<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP NAT INSIDE VLAN Hostname Resolution Issue in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297987#M289684</link>
    <description>&lt;P&gt;Ok I'm lost.&lt;/P&gt;
&lt;P&gt;You said: "&lt;SPAN&gt;when trying to resolve the hostname within the VLAN still does not work"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is your dns server?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does this means that when using nslookup you're not able to resolve the hostname with the right public ip?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 Dec 2017 15:13:48 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2017-12-18T15:13:48Z</dc:date>
    <item>
      <title>IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297500#M289651</link>
      <description>&lt;P&gt;I am not sure if using IP NAT inside static or destination could fix this issue.&amp;nbsp; We are having issues with clients within the VLAN using hostname resolution to access applications all on the SAME static IP from being able to access the pages from within the vlan, but works fine over the external LAN for all external global users.&amp;nbsp; NSlookup shows the public IP Address when checking the hostname, but the VLAN machines are unable to access it - it's not translating back to the internal address etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip nat inside source route-map FE0_General_Failover interface FastEthernet0 overload&lt;BR /&gt;ip nat inside source route-map GE8_General_Failover interface GigabitEthernet8 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.0.200 81&amp;nbsp;55.55.55.55&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;81 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.201 443 55.55.55.55 443 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8040 55.55.55.55 8040 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8041 55.55.55.55 8041 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.203 8250 55.55.55.55 8250 extendable (static IP has bee updated in the above example).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;route-map GE8_General_Failover permit 1&lt;BR /&gt;match ip address 1&lt;BR /&gt;match interface GigabitEthernet8&lt;BR /&gt;!&lt;BR /&gt;route-map FE0_General_Failover permit 1&lt;BR /&gt;match ip address 1&lt;BR /&gt;match interface FastEthernet0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically - we have ports opened so applications and services can be accessed via hostname external.&amp;nbsp; An example of this is hr.mydomain.com.&amp;nbsp; All external users have no problem access the server.&amp;nbsp; However, the users in the VLAN are the ones that are not able to access the server via hostname automatically.&amp;nbsp; I know that with the DNS Server from Windows Server I can add this hostname and point it to the private IP within the VLAN.&amp;nbsp; However, not all servers are on the DNS server within the VLAN and some use public DNS Servers such as 4.2.2.2 and 8.8.8.8.&amp;nbsp; The problem here is when one of these stations goes to look up the domain it gets the public IP Address on GE8 and then it says connection timeout and the connection never works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why is the Cisco router for the NAT parameters above not taking the command from the public IP address and sending into back into the internal one.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Previously these servers were running from a cheap D-Link environemtn and it had no problem allowing the VLAN users to connect to the servers via the hostname vs. static IP Address - it knew - why isn't the Cisco knowing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have read various DNS doctoring technics, however, I cannot seem to get the router to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just want a client within the VLAN using a public DNS Server - when it returns the public static IP Address for it to just work.&amp;nbsp; This seems to work correctly when all applications ahve their own static IP address, however, we don't have enough access from the ISP to allow for multi statics per application server, etc.&amp;nbsp; Obivously we will look into doing this, but why did the cheap D-Link make it so simple and the Cisco ISR make it so hard.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the work around to get this to work?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keep me posted if you have any ideas.&amp;nbsp; Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Device: Cisco 891f-K9&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 17:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297500#M289651</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2019-03-05T17:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297505#M289653</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;Can you share the full config? I would like to see your acl 1 used for NAT. &lt;BR /&gt;Have you tried adding few lines at the top this acl to deny NAT for internal hosts to your router public IP, here IP 55.55.55.55 based on snippet given. &lt;BR /&gt;</description>
      <pubDate>Sun, 17 Dec 2017 22:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297505#M289653</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-17T22:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297517#M289658</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As requested here is the running configuration:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hostname Test-Router&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;aqm-register-fnf&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone EST -5 0&lt;BR /&gt;!&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.0.1 192.168.0.99&lt;BR /&gt;ip dhcp excluded-address 192.168.0.200 192.168.0.254&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool internal&lt;BR /&gt;&amp;nbsp;network 192.168.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;dns-server 192.168.0.213 4.2.2.2 8.8.8.8&lt;BR /&gt;&amp;nbsp;domain-name test.local&lt;BR /&gt;&amp;nbsp;default-router 192.168.0.1 &lt;BR /&gt;&amp;nbsp;lease 14&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip domain name router.testrouter.local&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid C891F-K9&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;class-map match-all Voice&lt;BR /&gt;&amp;nbsp;match ip dscp ef &lt;BR /&gt;!&lt;BR /&gt;policy-map EGNVoice&lt;BR /&gt;&amp;nbsp;class Voice&lt;BR /&gt;&amp;nbsp; priority 25000&lt;BR /&gt;!&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface BRI0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation hdlc&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;isdn termination multidrop&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;interface GigabitEthernet6&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet7&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet8&lt;BR /&gt;&amp;nbsp;description 1GBPS Fiber&lt;BR /&gt;&amp;nbsp;ip address 55.55.55.56 255.255.255.0 secondary&lt;BR /&gt;&amp;nbsp;ip address 55.55.55.55 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;service-policy output EGNVoice&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.252.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface Async3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 55.55.55.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map FE0_General_Failover interface FastEthernet0 overload&lt;BR /&gt;ip nat inside source route-map GE8_General_Failover interface GigabitEthernet8 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.0.200 81 55.55.55.55 81 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.201 443&amp;nbsp;55.55.55.55 443 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8040&amp;nbsp;55.55.55.55 8040 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8041&amp;nbsp;55.55.55.55 8041 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.203 8250&amp;nbsp;55.55.55.55 8250 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 55.55.55.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map GE8_General_Failover permit 1&lt;BR /&gt;&amp;nbsp;match ip address 1&lt;BR /&gt;&amp;nbsp;match interface GigabitEthernet8&lt;BR /&gt;!&lt;BR /&gt;route-map FE0_General_Failover permit 1&lt;BR /&gt;&amp;nbsp;match ip address 1&lt;BR /&gt;&amp;nbsp;match interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 192.168.0.0 0.0.3.255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know exactly what you would like to test and I'd be more then happy to try any configuration you think would allow the internal VLAN workstations (192.168.0.0 /255.255.252.0) to access to internal servers without error messages and DNS resotluion problems when using the public DNS Servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Sun, 17 Dec 2017 23:47:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297517#M289658</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-17T23:47:54Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297518#M289659</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;I saw an email with your reply but it seems you deleted it or there's an issue with the forum. &lt;BR /&gt;You're using a standard acl that's: &lt;BR /&gt;access-list 1 permit 192.168.0.0 0.0.3.255&lt;BR /&gt;This acl is used for your nat.&lt;BR /&gt;&lt;BR /&gt;Try to remove that acl and use the following instead: &lt;BR /&gt;access-list 100 deny 192.168.0.0 0.0.3.255 host 55.55.55.55&lt;BR /&gt;access-list 100 deny 192.168.0.0 0.0.3.255 host 55.55.55.56&lt;BR /&gt;access-list 100 permit 192.168.0.0 0.0.3.255 any&lt;BR /&gt;&lt;BR /&gt;Let me know if that works</description>
