an ASA5520 for use as a vpn concentrator. I use ASDM 5.2 so it may be different.
In mine, I go to 'Configuration', Properties, Device Access, HTTPS/ASDM. This is where I can see where the access is allowed.
From a cli standpoint, if you can telnet/ssh to the router, do the following:
sh run | inc http
It will come back with any lines that contain http in it. You can then see if it's in there. So if you had a line that said 'http 0.0.0.0 0.0.0.0 outside', you would just enter the command 'no http 0.0.0.0 0.0.0.0 outside'.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...