<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic thanks Marius , in my in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023736#M146841</link>
    <description>&lt;P&gt;thanks Marius , in my architecture i have 2 hops, what routes i should do my architecture as the following&lt;IMG src="https://community.cisco.com/legacyfs/online/media/asa_router_1.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;MM&lt;/P&gt;</description>
    <pubDate>Mon, 06 Feb 2017 15:31:28 GMT</pubDate>
    <dc:creator>moussa.malqui1</dc:creator>
    <dc:date>2017-02-06T15:31:28Z</dc:date>
    <item>
      <title>ASA communication form many inside to many outside</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023732#M146831</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;
&lt;P&gt;how can i make interface vlan2 (&lt;SPAN&gt;GigabitEthernet0/1.1) to communicate with interface&amp;nbsp;tcvpn (GigabitEthernet0/4.1) and interface vlan3 (&lt;SPAN&gt;GigabitEthernet0/1.2) to communicate with interface cacvpn (GigabitEthernet0/4.2)? when i put "route tcvpn 10.240.20.0 255.255.255.0 10.30.60.1" or "route cacvpn 10.240.30.0 255.255.255.0 10.30.70.1" i get error this interface is directly connected, but when i put "route tcvpn 0 0 10.240.20.1' i get communication between&amp;nbsp;interface vlan2 (&lt;SPAN&gt;GigabitEthernet0/1.1) and&amp;nbsp;interface&amp;nbsp;&lt;SPAN&gt;tcvpn (&lt;/SPAN&gt;&lt;SPAN&gt;GigabitEthernet0/4.1) and when i try to put&amp;nbsp;route cacvpn 0 0 10.240.30.1 to get communication between&amp;nbsp;interface &lt;SPAN&gt;vlan3 (&lt;/SPAN&gt;&lt;SPAN&gt;GigabitEthernet0/1.2) and&amp;nbsp;cac&lt;SPAN&gt;vpn (GigabitEthernet0/4.&lt;/SPAN&gt;&lt;SPAN&gt;2&lt;/SPAN&gt;&lt;SPAN&gt;) i get this route is already exist.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;so what is solution to put many "route interface 0 0 adrs_IP" to get communication from many inside interfaces to many outside interfaces or other possibility to solve that&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;this is my configuration:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;ASA Version 9.2(2)4&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.0.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; duplex full&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.1&lt;BR /&gt; vlan 2&lt;BR /&gt; nameif VLAN2&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.30.60.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.2&lt;BR /&gt; vlan 3&lt;BR /&gt; nameif VLAN3&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.30.70.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.3&lt;BR /&gt; vlan 5&lt;BR /&gt; nameif VLAN5&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.30.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.4&lt;BR /&gt; vlan 6&lt;BR /&gt; nameif VLAN6&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.30.110.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.1&lt;BR /&gt; vlan 9&lt;BR /&gt; nameif TCDMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.60.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.2&lt;BR /&gt; vlan 10&lt;BR /&gt; nameif CACDMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.70.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.3&lt;BR /&gt; vlan 11&lt;BR /&gt; nameif TFDMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.4&lt;BR /&gt; vlan 12&lt;BR /&gt; nameif TPIDMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4.1&lt;BR /&gt; vlan 17&lt;BR /&gt; nameif tcvpn&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.240.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4.2&lt;BR /&gt; vlan 18&lt;BR /&gt; nameif cacvpn&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.240.30.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4.3&lt;BR /&gt; vlan 19&lt;BR /&gt; nameif tfcsvpn&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.250.139.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa922-4-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network inside-tc&lt;BR /&gt; subnet 10.30.60.0 255.255.255.0&lt;BR /&gt;object network inside-cac&lt;BR /&gt; subnet 10.30.70.0 255.255.255.0&lt;BR /&gt;object network dmz-tc&lt;BR /&gt; subnet 192.168.60.0 255.255.255.0&lt;BR /&gt;object network dmz-cac&lt;BR /&gt; subnet 192.168.70.0 255.255.255.0&lt;BR /&gt;object network tc-vpn&lt;BR /&gt; subnet 10.30.60.0 255.255.255.0&lt;BR /&gt;object network cac-vpn&lt;BR /&gt; subnet 10.30.70.0 255.255.255.0&lt;BR /&gt;object network inside-tpi&lt;BR /&gt; subnet 10.30.100.0 255.255.255.0&lt;BR /&gt;object network inside-tf&lt;BR /&gt; subnet 10.30.110.0 255.255.255.0&lt;BR /&gt;object network tpi-vpn&lt;BR /&gt; subnet 10.30.100.0 255.255.255.0&lt;BR /&gt;object network tf-vpn&lt;BR /&gt; subnet 10.30.110.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VLAN2 1500&lt;BR /&gt;mtu VLAN3 1500&lt;BR /&gt;mtu TCDMZ 1500&lt;BR /&gt;mtu CACDMZ 1500&lt;BR /&gt;mtu TFDMZ 1500&lt;BR /&gt;mtu TPIDMZ 1500&lt;BR /&gt;mtu tcvpn 1500&lt;BR /&gt;mtu cacvpn 1500&lt;BR /&gt;mtu tfcsvpn 1500&lt;BR /&gt;mtu VLAN5 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu VLAN6 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7221.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network inside-tc&lt;BR /&gt; nat (VLAN2,outside) dynamic interface&lt;BR /&gt;object network inside-cac&lt;BR /&gt; nat (VLAN3,outside) dynamic interface&lt;BR /&gt;object network dmz-tc&lt;BR /&gt; nat (TCDMZ,outside) dynamic interface&lt;BR /&gt;object network dmz-cac&lt;BR /&gt; nat (CACDMZ,outside) dynamic interface&lt;BR /&gt;object network tc-vpn&lt;BR /&gt; nat (VLAN2,tcvpn) dynamic interface&lt;BR /&gt;object network cac-vpn&lt;BR /&gt; nat (VLAN3,cacvpn) dynamic interface&lt;BR /&gt;object network inside-tpi&lt;BR /&gt; nat (VLAN5,outside) dynamic interface&lt;BR /&gt;object network inside-tf&lt;BR /&gt; nat (VLAN6,outside) dynamic interface&lt;BR /&gt;object network tpi-vpn&lt;BR /&gt; nat (VLAN5,tfcsvpn) dynamic interface&lt;BR /&gt;object network tf-vpn&lt;BR /&gt; nat (VLAN6,tfcsvpn) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;username admin password 9UXn7hOsRRC8SKFP encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:9259d0aa6e5fcca1e2c0c893607c0a8d&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks in advance,&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;MM&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023732#M146831</guid>