      <pubDate>Mon, 18 Dec 2017 00:06:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297518#M289659</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-18T00:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297534#M289661</link>
      <description>&lt;P&gt;Hi Francesco that did not work - the pages still do not load with the following statements:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 100 permit ip 192.168.0.0 0.0.3.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 55.55.55.55&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 55.55.55.56&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did add the ip into the statements you sent over below.&amp;nbsp; In addition, I did update the route maps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, the nslookup still returns the public IP address, but the page does not load.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any other suggestions that you might have?&amp;nbsp; Willing to try anything.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 01:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297534#M289661</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-18T01:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297536#M289662</link>
      <description>Sorry weird, i still don't see your last post. &lt;BR /&gt;&lt;BR /&gt;You'll always receive answer with public IP when using nslookup add your servers have public DNS as you mentioned. &lt;BR /&gt;&lt;BR /&gt;What IP are you receiving from nslookup?&lt;BR /&gt;While accessing your public servers IP, can you run show ip nat translation and paste the output? &lt;BR /&gt;&lt;BR /&gt;Just took clarify, the goal is to access your servers with public IP from internal lan, right?</description>
      <pubDate>Mon, 18 Dec 2017 01:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297536#M289662</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-18T01:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297553#M289663</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I agree I went to the main page and the last post is not posting you are correct - I do not know why this is the case!&amp;nbsp; Very strange.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes nslookup provides the public ip the 55.55.55.55.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes the goal is to simply type in the hostname which resolves the public ip when using the public DNS Servers or really any DNS Servers (other then internal, which could obviously provide the public automatically).&amp;nbsp; If you try to access router.testrouter.com from outside the network it works fine with the static NAT rules.&amp;nbsp; I want a LAN users to type in router.testrouter.com and it works fine too from the VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not understand why a cheap consumer router will do it and this Cisco Router will not.&amp;nbsp; The Cisco Router knows that it is trying to get the public IP address: 55.55.55.55, but why doesn't it router it back in?&amp;nbsp; Or how do I tell the router that with Internal traffic allow it to come back in - now I'm rambling, but you get my point.&amp;nbsp; And using a provided DNS Server is not an option - its needs to be able to work independently.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the IP NAT Translations:&lt;/P&gt;
&lt;P&gt;do sh ip nat translations&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;udp 96.253.18.130:49265&amp;nbsp;&amp;nbsp; 192.168.0.102:49265&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;tcp 96.253.18.130:49708&amp;nbsp;&amp;nbsp; 192.168.0.102:49708&amp;nbsp;&amp;nbsp; 65.52.108.207:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65.52.108.207:443&lt;BR /&gt;tcp 96.253.18.130:49719&amp;nbsp;&amp;nbsp; 192.168.0.102:49719&amp;nbsp;&amp;nbsp; 17.248.135.242:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 17.248.135.242:443&lt;BR /&gt;tcp 96.253.18.130:49726&amp;nbsp;&amp;nbsp; 192.168.0.102:49726&amp;nbsp;&amp;nbsp; 17.249.108.26:5223&amp;nbsp;&amp;nbsp;&amp;nbsp; 17.249.108.26:5223&lt;BR /&gt;tcp 96.253.18.130:49735&amp;nbsp;&amp;nbsp; 192.168.0.102:49735&amp;nbsp;&amp;nbsp; 77.234.44.25:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.44.25:80&lt;BR /&gt;tcp 96.253.18.130:49962&amp;nbsp;&amp;nbsp; 192.168.0.102:49962&amp;nbsp;&amp;nbsp; 17.249.124.78:5223&amp;nbsp;&amp;nbsp;&amp;nbsp; 17.249.124.78:5223&lt;BR /&gt;tcp 96.253.18.130:50332&amp;nbsp;&amp;nbsp; 192.168.0.102:50332&amp;nbsp;&amp;nbsp; 77.234.41.253:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.41.253:80&lt;BR /&gt;tcp 96.253.18.130:50343&amp;nbsp;&amp;nbsp; 192.168.0.102:50343&amp;nbsp;&amp;nbsp; 69.31.33.97:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69.31.33.97:80&lt;BR /&gt;tcp 96.253.18.130:50757&amp;nbsp;&amp;nbsp; 192.168.0.102:50757&amp;nbsp;&amp;nbsp; 52.3.238.163:2096&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 52.3.238.163:2096&lt;BR /&gt;tcp 96.253.18.130:50762&amp;nbsp;&amp;nbsp; 192.168.0.102:50762&amp;nbsp;&amp;nbsp; 72.21.91.97:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.21.91.97:443&lt;BR /&gt;tcp 96.253.18.130:50763&amp;nbsp;&amp;nbsp; 192.168.0.102:50763&amp;nbsp;&amp;nbsp; 23.192.43.231:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.192.43.231:443&lt;BR /&gt;tcp 96.253.18.130:50765&amp;nbsp;&amp;nbsp; 192.168.0.102:50765&amp;nbsp;&amp;nbsp; 204.79.197.200:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 204.79.197.200:443&lt;BR /&gt;tcp 96.253.18.130:50766&amp;nbsp;&amp;nbsp; 192.168.0.102:50766&amp;nbsp;&amp;nbsp; 93.184.216.180:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 93.184.216.180:443&lt;BR /&gt;tcp 96.253.18.130:50767&amp;nbsp;&amp;nbsp; 192.168.0.102:50767&amp;nbsp;&amp;nbsp; 151.139.237.113:443&amp;nbsp;&amp;nbsp; 151.139.237.113:443&lt;BR /&gt;tcp 96.253.18.130:50768&amp;nbsp;&amp;nbsp; 192.168.0.102:50768&amp;nbsp;&amp;nbsp; 108.161.189.121:443&amp;nbsp;&amp;nbsp; 108.161.189.121:443&lt;BR /&gt;tcp 96.253.18.130:50770&amp;nbsp;&amp;nbsp; 192.168.0.102:50770&amp;nbsp;&amp;nbsp; 72.21.91.97:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.21.91.97:443&lt;BR /&gt;tcp 96.253.18.130:50776&amp;nbsp;&amp;nbsp; 192.168.0.102:50776&amp;nbsp;&amp;nbsp; 172.217.7.6:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.217.7.6:443&lt;BR /&gt;tcp 96.253.18.130:50777&amp;nbsp;&amp;nbsp; 192.168.0.102:50777&amp;nbsp;&amp;nbsp; 172.217.11.46:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.217.11.46:80&lt;BR /&gt;tcp 96.253.18.130:50779&amp;nbsp;&amp;nbsp; 192.168.0.102:50779&amp;nbsp;&amp;nbsp; 31.13.71.36:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31.13.71.36:443&lt;BR /&gt;tcp 96.253.18.130:50780&amp;nbsp;&amp;nbsp; 192.168.0.102:50780&amp;nbsp;&amp;nbsp; 172.217.6.226:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.217.6.226:443&lt;BR /&gt;tcp 96.253.18.130:50781&amp;nbsp;&amp;nbsp; 192.168.0.102:50781&amp;nbsp;&amp;nbsp; 23.203.74.48:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.203.74.48:443&lt;BR /&gt;tcp 96.253.18.130:50782&amp;nbsp;&amp;nbsp; 192.168.0.102:50782&amp;nbsp;&amp;nbsp; 52.85.139.32:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 52.85.139.32:443&lt;BR /&gt;tcp 96.253.18.130:50785&amp;nbsp;&amp;nbsp; 192.168.0.102:50785&amp;nbsp;&amp;nbsp; 149.174.28.138:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 149.174.28.138:443&lt;BR /&gt;tcp 96.253.18.130:50788&amp;nbsp;&amp;nbsp; 192.168.0.102:50788&amp;nbsp;&amp;nbsp; 172.217.13.228:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.217.13.228:443&lt;BR /&gt;tcp 96.253.18.130:50789&amp;nbsp;&amp;nbsp; 192.168.0.102:50789&amp;nbsp;&amp;nbsp; 72.21.91.29:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.21.91.29:80&lt;BR /&gt;tcp 96.253.18.130:50790&amp;nbsp;&amp;nbsp; 192.168.0.102:50790&amp;nbsp;&amp;nbsp; 23.54.187.27:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.54.187.27:80&lt;BR /&gt;tcp 96.253.18.130:50796&amp;nbsp;&amp;nbsp; 192.168.0.102:50796&amp;nbsp;&amp;nbsp; 13.32.81.60:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13.32.81.60:80&lt;BR /&gt;tcp 96.253.18.130:50799&amp;nbsp;&amp;nbsp; 192.168.0.102:50799&amp;nbsp;&amp;nbsp; 172.217.11.2:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.217.11.2:443&lt;BR /&gt;tcp 96.253.18.130:50829&amp;nbsp;&amp;nbsp; 192.168.0.102:50829&amp;nbsp;&amp;nbsp; 34.211.171.230:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 34.211.171.230:443&lt;BR /&gt;tcp 96.253.18.130:50830&amp;nbsp;&amp;nbsp; 192.168.0.102:50830&amp;nbsp;&amp;nbsp; 172.217.10.42:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.217.10.42:443&lt;BR /&gt;tcp 96.253.18.130:50839&amp;nbsp;&amp;nbsp; 192.168.0.102:50839&amp;nbsp;&amp;nbsp; 34.211.171.230:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 34.211.171.230:443&lt;BR /&gt;tcp 96.253.18.130:50840&amp;nbsp;&amp;nbsp; 192.168.0.102:50840&amp;nbsp;&amp;nbsp; 208.74.205.244:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 208.74.205.244:443&lt;BR /&gt;tcp 96.253.18.130:50841&amp;nbsp;&amp;nbsp; 192.168.0.102:50841&amp;nbsp;&amp;nbsp; 208.74.205.244:443&amp;nbsp;&amp;nbsp;&amp;nbsp; 208.74.205.244:443&lt;BR /&gt;udp 96.253.18.130:51899&amp;nbsp;&amp;nbsp; 192.168.0.102:51899&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:53183&amp;nbsp;&amp;nbsp; 192.168.0.102:53183&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;tcp 96.253.18.130:53321&amp;nbsp;&amp;nbsp; 192.168.0.102:53321&amp;nbsp;&amp;nbsp; 72.247.9.208:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.247.9.208:80&lt;BR /&gt;tcp 96.253.18.130:53380&amp;nbsp;&amp;nbsp; 192.168.0.102:53380&amp;nbsp;&amp;nbsp; 69.31.33.112:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69.31.33.112:80&lt;BR /&gt;udp 96.253.18.130:53821&amp;nbsp;&amp;nbsp; 192.168.0.102:53821&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:55250&amp;nbsp;&amp;nbsp; 192.168.0.102:55250&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:55841&amp;nbsp;&amp;nbsp; 192.168.0.102:55841&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:57032&amp;nbsp;&amp;nbsp; 192.168.0.102:57032&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:57069&amp;nbsp;&amp;nbsp; 192.168.0.102:57069&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:58644&amp;nbsp;&amp;nbsp; 192.168.0.102:58644&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:58813&amp;nbsp;&amp;nbsp; 192.168.0.102:58813&amp;nbsp;&amp;nbsp; 4.2.2.2:53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2:53&lt;BR /&gt;udp 96.253.18.130:60341&amp;nbsp;&amp;nbsp; 192.168.0.102:60341&amp;nbsp;&amp;nbsp; 94.245.121.251:3544&amp;nbsp;&amp;nbsp; 94.245.121.251:3544&lt;BR /&gt;udp 96.253.18.130:123&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.103:123&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 52.168.138.145:123&amp;nbsp;&amp;nbsp;&amp;nbsp; 52.168.138.145:123&lt;BR /&gt;tcp 96.253.18.130:49777&amp;nbsp;&amp;nbsp; 192.168.0.103:49777&amp;nbsp;&amp;nbsp; 65.52.108.229:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65.52.108.229:443&lt;BR /&gt;tcp 96.253.18.130:81&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.200:81&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.201:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.85.98:50281&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.85.98:50281&lt;BR /&gt;tcp 96.253.18.130:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.201:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.85.98:58152&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.85.98:58152&lt;BR /&gt;tcp 96.253.18.130:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.201:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 183.82.21.246:18508&amp;nbsp;&amp;nbsp; 183.82.21.246:18508&lt;BR /&gt;tcp 96.253.18.130:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.201:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:8040&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8040&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.30.128.149:53325&amp;nbsp;&amp;nbsp; 23.30.128.149:53325&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.30.128.149:57301&amp;nbsp;&amp;nbsp; 23.30.128.149:57301&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.30.128.149:65265&amp;nbsp;&amp;nbsp; 23.30.128.149:65265&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.30.136.73:63696&amp;nbsp;&amp;nbsp;&amp;nbsp; 23.30.136.73:63696&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.147.248.185:49765&amp;nbsp; 24.147.248.185:49765&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.248.59.200:51968&amp;nbsp;&amp;nbsp; 24.248.59.200:51968&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.248.59.200:52655&amp;nbsp;&amp;nbsp; 24.248.59.200:52655&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.248.59.200:54261&amp;nbsp;&amp;nbsp; 24.248.59.200:54261&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 24.248.59.200:55463&amp;nbsp;&amp;nbsp; 24.248.59.200:55463&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 32.217.110.140:49176&amp;nbsp; 32.217.110.140:49176&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 32.217.110.140:50648&amp;nbsp; 32.217.110.140:50648&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 32.217.110.140:53605&amp;nbsp; 32.217.110.140:53605&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 32.217.110.140:57469&amp;nbsp; 32.217.110.140:57469&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 32.217.110.140:61688&amp;nbsp; 32.217.110.140:61688&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 45.47.191.158:51935&amp;nbsp;&amp;nbsp; 45.47.191.158:51935&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.195.2.38:50254&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.195.2.38:50254&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.195.2.38:54492&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.195.2.38:54492&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.195.2.38:61850&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.195.2.38:61850&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.199.234.121:50573&amp;nbsp; 50.199.234.121:50573&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.199.234.121:53488&amp;nbsp; 50.199.234.121:53488&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.241.114.241:49680&amp;nbsp; 50.241.114.241:49680&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.241.114.241:49697&amp;nbsp; 50.241.114.241:49697&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.241.114.241:50959&amp;nbsp; 50.241.114.241:50959&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.241.114.241:54320&amp;nbsp; 50.241.114.241:54320&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 50.241.114.241:61015&amp;nbsp; 50.241.114.241:61015&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 52.205.250.85:50408&amp;nbsp;&amp;nbsp; 52.205.250.85:50408&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:49565&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:49565&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:61001&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:61001&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:62140&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:62140&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:65278&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.31.95.77:65278&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.162.5.126:52706&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.162.5.126:52706&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 67.231.75.119:53970&amp;nbsp;&amp;nbsp; 67.231.75.119:53970&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:51476&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:51476&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:51493&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:51493&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:54541&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:54541&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:65390&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.32.236:65390&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.36.142:50587&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.36.142:50587&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.36.142:60346&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.36.142:60346&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.58.104:58500&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.58.104:58500&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.58.104:62777&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.15.58.104:62777&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 68.109.229.60:59845&amp;nbsp;&amp;nbsp; 68.109.229.60:59845&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 70.184.15.169:54888&amp;nbsp;&amp;nbsp; 70.184.15.169:54888&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.174.230.21:1582&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.174.230.21:1582&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.174.230.21:49956&amp;nbsp;&amp;nbsp; 71.174.230.21:49956&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.174.230.21:54961&amp;nbsp;&amp;nbsp; 71.174.230.21:54961&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.174.230.21:58859&amp;nbsp;&amp;nbsp; 71.174.230.21:58859&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.174.230.21:63357&amp;nbsp;&amp;nbsp; 71.174.230.21:63357&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.17.11:57693&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.17.11:57693&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.17.11:59218&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.17.11:59218&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.17.11:59407&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.17.11:59407&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 71.235.18.154:12833&amp;nbsp;&amp;nbsp; 71.235.18.154:12833&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.28.249.24:49680&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.28.249.24:49680&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.28.249.24:52790&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.28.249.24:52790&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.87.103.245:60390&amp;nbsp;&amp;nbsp; 72.87.103.245:60390&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.200.172.191:49855&amp;nbsp; 72.200.172.191:49855&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.200.173.60:52186&amp;nbsp;&amp;nbsp; 72.200.173.60:52186&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.215.234.12:51998&amp;nbsp;&amp;nbsp; 