<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033932#M1066871</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You cannot assign a 2nd IP address to an interface, but you can use NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;object network SRV1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.1.20&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (inside,outside) static 1.1.1.2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list OUTSIDE_IN permit tcp any host 192.168.1.20 eq 443&lt;BR /&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;BR /&gt;&lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;As long as your ISP is routing the new IP address (e.g. 1.1.1.2) to the ASA, this should work fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 21:59:35 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-02-21T21:59:35Z</dc:date>
    <item>
      <title>Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033931#M1066870</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i have vlans on my network that are natted to the outside to go on the internet, now i want to publish a server on the internet.&lt;/P&gt;&lt;P&gt;i have a public ip for the internet on a cisco ASA firewall interface, i want to add another public ip on the same interface, so that i can port forward to the server i want to publish through this new public ip?&lt;/P&gt;&lt;P&gt;is this possible? What are your suggestions please?&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/20873"&gt;@ASA&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/763556"&gt;@Firewall&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/335633"&gt;@cisco&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/638276"&gt;@public&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 21:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033931#M1066870</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-21T21:54:03Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033932#M1066871</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You cannot assign a 2nd IP address to an interface, but you can use NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;EM&gt;object network SRV1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;host 192.168.1.20&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;nat (inside,outside) static 1.1.1.2&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-list OUTSIDE_IN permit tcp any host 192.168.1.20 eq 443&lt;BR /&gt;access-group OUTSIDE_IN in interface OUTSIDE&lt;BR /&gt;&lt;/EM&gt;&lt;/PRE&gt;&lt;P&gt;As long as your ISP is routing the new IP address (e.g. 1.1.1.2) to the ASA, this should work fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 21:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033932#M1066871</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-21T21:59:35Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033939#M1066872</link>
      <description>&lt;P&gt;so for example if i am using 1.1.1.1 for internet, i can use this 1.1.1.2 for the port forwarding into my server? and these are on the same interface?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 22:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033939#M1066872</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-21T22:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033947#M1066873</link>
      <description>Yes, you could use that secondary address just for the port forwarding.&lt;BR /&gt;Yes, this NAT would be configured on the outside interface, as per the example I provided above.&lt;BR /&gt;Just amend the IP addresses, port and ACL to fit your requirements.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 21 Feb 2020 22:18:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033947#M1066873</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-21T22:18:37Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033952#M1066874</link>
      <description>&lt;P&gt;oh ok, thank you so much, i will try it and then will reply if it worked, thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 22:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4033952#M1066874</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-21T22:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035744#M1066976</link>
      <description>&lt;P&gt;i have an interface on the ASA that i want to assign the public ip i want to publish the server through, is this methodology correct, i will apply the public ip to this interface, and then i will use the same configuration you told me to use, will this work? for example, this is the configuration:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet1/1
security-level 100
ip address 1.1.1.1 255.255.255.0

