<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic try looking at the xlate to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009278#M135054</link>
    <description>&lt;P&gt;try looking at the xlate to see if its using the right one;&lt;/P&gt;
&lt;P&gt;show xlate local&amp;nbsp;192.168.242.200&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Jun 2017 09:25:46 GMT</pubDate>
    <dc:creator>mickyq</dc:creator>
    <dc:date>2017-06-06T09:25:46Z</dc:date>
    <item>
      <title>Simple PAT/NAT on asa</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009275#M135051</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;i have a easy setup.&lt;/P&gt;
&lt;P&gt;an outside interface with the ip address 172.21.241.205&lt;/P&gt;
&lt;P&gt;and a ssh server on the inside interface with the address 192.168.242.200&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i create a network object :&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network&amp;nbsp;FileServer&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;host 192.168.242.200&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) static interface service tcp 22 22&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;BR /&gt;then&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list outside permit tcp any 192.168.242.200 255.255.255.255 eq 22&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-group outside in interface outside&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;but now when a client try to access the server i get this error:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;3&lt;/TD&gt;
&lt;TD&gt;Jun 02 2017&lt;/TD&gt;
&lt;TD&gt;09:46:14&lt;/TD&gt;
&lt;TD&gt;710003&lt;/TD&gt;
&lt;TD&gt;172.21.241.216&lt;/TD&gt;
&lt;TD&gt;52155&lt;/TD&gt;
&lt;TD&gt;172.21.241.205&lt;/TD&gt;
&lt;TD&gt;22&lt;/TD&gt;
&lt;TD&gt;TCP access denied by ACL from 172.21.241.216/52155 to outside:172.21.241.205/22&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009275#M135051</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2019-03-12T09:27:29Z</dc:date>
    </item>
    <item>
      <title>Can you post a "sh nat".
Jon</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009276#M135052</link>
      <description>&lt;P&gt;Can you post a "sh nat".&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 09:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009276#M135052</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-06-02T09:12:34Z</dc:date>
    </item>
    <item>
      <title>sorry for the delay..</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009277#M135053</link>
      <description>&lt;P&gt;sorry for the delay..&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt; translate_hits = 324345, untranslate_hits = 566120&lt;BR /&gt;2 (inside) to (Private) source dynamic any interface&lt;BR /&gt; translate_hits = 874, untranslate_hits = 0&lt;BR /&gt;3 (Private) to (inside) source dynamic any interface&lt;BR /&gt; translate_hits = 106, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;&lt;BR /&gt;1 (any) to (outside) source static FileServer interface service tcp www www&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 05:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009277#M135053</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-06T05:37:50Z</dc:date>
    </item>
    <item>
      <title>try looking at the xlate to</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009278#M135054</link>
      <description>&lt;P&gt;try looking at the xlate to see if its using the right one;&lt;/P&gt;
&lt;P&gt;show xlate local&amp;nbsp;192.168.242.200&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 09:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009278#M135054</guid>
      <dc:creator>mickyq</dc:creator>
      <dc:date>2017-06-06T09:25:46Z</dc:date>
    </item>
    <item>
      <title>show xlate local 192.168.242</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009279#M135055</link>
      <description>&lt;P&gt;&amp;nbsp;show xlate local 192.168.242.200&lt;BR /&gt;183 in use, 365 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt; s - static, T - twice, N - net-to-net&lt;BR /&gt;TCP PAT from any:192.168.242.200 80-80 to outside:172.21.241.205 80-80&lt;BR /&gt; flags sr idle 0:00:10 timeout 0:00:00&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 09:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009279#M135055</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-06T09:36:21Z</dc:date>
    </item>
    <item>
      <title>The problem is it is hitting</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009280#M135056</link>
      <description>&lt;P&gt;The problem is it is hitting rule 1 in section 1 so it never gets to section 2 where your rule is and you can see this because there are no hits.&lt;/P&gt;
&lt;P&gt;So either move your static NAT rule to section 1 and make sure it is first in the list (you can use line numbers) or move rule 1 in section to section 3 using the "after-auto" keyword.&lt;/P&gt;
&lt;P&gt;As a general rule you would usually put the dynamic NAT general rules in section 3 to avoid this type of thing but note that moving it to section 3 will affect service temporarily whereas moving your static NAT statement won't as it isn't working anyway at the moment.&lt;/P&gt;
&lt;P&gt;There is a great document on this site explaining all of this and a lot more, I'll see if it can find it for you.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 09:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009280#M135056</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-06-06T09:49:08Z</dc:date>
    </item>
    <item>
      <title>something is still not work :</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009281#M135057</link>
      <description>&lt;P&gt;something is still not work &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;sh nat&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (any) to (outside) source static FileServer interface service tcp www www&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (inside) to (IB2_Private) source dynamic any interface&lt;BR /&gt; translate_hits = 4, untranslate_hits = 0&lt;BR /&gt;2 (IB2_Private) to (inside) source dynamic any interface&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;3 (inside) to (outside) source dynamic any interface&lt;BR /&gt; translate_hits = 1796, untranslate_hits = 977&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 10:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009281#M135057</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-06T10:02:47Z</dc:date>