72.215.234.12:51998&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.215.234.12:55726&amp;nbsp;&amp;nbsp; 72.215.234.12:55726&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.215.234.12:57225&amp;nbsp;&amp;nbsp; 72.215.234.12:57225&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.215.234.12:57341&amp;nbsp;&amp;nbsp; 72.215.234.12:57341&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.215.234.12:58842&amp;nbsp;&amp;nbsp; 72.215.234.12:58842&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.215.234.12:58885&amp;nbsp;&amp;nbsp; 72.215.234.12:58885&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.4.247.127:64749&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.4.247.127:64749&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.38.192.238:51937&amp;nbsp;&amp;nbsp; 73.38.192.238:51937&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.38.192.238:58904&amp;nbsp;&amp;nbsp; 73.38.192.238:58904&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.84.18:49699&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.84.18:49699&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.85.98:60337&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.85.98:60337&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.142.211.152:52021&amp;nbsp; 73.142.211.152:52021&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.159.224.142:49158&amp;nbsp; 73.159.224.142:49158&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 73.159.224.142:49676&amp;nbsp; 73.159.224.142:49676&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:49695&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:49695&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:49761&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:49761&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:50115&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:50115&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:50742&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:50742&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:50867&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:50867&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:52069&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:52069&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:57094&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:57094&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:65187&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.92.21.69:65187&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.93.17.145:53171&amp;nbsp;&amp;nbsp;&amp;nbsp; 74.93.17.145:53171&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.136.103.62:59160&amp;nbsp;&amp;nbsp; 75.136.103.62:59160&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.144.178.205:49159&amp;nbsp; 75.144.178.205:49159&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.144.178.205:50928&amp;nbsp; 75.144.178.205:50928&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.144.178.205:53638&amp;nbsp; 75.144.178.205:53638&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 75.144.178.205:59282&amp;nbsp; 75.144.178.205:59282&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 88.98.45.178:35673&amp;nbsp;&amp;nbsp;&amp;nbsp; 88.98.45.178:35673&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 88.98.45.178:63410&amp;nbsp;&amp;nbsp;&amp;nbsp; 88.98.45.178:63410&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 96.81.97.229:51778&amp;nbsp;&amp;nbsp;&amp;nbsp; 96.81.97.229:51778&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 96.238.23.70:49784&amp;nbsp;&amp;nbsp;&amp;nbsp; 96.238.23.70:49784&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 98.175.220.253:52708&amp;nbsp; 98.175.220.253:52708&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 98.175.220.253:58651&amp;nbsp; 98.175.220.253:58651&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 98.175.220.253:63644&amp;nbsp; 98.175.220.253:63644&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 98.179.142.155:61573&amp;nbsp; 98.179.142.155:61573&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.102.51:60448&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.102.51:60448&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:52206&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:52206&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:52928&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:52928&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:57211&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:57211&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:60276&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:60276&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:63125&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.31:63125&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.42:50059&amp;nbsp;&amp;nbsp;&amp;nbsp; 107.3.103.42:50059&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 108.34.147.34:49164&amp;nbsp;&amp;nbsp; 108.34.147.34:49164&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 108.34.147.34:51171&amp;nbsp;&amp;nbsp; 108.34.147.34:51171&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 108.34.147.34:61750&amp;nbsp;&amp;nbsp; 108.34.147.34:61750&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 108.34.190.129:49674&amp;nbsp; 108.34.190.129:49674&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 108.34.243.180:55226&amp;nbsp; 108.34.243.180:55226&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 137.103.106.57:51934&amp;nbsp; 137.103.106.57:51934&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 173.9.72.90:52176&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 173.9.72.90:52176&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 173.69.43.38:52707&amp;nbsp;&amp;nbsp;&amp;nbsp; 173.69.43.38:52707&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 173.69.43.38:63088&amp;nbsp;&amp;nbsp;&amp;nbsp; 173.69.43.38:63088&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:49157&amp;nbsp;&amp;nbsp; 198.0.158.245:49157&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:49159&amp;nbsp;&amp;nbsp; 198.0.158.245:49159&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:50146&amp;nbsp;&amp;nbsp; 198.0.158.245:50146&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:51679&amp;nbsp;&amp;nbsp; 198.0.158.245:51679&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:51733&amp;nbsp;&amp;nbsp; 198.0.158.245:51733&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:52866&amp;nbsp;&amp;nbsp; 198.0.158.245:52866&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:57001&amp;nbsp;&amp;nbsp; 198.0.158.245:57001&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:61199&amp;nbsp;&amp;nbsp; 198.0.158.245:61199&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 198.0.158.245:63355&amp;nbsp;&amp;nbsp; 198.0.158.245:63355&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 208.103.76.60:61116&amp;nbsp;&amp;nbsp; 208.103.76.60:61116&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 216.255.173.171:58742 216.255.173.171:58742&lt;BR /&gt;tcp 96.253.18.130:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.202:8041&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:8250&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.203:8250&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:48520&amp;nbsp;&amp;nbsp; 192.168.0.216:48520&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:49162&amp;nbsp;&amp;nbsp; 192.168.0.216:49162&amp;nbsp;&amp;nbsp; 77.234.42.239:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.42.239:80&lt;BR /&gt;tcp 96.253.18.130:49760&amp;nbsp;&amp;nbsp; 192.168.0.216:49760&amp;nbsp;&amp;nbsp; 173.240.170.112:443&amp;nbsp;&amp;nbsp; 173.240.170.112:443&lt;BR /&gt;tcp 96.253.18.130:49879&amp;nbsp;&amp;nbsp; 192.168.0.216:49879&amp;nbsp;&amp;nbsp; 69.31.33.97:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69.31.33.97:80&lt;BR /&gt;tcp 96.253.18.130:49883&amp;nbsp;&amp;nbsp; 192.168.0.216:49883&amp;nbsp;&amp;nbsp; 77.234.42.252:443&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.42.252:443&lt;BR /&gt;tcp 96.253.18.130:48521&amp;nbsp;&amp;nbsp; 192.168.0.217:48521&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;tcp 96.253.18.130:49159&amp;nbsp;&amp;nbsp; 192.168.0.217:49159&amp;nbsp;&amp;nbsp; 77.234.41.34:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.41.34:80&lt;BR /&gt;tcp 96.253.18.130:52355&amp;nbsp;&amp;nbsp; 192.168.0.217:52355&amp;nbsp;&amp;nbsp; 165.254.0.33:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 165.254.0.33:80&lt;BR /&gt;tcp 96.253.18.130:53170&amp;nbsp;&amp;nbsp; 192.168.0.217:53170&amp;nbsp;&amp;nbsp; 69.31.33.97:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 69.31.33.97:80&lt;BR /&gt;tcp 96.253.18.130:53251&amp;nbsp;&amp;nbsp; 192.168.0.217:53251&amp;nbsp;&amp;nbsp; 77.234.42.252:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.42.252:80&lt;BR /&gt;tcp 96.253.18.130:48522&amp;nbsp;&amp;nbsp; 192.168.0.218:48522&amp;nbsp;&amp;nbsp; ---&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---&lt;BR /&gt;tcp 96.253.18.130:49161&amp;nbsp;&amp;nbsp; 192.168.0.218:49161&amp;nbsp;&amp;nbsp; 77.234.42.249:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.42.249:80&lt;BR /&gt;tcp 96.253.18.130:51714&amp;nbsp;&amp;nbsp; 192.168.0.218:51714&amp;nbsp;&amp;nbsp; 72.247.9.208:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.247.9.208:80&lt;BR /&gt;tcp 96.253.18.130:52280&amp;nbsp;&amp;nbsp; 192.168.0.218:52280&amp;nbsp;&amp;nbsp; 77.234.42.253:80&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 77.234.42.253:80&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 02:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297553#M289663</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-18T02:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297554#M289664</link>