      <dc:creator>moussa.malqui1</dc:creator>
      <dc:date>2019-03-12T08:53:10Z</dc:date>
    </item>
    <item>
      <title>Is this a Lab?  Why do you</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023733#M146834</link>
      <description>&lt;P&gt;Is this a Lab? &amp;nbsp;Why do you have dynamic NAT between all your LAN interfaces? &amp;nbsp;The only dynamic NAT you should have is between your LAN interfaces and the outside interface (internet facing interface). No NAT needed between the LAN interfaces.&lt;/P&gt;
&lt;P&gt;You do not need routes to route traffic to subnets that are directly connected to the ASA.&lt;/P&gt;
&lt;P&gt;Run a packet-tracer to find out what is stopping the packet in the firewall.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 22:18:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023733#M146834</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-03T22:18:04Z</dc:date>
    </item>
    <item>
      <title>this is not LAN interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023734#M146837</link>
      <description>&lt;P&gt;this is not LAN interfaces they are vpn link interfaces (tcvpn,cacvpn) to router in my LAN and outside (internet) but whithout deefault route i didn't get access to vpn applications this is my archetcture: i have sub-interfaces for vpn and sub interfaces for LAN (VLAN)&lt;IMG src="https://community.cisco.com/legacyfs/online/media/asa_router_0.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 23:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023734#M146837</guid>
      <dc:creator>moussa.malqui1</dc:creator>
      <dc:date>2017-02-03T23:01:55Z</dc:date>
    </item>
    <item>
      <title>You do not need default</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023735#M146838</link>
      <description>&lt;P&gt;You do not need default routes out each interface. the reason you don't have reachability is because the ASA does not have routes to the remote destinations pointing out the correct interfaces. &amp;nbsp;So what you need to do is add static routes for all the subnets and point them out the correct interfaces.&lt;/P&gt;
&lt;P&gt;So for example for subnets A and B&lt;/P&gt;
&lt;P&gt;route INTERFACE1 A.A.A.0 255.255.255.0 &amp;lt;INTERFACE1 next hop IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route INTERFACE2 B.B.B.0 255.255.255.0 &amp;lt;INTERFACE2 next hop IP&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 20:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023735#M146838</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-04T20:32:20Z</dc:date>
    </item>
    <item>
      <title>thanks Marius , in my</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023736#M146841</link>
      <description>&lt;P&gt;thanks Marius , in my architecture i have 2 hops, what routes i should do my architecture as the following&lt;IMG src="https://community.cisco.com/legacyfs/online/media/asa_router_1.jpg" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;MM&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 15:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023736#M146841</guid>
      <dc:creator>moussa.malqui1</dc:creator>
      <dc:date>2017-02-06T15:31:28Z</dc:date>
    </item>
    <item>
      <title>Could you run a packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023737#M146844</link>
      <description>&lt;P&gt;Could you run a packet tracer&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input VLAN2 tcp&amp;nbsp;10.30.60.10 12345 10.240.1.10 80 detail&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also, can you try to ping 10.240.20.1 from a host on VLAN2.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If both of these are successful then your issue is routing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2017 20:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023737#M146844</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-06T20:27:03Z</dc:date>
    </item>
    <item>
      <title>thanks Marius , what is the</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023738#M146848</link>
      <description>&lt;P&gt;thanks Marius , what is the routes i should put in my case&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route tcvpn 10.240.1.0 255.255.255.0 10.240.20.1 &amp;nbsp;.&lt;/P&gt;
&lt;P&gt;this route sufficient or i should add the route:&lt;/P&gt;
&lt;P&gt;route tcvpn 10.240.145.0 255.255.255.0 10.240.20.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;MM&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 10:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023738#M146848</guid>
      <dc:creator>moussa.malqui1</dc:creator>
      <dc:date>2017-02-07T10:03:52Z</dc:date>
    </item>
    <item>
      <title>route tcvpn 10.240.1.0 255</title>
      <link>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023739#M146850</link>
      <description>&lt;P&gt;&lt;SPAN&gt;route tcvpn 10.240.1.0 255.255.255.0 10.240.20.1 &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;this route is sufficient. the other route is not needed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 16:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-communication-form-many-inside-to-many-outside/m-p/3023739#M146850</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-07T16:12:21Z</dc:date>
    </item>
  </channel>
</rss>

