<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212100#M1023453</link>
    <description>&lt;P&gt;Does firewall is able to ping 172.26.32.5?&lt;/P&gt;
&lt;P&gt;yes&lt;/P&gt;
&lt;P&gt;Does R2 have route to 172.16.44.0 ?&lt;/P&gt;
&lt;P&gt;R2 has a default route to the firewall.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Nov 2017 10:09:18 GMT</pubDate>
    <dc:creator>Kenneth Goh</dc:creator>
    <dc:date>2017-11-07T10:09:18Z</dc:date>
    <item>
      <title>Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212056#M1023445</link>
      <description>&lt;P&gt;Please help (refer to attached diagram) as I need client 10.2.6.42 to telnet to 172.16.44.100 and the traffic will be NATed (which telnet into R2) to 172.26.32.5 (lookback interface).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is not working, not sure did I miss out any thing? Thanks in advanced&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.2.6.22 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 172.16.44.254 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network Telnet_172.26.32.5&lt;BR /&gt;&amp;nbsp;host 172.26.32.5&lt;BR /&gt;&lt;BR /&gt;object network Telnet_172.26.32.5&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 172.16.44.100 service tcp telnet telnet&lt;BR /&gt;access-list outside_To_inside extended permit tcp any host 172.26.32.5 eq telnet&lt;BR /&gt;access-group outside_To_inside in interface outside&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212056#M1023445</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2020-02-21T14:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212096#M1023448</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/132602"&gt;@Kenneth Goh&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;Does firewall is able to ping&amp;nbsp;&lt;SPAN&gt;172.26.32.5?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does R2 have route to 172.16.44.0 ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 10:05:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212096#M1023448</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-07T10:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212100#M1023453</link>
      <description>&lt;P&gt;Does firewall is able to ping 172.26.32.5?&lt;/P&gt;
&lt;P&gt;yes&lt;/P&gt;
&lt;P&gt;Does R2 have route to 172.16.44.0 ?&lt;/P&gt;
&lt;P&gt;R2 has a default route to the firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 10:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212100#M1023453</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-07T10:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212116#M1023460</link>
      <description>&lt;P&gt;Try to run a packet tracer from ASA.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input [src_int] protocol src_addr src_port dest_addr&amp;nbsp; dest_port [detailed]&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer input&amp;nbsp;outside&amp;nbsp; tcp 10.2.6.42 1024&amp;nbsp;172.16.44.100 23 detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 10:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212116#M1023460</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-07T10:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212138#M1023468</link>
      <description>&lt;P&gt;Unable to establish telnet session on R2&lt;/P&gt;
&lt;P&gt;client#telnet 172.16.44.100&lt;BR /&gt;Trying 172.16.44.100 ...&lt;BR /&gt;% Connection timed out; remote host not responding&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input outside tcp 10.2.6.42 1024 172.16.44.100 23 detailed&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xbc2d21e8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=14, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Telnet_172.26.32.5&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 172.16.44.100 service tcp telnet telnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 172.16.44.100/23 to 172.26.32.5/23&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_To_inside in interface outside&lt;BR /&gt;access-list outside_To_inside extended permit tcp any host 172.26.32.5 eq telnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xbb980028, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xb9466b40, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.26.32.5, mask=255.255.255.255, port=23, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xbc2d60e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=12, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network Telnet_172.26.32.5&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 172.16.44.100 service tcp telnet telnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0xbc2dd058, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0xbcabb3e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.26.32.5, mask=255.255.255.255, port=23, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xbc2a9578, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 14, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 11:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212138#M1023468</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-07T11:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212140#M1023817</link>
      <description>&lt;P&gt;Perfect. Now, try do enable debug on R2 and test again.&lt;/P&gt;
&lt;P&gt;terminal monitor&lt;/P&gt;
&lt;P&gt;debug telnet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-If I helped you somehow, please, rate it as useful.-&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 11:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212140#M1023817</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-07T11:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212143#M1023819</link>
      <description>&lt;P&gt;There is no output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;R2#debug telnet&lt;BR /&gt;Incoming Telnet debugging is on&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 11:24:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212143#M1023819</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-07T11:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212159#M1023820</link>
      <description>&lt;P&gt;Show conn&lt;/P&gt;
&lt;P&gt;Show xlate&lt;/P&gt;
&lt;P&gt;Show nat&lt;/P&gt;
&lt;P&gt;On ASA?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 11:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212159#M1023820</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-07T11:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212185#M1023822</link>
      <description>&lt;P&gt;On ASA&lt;/P&gt;
&lt;P&gt;ciscoasa# show conn&lt;BR /&gt;0 in use, 1 most used&lt;BR /&gt;ciscoasa# show xlate&lt;BR /&gt;1 in use, 1 most used&lt;BR /&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;BR /&gt;TCP PAT from inside:172.26.32.5 23-23 to outside:172.16.44.100 23-23&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:04:58 timeout 0:00:00&lt;BR /&gt;ciscoasa# show nat&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static Telnet_172.26.32.5 172.16.44.100&amp;nbsp;&amp;nbsp; service tcp telnet telnet&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 12:14:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212185#M1023822</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-07T12:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212193#M1023824</link>
      <description>&lt;P&gt;The problem may be this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) static 172.16.44.100 service tcp telnet telnet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Looks like the NAT will match the rule if the connection start from port 23 to port 23.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;PAT from inside:172.26.32.5 23-23 to outside:172.16.44.100 23-23&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However, the source port must be any so that the source port can be any port above 1024, (random ports).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Try to change this and try again.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 12:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212193#M1023824</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-07T12:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212205#M1023826</link>
      <description>&lt;P&gt;Tried changing the NAT below and also don't work, I am not sure how can I change the source port? Please help.&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 172.16.44.100&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 12:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212205#M1023826</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-07T12:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212296#M1023827</link>
      <description>&lt;P&gt;Let me correct something I said. Your NAT config was not wrong sorry. For this version of firewall, you let as is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (outside,inside) source static &amp;lt;real-ip&amp;gt; &amp;lt;mapped-ip&amp;gt;&amp;nbsp;destination static interface &amp;lt;real-ip&amp;gt; service &amp;lt;real-service&amp;gt; &amp;lt;mapped-service&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;NAT must be ok as per the packet traced. But, for some reason the packet is not getting in to the r2.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you send me the GNS3 file?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2017 13:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212296#M1023827</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-07T13:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212871#M1023828</link>
      <description>Some problems with GNS3, but I have attached the config files.&lt;BR /&gt;</description>
      <pubDate>Wed, 08 Nov 2017 07:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212871#M1023828</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-08T07:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212889#M1023829</link>
      <description>&lt;P&gt;sorry can't seems to be able to attach the zip file here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 07:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212889#M1023829</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-08T07:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212948#M1023830</link>
      <description>&lt;P&gt;You need to rename file and change the extension to .txt.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 09:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212948#M1023830</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-11-08T09:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212952#M1023831</link>
      <description>&lt;P&gt;Attached config files, need to rename extension to zip&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2017 09:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat/m-p/3212952#M1023831</guid>
      <dc:creator>Kenneth Goh</dc:creator>
      <dc:date>2017-11-08T09:52:51Z</dc:date>
    </item>
  </channel>
</rss>