      <description>Hi &lt;BR /&gt;&lt;BR /&gt;I raised the weird issue to Cisco.&lt;BR /&gt;&lt;BR /&gt;When you modified the acl, did you do a clear ip nat translation * ?&lt;BR /&gt;Can you share your actual config please?</description>
      <pubDate>Mon, 18 Dec 2017 02:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297554#M289664</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-18T02:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297556#M289665</link>
      <description>&lt;P&gt;Hello Again,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes I did do that and the system is definitely messed up.&amp;nbsp; I did open a case with TAC on this matter last week and they promised to test it in the lab and get back to me tomorrow (Monday) - I hope they do because I think it is crazy that a high end router has issues doing this, but a D-Link router does it fine.&amp;nbsp; There must be some with to make it work - it just doesn't seem plausible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The configuration in the latest state is as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Current configuration : 4379 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 21:34:26 EST Sun Dec 17 2017 by&lt;BR /&gt;version 15.3&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Test-Router&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;aqm-register-fnf&lt;BR /&gt;!&lt;BR /&gt;logging buffered 51200 warnings&lt;BR /&gt;enable secret 5 &lt;BR /&gt;enable password 7 &lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone EST -5 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.0.1 192.168.0.99&lt;BR /&gt;ip dhcp excluded-address 192.168.0.200 192.168.0.254&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool internal&lt;BR /&gt;&amp;nbsp;network 192.168.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;dns-server 192.168.0.213 4.2.2.2 71.243.0.12 68.237.161.12&lt;BR /&gt;&amp;nbsp;domain-name testrouter.local&lt;BR /&gt;&amp;nbsp;default-router 192.168.0.1&lt;BR /&gt;&amp;nbsp;lease 14&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain lookup&lt;BR /&gt;ip domain name router.testrouter.local&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid C891F-K9&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map match-all Voice&lt;BR /&gt;&amp;nbsp;match ip dscp ef&lt;BR /&gt;!&lt;BR /&gt;policy-map EGNVoice&lt;BR /&gt;&amp;nbsp;class Voice&lt;BR /&gt;&amp;nbsp; priority 25000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface BRI0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation hdlc&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;isdn termination multidrop&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet6&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet7&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet8&lt;BR /&gt;&amp;nbsp;ip address 96.253.18.131 255.255.255.0 secondary&lt;BR /&gt;&amp;nbsp;ip address 96.253.18.130 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;service-policy output EGNVoice&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.252.0&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface Async3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 96.253.18.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map FE0_General_Failover interface FastEthernet0 overload&lt;BR /&gt;ip nat inside source route-map GE8_General_Failover interface GigabitEthernet8 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.0.200 81 96.253.18.130 81 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.201 443 96.253.18.130 443 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8040 96.253.18.130 8040 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8041 96.253.18.130 8041 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.203 8250 96.253.18.130 8250 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.216 48520 96.253.18.130 48520 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.217 48521 96.253.18.130 48521 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.218 48522 96.253.18.130 48522 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 96.253.18.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map GE8_General_Failover permit 1&lt;BR /&gt;&amp;nbsp;match ip address 100&lt;BR /&gt;&amp;nbsp;match interface GigabitEthernet8&lt;BR /&gt;!&lt;BR /&gt;route-map FE0_General_Failover permit 1&lt;BR /&gt;&amp;nbsp;match ip address 100&lt;BR /&gt;&amp;nbsp;match interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;snmp-server location Epcom RI, USA&lt;BR /&gt;snmp-server contact Epcom World Industries, Inc.&lt;BR /&gt;access-list 100 permit ip 192.168.0.0 0.0.3.255 any&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 96.253.18.130&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 96.253.18.131&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mgcp behavior rsip-range tgcp-only&lt;BR /&gt;mgcp behavior comedia-role none&lt;BR /&gt;mgcp behavior comedia-check-media-src disable&lt;BR /&gt;mgcp behavior comedia-sdp-force disable&lt;BR /&gt;!&lt;BR /&gt;mgcp profile default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;password 7 &lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;&amp;nbsp;no modem enable&lt;BR /&gt;line aux 0&lt;BR /&gt;&amp;nbsp;password 7 &lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;line 3&lt;BR /&gt;&amp;nbsp;modem InOut&lt;BR /&gt;&amp;nbsp;speed 115200&lt;BR /&gt;&amp;nbsp;flowcontrol hardware&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;password 7 &lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 02:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297556#M289665</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-18T02:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297713#M289668</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on a side note, try and configure the below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip domain lookup&lt;BR /&gt;ip name-server 192.168.0.213&lt;BR /&gt;ip name-server 4.2.2.2&lt;BR /&gt;ip name-server 71.243.0.12&lt;BR /&gt;ip name-server 68.237.161.12&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't forget to configure 'transport preferred none' on your con/aux/vty lines to avoid the annoying problem of having your router trying to translate anything you erroneously type...&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 09:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297713#M289668</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2017-12-18T09:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297857#M289676</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;First of all, why are you using route-map? What do you want to achieve?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;route-map GE8_General_Failover permit 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;match ip address 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;match interface GigabitEthernet8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;route-map FE0_General_Failover permit 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;match ip address 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;match interface FastEthernet0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then in terms of acl, you added the permit at the top of the acl and the deny statement will never be hitted. You need to have the permit statement at the end:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 96.253.18.130&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 96.253.18.131&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;access-list 100 permit ip 192.168.0.0 0.0.3.255 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 13:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297857#M289676</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-18T13:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297976#M289683</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured the ip name-server 4.2.2.2 option and the ip domain lookup is back in the config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have updated the access-list 100 to have the two deny options on top and the permit option 3rd on the list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, when trying to resolve the hostname within the VLAN still does not work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The route-map is for another ISP that has not yet been installed, but will be soon.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any other suggestions are welcome.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 15:05:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297976#M289683</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-18T15:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297987#M289684</link>
      <description>&lt;P&gt;Ok I'm lost.&lt;/P&gt;