    </item>
    <item>
      <title>In your original post you are</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009282#M135058</link>
      <description>&lt;P&gt;In your original post you are giving access to port 22 but in the NAT statement it is for port 80 ?&lt;/P&gt;
&lt;P&gt;Can you clarify and also can you run a packet tracer to see where it is failing.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 10:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009282#M135058</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-06-06T10:09:37Z</dc:date>
    </item>
    <item>
      <title>[toc on_off::hide=0 on_off:</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009283#M135059</link>
      <description>&lt;P&gt;[toc:faq]&lt;/P&gt;
&lt;P&gt;sorry 80 is correct.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;IB4FW1# packet-tracer input outside tcp 172.21.241.22 1024 172.21.241.205 80&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.242.200 using egress ifc inside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network FileServer&lt;BR /&gt; nat (any,outside) static interface service tcp www www&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 172.21.241.205/80 to 192.168.242.200/80&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.21.241.129 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;access-list outside extended permit tcp any any object-group DM_INLINE_TCP_4&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq ssh&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: SFR&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map SFR&lt;BR /&gt; match access-list SFR&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; description test&lt;BR /&gt; class SFR&lt;BR /&gt; sfr fail-open&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; description test&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect http&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network FileServer&lt;BR /&gt; nat (any,outside) static interface service tcp www www&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 15&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 16&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 366822, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 10:37:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009283#M135059</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-06T10:37:15Z</dc:date>
    </item>
    <item>
      <title>According to the output it is</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009284#M135060</link>
      <description>&lt;P&gt;According to the output it is working ie. it matches the correct NAT rule and is allowed through.&lt;/P&gt;
&lt;P&gt;Are you still not seeing any hits on that rule in a "sh nat" ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 10:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009284#M135060</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-06-06T10:44:13Z</dc:date>
    </item>
    <item>
      <title>Auto NAT Policies (Section 2</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009285#M135061</link>
      <description>&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (any) to (outside) source static FileServer interface service tcp www www&lt;BR /&gt; translate_hits = 0, untranslate_hits = 7&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (IB2_Private) to (inside) source dynamic any interface&lt;BR /&gt; translate_hits = 7, untranslate_hits = 0&lt;BR /&gt;2 (inside) to (outside) source dynamic any interface&lt;BR /&gt; translate_hits = 8073, untranslate_hits = 3659&lt;BR /&gt;3 (inside) to (IB2_Private) source dynamic any interface&lt;BR /&gt; translate_hits = 4, untranslate_hits = 0&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 10:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009285#M135061</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-06T10:47:21Z</dc:date>
    </item>
    <item>
      <title>So it is working according to</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009286#M135062</link>
      <description>&lt;P&gt;So it is working according to that.&lt;/P&gt;
&lt;P&gt;Is the server on the same IP subnet as the inside interface and is the default gateway of the server the ASA ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 10:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009286#M135062</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-06-06T10:50:00Z</dc:date>
    </item>
    <item>
      <title>but this look like some thing</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009287#M135063</link>
      <description>&lt;P&gt;but this look like some thing is still wrong&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolvecisco&amp;nbsp;&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.21.241.129 using egress ifc outside&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 11:25:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009287#M135063</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-06T11:25:44Z</dc:date>
    </item>
    <item>
      <title>Phase 2 picks the right</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009288#M135064</link>
      <description>&lt;P&gt;Phase 2 picks the right interface and if you look at the very end it is saying the inside interface is the output interface.&lt;/P&gt;
&lt;P&gt;Are you sure there is not a problem with the server ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2017 11:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009288#M135064</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2017-06-06T11:57:47Z</dc:date>
    </item>
    <item>
      <title>thank you. the asa work.</title>
      <link>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009289#M135065</link>
      <description>&lt;P&gt;thank you. the asa work.&lt;/P&gt;
&lt;P&gt;my server has a nic in the same subnet like the asa outgoing interface &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks for you help&lt;/P&gt;
&lt;P&gt;now all work&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 05:07:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-pat-nat-on-asa/m-p/3009289#M135065</guid>
      <dc:creator>Snakekick</dc:creator>
      <dc:date>2017-06-07T05:07:56Z</dc:date>
    </item>
  </channel>
</rss>