exit
object network serverpublish
host 192.168.2.1
nat (inside,outside) static 1.1.1.1
access-list OUTSIDE_IN permit tcp any host 192.168.2.1 eq 443
access-group OUTSIDE_IN in interface OUTSIDE&lt;/PRE&gt;&lt;P&gt;is this good?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035744#M1066976</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-25T22:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035747#M1066977</link>
      <description>Is GigabitEthernet1/1 meant to be the outside interface? It's security-level should be 0 not 100 and also needs a "nameif".&lt;BR /&gt;&lt;BR /&gt;If you already have another outside interface defined, then you just need to define the object and the nat entry....as long as the upstream ISP router knows to route to the ASA.&lt;BR /&gt;&lt;BR /&gt;If you are still unclear, provide your full configuration and the nat ip address you wish to use.</description>
      <pubDate>Tue, 25 Feb 2020 22:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035747#M1066977</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-25T22:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035749#M1066978</link>
      <description>&lt;P&gt;i have an interface in which it has the public ip used to give internet, and all vlans are coming out of this interface so all has internet, now i want to use another interface in which i give another public ip, so that users outside on the internet can access the server inside that i want to publish, so i want to port forward users outside to such server&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035749#M1066978</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-25T22:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035753#M1066979</link>
      <description>&lt;P&gt;So if you already have 1 "outside" interface, then you just need to define a nat.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;object network serverpublish
host 192.168.2.1
nat (inside,outside) static 1.1.1.x
access-list OUTSIDE_IN permit tcp any host 192.168.2.1 eq 443
access-group OUTSIDE_IN in interface OUTSIDE&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;You may need to amend the nat rule above if your inside interface is not called "inside" and your outside interface is not called "outside".&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:51:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035753#M1066979</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-25T22:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035756#M1066980</link>
      <description>&lt;P&gt;this will be the full configuration:&lt;/P&gt;&lt;PRE&gt;interface GigabitEthernet1/2
nameif Fwoutinternet
security-level 0
ip address 1.1.1.1 255.255.255.248
interface GigabitEthernet1/3
nameif Fwtoserver
security-level 100
ip address 1.1.1.2 255.255.255.248
exit
object network serverpublish
host 192.168.2.1
nat (inside,outside) static 1.1.1.2
access-list OUTSIDE_IN permit tcp any host 192.168.2.1 eq 443
access-group OUTSIDE_IN in interface OUTSIDE&lt;/PRE&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035756#M1066980</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-25T22:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035759#M1066981</link>
      <description>&lt;P&gt;yes this is correct config.&lt;/P&gt;
&lt;P&gt;you can test this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input Fwoutinternet tcp 4.4.4.4 1223 1.1.1.2 eq 443&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035759#M1066981</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-25T22:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035760#M1066982</link>
      <description>&lt;P&gt;so this will allow me to port forward users outside on the internet to use the server inside my network, right?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035760#M1066982</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-25T22:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035761#M1066983</link>
      <description>You cannot have 2 interfaces in the same subnet, 1.1.1.1 and 1.1.1.2 are in the same network.&lt;BR /&gt;You don't need to define an IP address on the physical interface Gi1/3. You just need the NAT.&lt;BR /&gt;&lt;BR /&gt;You will need to change the nat rule as "outside" appears to be "Fwoutinternet"</description>
      <pubDate>Tue, 25 Feb 2020 22:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035761#M1066983</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-25T22:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035768#M1066984</link>
      <description>&lt;PRE&gt;object network serverpublish
host 192.168.2.1
nat (inside,Fwoutinternet) static 1.1.1.2
access-list OUTSIDE_IN permit tcp any host 192.168.2.1 eq 443
access-group OUTSIDE_IN in interface OUTSIDE&lt;/PRE&gt;&lt;P&gt;So only this will port forward users outside the internet to my server?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:51:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035768#M1066984</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-25T22:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035769#M1066985</link>
      <description>&lt;P&gt;Correct. If a user connects to &lt;A href="https://1.1.1.2" target="_blank" rel="noopener"&gt;https://1.1.1.2&lt;/A&gt; from the internet then this will port forward to &lt;A href="https://192.168.2.1" target="_blank" rel="noopener"&gt;https://192.168.2.1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to amend your access-group:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-group OUTSIDE_IN in interface &lt;STRONG&gt;Fwoutinternet&lt;/STRONG&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035769#M1066985</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-25T22:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035770#M1066986</link>
      <description>&lt;P&gt;Thank you so much, i will try it later on, and then reply here and accept solution if it worked, thanks again!&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 22:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035770#M1066986</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-25T22:55:34Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035920#M1066995</link>
      <description>&lt;P&gt;this wont affect the ip 1.1.1.1 on the interface 1?, because we are using the same interface which is fwoutinternet&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 07:30:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4035920#M1066995</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-26T07:30:39Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4036353#M1067030</link>
      <description>&lt;P&gt;it wont effect as RJ mentioned this already to you. make the change and test it. in order to test once you apple your configration.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input fwoutinternet tcp 8.8.8.8 12345 1.1.1.2 eq https&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 17:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4036353#M1067030</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-26T17:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4036363#M1067031</link>
      <description>&lt;PRE&gt;ASA# packet-tracer input FwoutTerra tcp 8.8.8.8 1234 1.1.1.2 443

Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
object network OWApublish
 nat (FwInside,FwoutTerra) static 1.1.1.2
Additional Information:
NAT divert to egress interface FwInside
Untranslate 1.1.1.2/443 to 172.16.12.7/443

Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group OUTSIDE_IN in interface FwoutTerra
access-list OUTSIDE_IN extended permit tcp any host 172.16.12.7 eq https
Additional Information:

Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 5
Type: SFR
Subtype:
Result: ALLOW
Config:
class-map class
 match any
policy-map map
 class class
  sfr fail-open
service-policy map global
Additional Information:

Phase: 6
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
object network OWApublish
 nat (FwInside,FwoutTerra) static 1.1.1.2
Additional Information:

Phase: 7
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 8
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 46591092, packet dispatched to next module

Result:
output-interface: FwInside
output-status: up
output-line-status: up
Action: allow&lt;/PRE&gt;&lt;P&gt;this is the output, seems everything is fine&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 18:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4036363#M1067031</guid>
      <dc:creator>AhmadZ</dc:creator>
      <dc:date>2020-02-26T18:04:56Z</dc:date>
    </item>
    <item>
      <title>Re: Adding Multiple Public IPs on a Single Interface on Cisco ASA Firewall</title>
      <link>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4036365#M1067032</link>
      <description>&lt;P&gt;yes it look good. you should be good now. you nat rules is working accordingly. &lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 18:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/adding-multiple-public-ips-on-a-single-interface-on-cisco-asa/m-p/4036365#M1067032</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-26T18:09:29Z</dc:date>
    </item>
  </channel>
</rss>