&lt;P&gt;You said: "&lt;SPAN&gt;when trying to resolve the hostname within the VLAN still does not work"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What is your dns server?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does this means that when using nslookup you're not able to resolve the hostname with the right public ip?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 15:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3297987#M289684</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-12-18T15:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298093#M289688</link>
      <description>&lt;P&gt;Hi Francesco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That statement should have said - when trying to access the hostname within the LAN the page does not load, though the DNS resolves it to the PUBLIC IP address of GE8.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The DNS Server is: 4.2.2.2 and even with 8.8.8.8 same thing.&amp;nbsp; The nslookup is as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server:&amp;nbsp; b.resolvers.Level3.net&lt;BR /&gt;Address:&amp;nbsp; 4.2.2.2&lt;BR /&gt;&lt;BR /&gt;Non-authoritative answer:&lt;BR /&gt;Name:&amp;nbsp;&amp;nbsp;&amp;nbsp; test.domain.com&lt;BR /&gt;Address:&amp;nbsp; 96.253.18.130&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When doing a debug ip nat detail I get this statement and I do not know why the router has 0.0.0.0 (local address) in it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;*Dec 18 16:42:31.872: NAT*: TCP s=3389-&amp;gt;47525, d=64289&lt;BR /&gt;*Dec 18 16:42:31.872: NAT*: s=192.168.0.200-&amp;gt;96.253.18.130, d=73.142.85.98 [15194]&lt;BR /&gt;*Dec 18 16:42:31.872: NAT*: i: tcp (192.168.0.200, 3389) -&amp;gt; (73.142.85.98, 64289) [15195]&lt;BR /&gt;*Dec 18 16:42:31.872: NAT*: TCP s=3389-&amp;gt;47525, d=64289&lt;BR /&gt;*Dec 18 16:42:31.872: NAT*: s=192.168.0.200-&amp;gt;96.253.18.130, d=73.142.85.98 [15195]&lt;BR /&gt;*Dec 18 16:42:31.908: NAT*: o: tcp (73.142.85.98, 50281) -&amp;gt; (96.253.18.130, 443) [12832]&lt;BR /&gt;*Dec 18 16:42:31.908: NAT*: s=73.142.85.98, d=96.253.18.130-&amp;gt;192.168.0.201 [12832]&lt;BR /&gt;*Dec 18 16:42:31.912: NAT*: o: tcp (73.142.85.98, 64289) -&amp;gt; (96.253.18.130, 47525) [12833]&lt;BR /&gt;*Dec 18 16:42:31.912: NAT*: TCP s=64289, d=47525-&amp;gt;3389&lt;BR /&gt;*Dec 18 16:42:31.912: NAT*: s=73.142.85.98, d=96.253.18.130-&amp;gt;192.168.0.200 [12833]&lt;BR /&gt;*Dec 18 16:42:31.916: NAT: API parameters passed: src_addr:192.168.0.200, src_port:0 dest_addr:96.253.18.130, dest_port:0, proto:6 if_input:Vlan1 pak:E85C1C0 get_translated:1&lt;BR /&gt;*Dec 18 16:42:31.916: NAT - SYSTEM PORT for 96.253.18.130: allocated port 0, refcount 37098, localport 4294967295, localaddr 0.0.0.0, flags 1, syscount 37098, proto 6&lt;BR /&gt;*Dec 18 16:42:31.916: NAT: API parameters passed: src_addr:192.168.0.200, src_port:0 dest_addr:96.253.18.130, dest_port:0, proto:6 if_input:Vlan1 pak:E85C1C0 get_translated:1&lt;BR /&gt;*Dec 18 16:42:31.916: NAT - SYSTEM PORT for 96.253.18.130: allocated port 0, refcount 37099, localport 4294967295, localaddr 0.0.0.0, flags 1, syscount 37099, proto 6&lt;BR /&gt;*Dec 18 16:42:31.924: NAT*: i: tcp (192.168.0.201, 443) -&amp;gt; (73.142.85.98, 50281) [3326]&lt;BR /&gt;*Dec 18 16:42:31.924: NAT*: s=192.168.0.201-&amp;gt;96.253.18.130, d=73.142.85.98 [3326]&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: i: tcp (192.168.0.200, 3389) -&amp;gt; (73.142.85.98, 64289) [15196]&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: TCP s=3389-&amp;gt;47525, d=64289&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: s=192.168.0.200-&amp;gt;96.253.18.130, d=73.142.85.98 [15196]&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: i: tcp (192.168.0.200, 3389) -&amp;gt; (73.142.85.98, 64289) [15197]&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: TCP s=3389-&amp;gt;47525, d=64289&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: s=192.168.0.200-&amp;gt;96.253.18.130, d=73.142.85.98 [15197]&lt;BR /&gt;*Dec 18 16:42:31.932: NAT*: i: tcp (192.168.0.200, 3389) -&amp;gt; (73.142.85.98, 64289) [15198]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the above debug server 192.168.0.200 was using Firefox to access the server via hostname running on 192.168.0.202.&amp;nbsp; Publically this works, but within the VLAN you cannot get the browser to open the page with the hostname.&amp;nbsp; You would either have to use the public IP address or a DNS Server that has the rule in it with the internal VLAN IP to make it work.&amp;nbsp; I have edited the Windows Host File and it works fine, but that is not a solution for a network with 0.0.3.255 devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Continue to keep me posted on your thoughts.&amp;nbsp; Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 16:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298093#M289688</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-18T16:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298317#M289705</link>
      <description>&lt;P&gt;Friends,&lt;/P&gt;
&lt;P&gt;Please allow me join.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/59924"&gt;@epcomworld&lt;/a&gt;: If my understanding is correct, you want to have your internal hosts talk to your internal servers using their apparent public IP address because that is what they learn when they resolve their names in DNS.&lt;/P&gt;
&lt;P&gt;For such communication to occur successfully, one of the following alternatives would need to be true:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The servers are configured with their appropriate public IP addresses as additional IP addresses they have, on top of their existing private IP addresses. For packets from inside hosts targeted to the public server IP addresses, the router would merely route these packets to the appropriate servers using their private IP addresses as next hops. As the servers would be owning both their private and their public IP addresses, they would accept the packets, process them as usual, and respond to the clients directly. This would be accomplished using PBR (Policy-Based Routing), and NAT would not play a role here.&lt;/LI&gt;
&lt;LI&gt;The servers are configured only with their private IP addresses. For packets from inside hosts targeted to the public server IP addresses, the router would translate the destination IP address from the public IP address to the private IP address. However, the router would also need to translate the source IP address of these packets to a fictious IP range to cause the servers to respond to clients through the router and not directly; if the source IP addresses were not changed, the communication would fail because the clients would attempt to talk to the servers using their public IPs but would be receiving responses from their private IPs, and would drop them as unexpected. Essentially, this would require a double NAT. Based on the nature of NAT on Cisco IOS-based devices, this alternative would be cumbersome and unintuitive to configure, and I would personally recommend avoiding it at all if possible.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Note that currently, your NAT configuration does not apply to this communication at all. For Cisco NAT to kick into action in the inside-to-outside direction, a packet coming in through an &lt;STRONG&gt;ip nat inside&lt;/STRONG&gt; interface would need to be routed out through an &lt;STRONG&gt;ip nat outside&lt;/STRONG&gt; interface in order to be subject to NAT. Note that currently, this is not happening at all: For the intended inside-to-outside direction, packets from 192.168.0.0/22 coming in through interface Vlan1 destined to either 96.253.18.130 or 96.253.18.131 are not routed out through Gi8 at all - rather, they are consumed by the router itself because the router is the owner of both IP addresses, hence, no NAT is done here. For the outside-to-inside direction, the NAT is performed first and routing second, so that's why your static NAT entries work for outside hosts.&lt;/P&gt;
&lt;P&gt;The PBR solution would require first that the servers are configured with their corresponding public IP address as their secondary IP address. Ideally, if possible, this IP address should be added to some kind of a virtual interface on these servers, perhaps a loopback - this is to avoid the servers to report IP address conflicts if multiple servers had the same public IP address configured on their Ethernet NIC in the same VLAN.&lt;/P&gt;
&lt;P&gt;After this is done, the PBR on the router would be configured along the following lines:&lt;/P&gt;
&lt;PRE&gt;ip access-list extended 130_tcp_81
  permit tcp any host 96.253.18.130 eq 81
!
ip access-list extended 130_tcp_443
  permit tcp any host 96.253.18.130 eq 443
!
ip access-list extended 130_tcp_8040
  permit tcp any host 96.253.18.130 eq 8040
!
ip access-list extended 130_tcp_8041
  permit tcp any host 96.253.18.130 eq 8041
!
ip access-list extended 130_tcp_8250
  permit tcp any host 96.253.18.130 eq 8250
!
ip access-list extended 130_tcp_48520
  permit tcp any host 96.253.18.130 eq 48520
!
ip access-list extended 130_tcp_48521
  permit tcp any host 96.253.18.130 eq 48521
!
ip access-list extended 130_tcp_48522
  permit tcp any host 96.253.18.130 eq 48522
!
route-map PBR-Vlan1 permit 10
  match ip address 130_tcp_81
  set ip next-hop 192.168.0.200
!
route-map PBR-Vlan1 permit 20
  match ip address 130_tcp_443
  set ip next-hop 192.168.0.201
!
route-map PBR-Vlan1 permit 30
  match ip address 130_tcp_8040
  set ip next-hop 192.168.0.202
!
route-map PBR-Vlan1 permit 40
  match ip address 130_tcp_8041
  set ip next-hop 192.168.0.202
!
route-map PBR-Vlan1 permit 50
  match ip address 130_tcp_8250
  set ip next-hop 192.168.0.203
!
route-map PBR-Vlan1 permit 60
  match ip address 130_tcp_48520
  set ip next-hop 192.168.0.216
!
route-map PBR-Vlan1 permit 70
  match ip address 130_tcp_48521
  set ip next-hop 192.168.0.217
!
route-map PBR-Vlan1 permit 80
  match ip address 130_tcp_48522
  set ip next-hop 192.168.0.218&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;  ip policy route-map PBR-Vlan1
&lt;/PRE&gt;
&lt;P&gt;The remaining configuration would remain in place.&lt;/P&gt;
&lt;P&gt;The point of this configuration is to have the router forward the packets from inside clients targeted for the specific public destination IP addresses and ports (note - no NAT, just route) to their corresponding private IP counterparts. Because there will be no NAT involved, the public destination addresses of these packets won't be changed, and so the servers must be listening to those public IP addresses. Also, because the client source IP addresses will also remain unchaged, the servers will respond to the internal clients directly, not even through the router.&lt;/P&gt;
&lt;P&gt;This solution is arguably cumbersome; however, the overall design where internal clients need to talk to internal servers using their public IP address is problematic in itself, so the configuration becomes more quirky, too.&lt;/P&gt;
&lt;P&gt;My $0.02...&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 10:35:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298317#M289705</guid>
      <dc:creator>Peter Paluch</dc:creator>
      <dc:date>2017-12-19T10:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298618#M289723</link>
      <description>&lt;P&gt;Hello Peter &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/213786"&gt;@Peter Paluch&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response.&amp;nbsp; There is still an open service request number on this: SR683629902 - I'm awaiting to here from the Cisco team on it - we worked on it and they had to take the case to the lab and I have not heard anything back yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct I would like a server such as 192.168.0.200 with public DNS Server when they are looking to reach the hostname assigned to server 192.168.0.201 to load from within the VLAN.&amp;nbsp; It only works externally.&amp;nbsp; The only IP Address assigned to the server currently is just the private IP.&amp;nbsp; So when you state that one of the following alternatives would need to be true the one that is true is this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"The servers are configured only with their private IP addresses. (Yes) For packets from inside hosts targeted to the public server IP addresses, the router would translate the destination IP address from the public IP address to the private IP address. However, the router would also need to translate the source IP address of these packets to a fictious IP range to cause the servers to respond to clients through the router and not directly; if the source IP addresses were not changed, the communication would fail because the clients would attempt to talk to the servers using their public IPs but would be receiving responses from their private IPs, and would drop them as unexpected. Essentially, this would require a double NAT. Based on the nature of NAT on Cisco IOS-based devices, this alternative would be cumbersome and unintuitive to configure, and I would personally recommend avoiding it at all if possible."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now since the configuration for that is not simple - I have no problem going with the first option.&amp;nbsp; The only thing here is that the: you state the servers would need to be configured with their appropriate public IP addresses as additional IP addresses they have, on top of their existing private IP addresses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the scenario here the servers all have the SAME public IP Address - hence why they all use different ports.&amp;nbsp; I'm not sure how I could add the public IP address to the servers as secondary without more managed switching devices, etc.&amp;nbsp; Maybe the double NAT is the solution.&amp;nbsp; If I had more IPs I would just use the 1:1 NAT option and it would work, but for this case that is not an option.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yesterday before your recommendation came in I tried to reconfigure the NAT with just IP NAT enable commands.&amp;nbsp; Looking at the form at this link I thought this could be the issue based on the debug ip nat commands that were received:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportforums.cisco.com/t5/lan-switching-and-routing/port-forwarding-issue/td-p/1446759" target="_blank"&gt;https://supportforums.cisco.com/t5/lan-switching-and-routing/port-forwarding-issue/td-p/1446759&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regardless it did not work, but I want you to see the configuration that was applied:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I updated the configuration to the following:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;! Last configuration change at 14:33:45 EST Mon Dec 18 2017&lt;BR /&gt;version 15.3&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname Router&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;aqm-register-fnf&lt;BR /&gt;!&lt;BR /&gt;logging buffered 51200 warnings&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone EST -5 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.0.1 192.168.0.99&lt;BR /&gt;ip dhcp excluded-address 192.168.0.200 192.168.0.254&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool internal&lt;BR /&gt;&amp;nbsp;network 192.168.0.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;dns-server 192.168.0.213 4.2.2.2 71.243.0.12 68.237.161.12&lt;BR /&gt;&amp;nbsp;domain-name epcomworld.local&lt;BR /&gt;&amp;nbsp;default-router 192.168.0.1&lt;BR /&gt;&amp;nbsp;lease 14&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip domain name router.testrouter.local&lt;BR /&gt;ip name-server 4.2.2.2&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;license udi pid C891F-K9&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh version 2&lt;BR /&gt;!&lt;BR /&gt;class-map match-all Voice&lt;BR /&gt;&amp;nbsp;match ip dscp ef&lt;BR /&gt;!&lt;BR /&gt;policy-map EGNVoice&lt;BR /&gt;&amp;nbsp;class Voice&lt;BR /&gt;&amp;nbsp; priority 25000&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface BRI0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation hdlc&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;isdn termination multidrop&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet4&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet5&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet6&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet7&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet8&lt;BR /&gt;&amp;nbsp;ip address 96.253.18.131 255.255.255.0 secondary&lt;BR /&gt;&amp;nbsp;ip address 96.253.18.130 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat enable&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;service-policy output EGNVoice&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.252.0&lt;BR /&gt;&amp;nbsp;ip nat enable&lt;BR /&gt;&amp;nbsp;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface Async3&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;encapsulation slip&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 96.253.18.1&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip nat source static tcp 192.168.0.202 8040 interface GigabitEthernet8 8040&lt;BR /&gt;ip nat source static tcp 192.168.0.202 8041 interface GigabitEthernet8 8041&lt;BR /&gt;ip nat source static tcp 192.168.0.251 3389 interface GigabitEthernet8 48526&lt;BR /&gt;ip nat source static tcp 192.168.0.200 81 interface GigabitEthernet8 81&lt;BR /&gt;ip nat source static tcp 192.168.0.201 443 interface GigabitEthernet8 443&lt;BR /&gt;ip nat source static tcp 192.168.0.203 8250 interface GigabitEthernet8 8250&lt;BR /&gt;ip nat source static tcp 192.168.0.216 48520 interface GigabitEthernet8 48520&lt;BR /&gt;ip nat source static tcp 192.168.0.217 48521 interface GigabitEthernet8 48521&lt;BR /&gt;ip nat source static tcp 192.168.0.218 48522 interface GigabitEthernet8 48522&lt;BR /&gt;ip nat source list 100 interface GigabitEthernet8 overload (I tried with access list 1 too and that did not work either) --&amp;gt; Nat Traffic did work, but the internal servers resolving to hostname via public DNS would not load sites.&lt;BR /&gt;ip nat source static tcp 192.168.0.250 3389 interface GigabitEthernet8 48525&lt;BR /&gt;ip nat source static tcp 192.168.0.251 80 interface GigabitEthernet8 80&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8040 interface GigabitEthernet8 8040&lt;BR /&gt;ip nat inside source static tcp 192.168.0.202 8041 interface GigabitEthernet8 8041&lt;BR /&gt;ip nat inside source static tcp 192.168.0.251 3389 interface GigabitEthernet8 48526&lt;BR /&gt;ip nat inside source static tcp 192.168.0.200 81 interface GigabitEthernet8 81&lt;BR /&gt;ip nat inside source static tcp 192.168.0.201 443 interface GigabitEthernet8 443&lt;BR /&gt;ip nat inside source static tcp 192.168.0.203 8250 interface GigabitEthernet8 8250&lt;BR /&gt;ip nat inside source static tcp 192.168.0.216 48520 interface GigabitEthernet8 48520&lt;BR /&gt;ip nat inside source static tcp 192.168.0.217 48521 interface GigabitEthernet8 48521&lt;BR /&gt;ip nat inside source static tcp 192.168.0.218 48522 interface GigabitEthernet8 48522&lt;BR /&gt;ip nat inside source static tcp 192.168.0.250 3389 interface GigabitEthernet8 48525&lt;BR /&gt;ip nat inside source static tcp 192.168.0.251 80 interface GigabitEthernet8 80&lt;BR /&gt;ip nat inside source route-map FE0_General_Failover interface FastEthernet0 overload&lt;BR /&gt;ip nat inside source route-map GE8_General_Failover interface GigabitEthernet8 overload&lt;BR /&gt;ip nat inside source static tcp 192.168.0.250 3389 96.253.18.130 48525 extendable&lt;BR /&gt;ip nat inside source static tcp 192.168.0.251 3389 96.253.18.130 48526 extendable&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 96.253.18.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map GE8_General_Failover permit 1&lt;BR /&gt;&amp;nbsp;match ip address 100&lt;BR /&gt;&amp;nbsp;match interface GigabitEthernet8&lt;BR /&gt;!&lt;BR /&gt;route-map FE0_General_Failover permit 1&lt;BR /&gt;&amp;nbsp;match ip address 100&lt;BR /&gt;&amp;nbsp;match interface FastEthernet0&lt;BR /&gt;!&lt;BR /&gt;access-list 1 permit 192.168.0.0 0.0.3.255&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 96.253.18.130&lt;BR /&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.3.255 host 96.253.18.131&lt;BR /&gt;access-list 100 permit ip 192.168.0.0 0.0.3.255 any&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mgcp behavior rsip-range tgcp-only&lt;BR /&gt;mgcp behavior comedia-role none&lt;BR /&gt;mgcp behavior comedia-check-media-src disable&lt;BR /&gt;mgcp behavior comedia-sdp-force disable&lt;BR /&gt;!&lt;BR /&gt;mgcp profile default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;banner login ^CAuthorized Personnel Only!&amp;nbsp; Please enter username and password.&amp;nbsp; All attempts on this device will be logged and recorded.&amp;nbsp; Contact Epcom Global Networks for support and service! ^C&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;&amp;nbsp;no modem enable&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;line aux 0&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;line 3&lt;BR /&gt;&amp;nbsp;modem InOut&lt;BR /&gt;&amp;nbsp;speed 115200&lt;BR /&gt;&amp;nbsp;flowcontrol hardware&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;privilege level 15&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;transport preferred none&lt;BR /&gt;&amp;nbsp;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 20000 1000&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will now re-code the router with the configuration you have suggested.&amp;nbsp; It is so interesting to me that the D-Link Router does this fine as this was the environment these devices / servers were used in and within that VLAN with the open ports to the various servers you could use hostname resolution and it did work.&amp;nbsp; I never realized / knew this would be so complex to enable on the Cisco ISR platform.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know your continued thoughts - many thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 13:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298618#M289723</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-19T13:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298652#M289727</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You are very much welcome!&lt;/P&gt;
&lt;P&gt;I do not contest the fact that configuring this type of NAT on Cisco routers is complex - I agree that it is anything but simple. Still, if you start breaking down the necessary steps that need to take place for such communication to be working (internal client talking to internal server using the server's public IP), you will find out that there are many non-intuitive and non-trivial operations needed in background, and the real question is what does the D-Link device exactly do, and how does it fill in the blanks, as the process I've explained in my previous response needs some design choices to be made, and it looks like the D-Link does not allow you to influence them at all. In this case, flexibility truly comes at the price of complexity.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;you state the servers would need to be configured with their appropriate public IP addresses as additional IP addresses they have, on top of their existing private IP addresses.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;For the PBR approach, yes.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#0000FF"&gt;I'm not sure how I could add the public IP address to the servers as secondary without more managed switching devices, etc.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Current server operating systems will certainly allow you to add secondary IP addresses to their configuration. You do not need more managed switching device or anything in addition in your network infrastructure itself. If you are concerned about the fact that this would constitute an IP address conflict, here comes the second part of what I indicated: Ideally, you should add the public IP address to a &lt;EM&gt;different&lt;/EM&gt; interface on the server than the NIC connected to 192.168.0.0/22 itself, thereby preventing the servers from ever discovering they all share the same public IP. If it was Linux, I would add the public IP address to the lo (loopback) interface; if it was Windows, I would install the Microsoft Loopback Adapter, and have the IP address configured there.&lt;/P&gt;
&lt;P&gt;Either way, there is no need for extra network equipment to have the servers share the same public IP.&lt;/P&gt;
&lt;P&gt;I suspect that the approach through &lt;STRONG&gt;ip nat enable&lt;/STRONG&gt; failed because the configuration was not specific enough to set apart the client-&amp;gt;server and server-&amp;gt;client flows, and likely did not translate the source and destination addresses in both directions properly. Once again, the problem is this: If the clients talk to a public IP, they expect to receive a response from the public IP back. If the servers respond from their private IP, the response needs to go through the router to modify the private server's IP back to the public IP - however, in order for this to happen, the clients' IP addresses themselves have to be overwritten to a source apparently reachable through the router, otherwise the responses from the servers to the clients will bypass the router entirely and go to clients directly.&lt;/P&gt;
&lt;P&gt;Please feel welcome to ask further!&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 14:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298652#M289727</guid>
      <dc:creator>Peter Paluch</dc:creator>
      <dc:date>2017-12-19T14:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298707#M289734</link>
      <description>&lt;P&gt;Thanks Peter,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying it right now with the loop back and the PBR Routing.&amp;nbsp; Could you provide an example of the Double NAT scenario you had referenced earlier - I would like to see what that type of configuration would look like on the system.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Continue to keep me posted and I will provide an update shortly.&amp;nbsp; Thank you for your support.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 15:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3298707#M289734</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-19T15:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3300421#M289880</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;My apologies for the delay - got busy during the last couple of days.&lt;/P&gt;
&lt;P&gt;I've checked the case notes for the TAC SR 683629902 and it looks like the engineer handling your TAC case also came up with a solution though it was not specified closer. Can you perhaps comment on the details? Also, considering the PBR approach I've suggested, and the solution suggested by TAC, would you still want me to come up with the double-NAT approach?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 21:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3300421#M289880</guid>
      <dc:creator>Peter Paluch</dc:creator>
      <dc:date>2017-12-21T21:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: IP NAT INSIDE VLAN Hostname Resolution Issue</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3300432#M289884</link>
      <description>&lt;P&gt;Hi Peter,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No apologies needed on the delay.&amp;nbsp; Just early this morning we were&amp;nbsp;working on the TAC SR 683629902 case and the solution provided didn't really address the requirements.&amp;nbsp; We were able to configure that on our own.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then I showed them the forum post you provided and they said yes that is one way it could be done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Literally we programmed it with them, but because it was so late / early in the morning depending on how you look at it, when we tried to test I needed to review the Microsoft Loopback configuration on the Windows Server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example I added the loopback interface - configured the public IP address on it and that is where I stopped.&amp;nbsp; I probably need to start either Internet sharing or bridging the NICs to get that to work so it will work with the router - unless just having the adapter there with the static IP on it is enough.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I advised them I would e-mail them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would honestly still be curious to see what the double NAT configuration will look like.&amp;nbsp; I will have physical access to the site again this is when I will test everything out and see if I can make the site function as needed based on the requirements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any additional insight or thoughts you have please share as I will be on site in a couple hours to review this further.&amp;nbsp; Many thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 22:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/ip-nat-inside-vlan-hostname-resolution-issue/m-p/3300432#M289884</guid>
      <dc:creator>epcomworld</dc:creator>
      <dc:date>2017-12-21T22:26:00Z</dc:date>
    </item>
  </channel>
</rss>

