<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for all the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944980#M148141</link>
    <description>&lt;P&gt;Thank you for all the responses. &amp;nbsp;Pablo, yours did the trick! &amp;nbsp;Much appreciated!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jan 2017 19:00:00 GMT</pubDate>
    <dc:creator>webmike10</dc:creator>
    <dc:date>2017-01-04T19:00:00Z</dc:date>
    <item>
      <title>Access Public IP Address Internally</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944967#M148108</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am configuring a 5506-x for the first time. Without the firewall installed, staff currently access a remote desktop machine internally using the public IP address. &amp;nbsp;I have it configured so workstations internally&amp;nbsp;can access the server in DMZ 172.16.20.20 and from the outside. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, for the life of me, I can not get it configured&amp;nbsp;to allow somebody on the GUEST interface or the INTERNAL interface to access the public IP 184.188.4.x.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, I can have the staff access the remote app using the DMZ server IP 172.16.0.20 but it&amp;nbsp;would require me to reconfigure 10 mobile devices laptops of the staff with two separate remote connections (one with the public IP address to use when outside of the network and another to use internally). &amp;nbsp;What NAT rule would be applied to allow clients on the LAN to access the public IP address:3389?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944967#M148108</guid>
      <dc:creator>webmike10</dc:creator>
      <dc:date>2019-03-12T08:43:22Z</dc:date>
    </item>
    <item>
      <title>Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944968#M148110</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I understand that , You have a server at DMZ &amp;nbsp;&lt;SPAN&gt;172.16.20.20 that has been&amp;nbsp;184.188.4.x. nat to outside for RDP access . so outside user will access your DMZ &amp;nbsp;172.16.20.20 &amp;amp; your internal user traffic has to go directly to DMZ&amp;nbsp;172.16.20.20 .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is your are looking for ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Mani.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 06:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944968#M148110</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2017-01-02T06:08:01Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944969#M148114</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please attach a running configuration of the existing setup. The requirement should be fairly simple to achieve using NAT statement. Please attach a show run output and also specify requirements in bullet points.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 07:17:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944969#M148114</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-01-02T07:17:18Z</dc:date>
    </item>
    <item>
      <title>Thanks for the response.  </title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944970#M148116</link>
      <description>&lt;P&gt;Thanks for the response. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;The config is below. &amp;nbsp;Essentially to allow&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Guest (nameif Guest / ip address 172.16.30.1 255.255.255.0)&amp;nbsp;access to External Public IP (nameif Outside / ip address&amp;nbsp;&lt;SPAN&gt;184.188.4.x.) on port 3389. &amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ASA Version 9.3(2)2 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;hostname CCC-FW-01&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;domain-name ccc.battlefieldblvd.org&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;enable password Jo0j3TGhpkUt.EFg encrypted&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;names&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ip local pool VPN_Sessions_Pool 10.10.255.1-10.10.255.10 mask 255.255.255.240&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address dhcp setroute &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; shutdown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address 172.16.50.1 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; shutdown&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif PointtoPoint&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address 172.16.1.2 255.255.255.252 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; channel-group 1 mode on&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; channel-group 1 mode on&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; channel-group 1 mode on&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface GigabitEthernet1/8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; channel-group 1 mode on&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no nameif&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no security-level&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Management1/1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; management-only&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif management&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address 172.16.40.1 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Port-channel1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lacp max-bundle 8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; port-channel load-balance src-dst-ip-port&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif Port-channel1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; no ip address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Port-channel1.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vlan 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address 172.16.10.1 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Port-channel1.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; description Server Access VLAN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vlan 20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address 172.16.20.1 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface Port-channel1.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; description Wifi and Clincians Access VLAN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vlan 30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nameif Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; security-level 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ip address 172.16.30.1 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ftp mode passive&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;clock timezone EST -5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;clock summer-time EDT recurring&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup PointtoPoint&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup management&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup Port-channel1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns domain-lookup Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dns server-group DefaultDNS&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; domain-name ccc.battlefieldblvd.org&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;same-security-traffic permit inter-interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network obj_any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network ccc-server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host 172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; description Inside-Server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Private_Class_A&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet 10.0.0.0 255.0.0.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Private_Class_B&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet 172.16.0.0 255.240.0.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Private_Class_C&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet 192.168.0.0 255.255.0.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Printer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host 172.16.30.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object service rdp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; service tcp source eq 3389 destination eq 3389 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object service 3389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; service tcp destination eq 3389 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; description 3389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host&lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet &lt;SPAN&gt;184.188.4.0&lt;/SPAN&gt;&amp;nbsp;255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network interneta&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host &lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Internet_RDP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host 172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network Outside_RDP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host 172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network RDPOutside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host &lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network PORT-FORWARD&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host 172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network INSIDE-OUT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host &lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network obj-host-172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host 172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network obj-host-&lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host &lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network outsidea&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; host &lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network inside-subnet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet 172.16.10.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network dmz-subnet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; subnet 172.16.20.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object-group service DM_INLINE_SERVICE_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; service-object icmp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; service-object tcp destination eq 3389 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object-group network Private-Networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; network-object object Private_Class_A&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; network-object object Private_Class_B&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; network-object object Private_Class_C&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object-group protocol IP-ICMP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; protocol-object ip&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; protocol-object icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; protocol-object ip&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; protocol-object icmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in remark Outbound traffic to LAN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in extended permit tcp 172.16.20.0 255.255.255.0 172.16.30.0 255.255.255.0 eq 3389 inactive &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in remark Allow rdp traffic to server from front office&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in extended permit tcp 172.16.10.0 255.255.255.0 object ccc-server eq 3389 inactive &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in remark Allow rdp to server from clinicans fffice and WIFI&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in extended permit tcp 172.16.30.0 255.255.255.0 object ccc-server eq 3389 inactive &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in extended permit tcp any 172.16.1.0 255.255.255.0 eq ssh &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in remark Block all traffic to private networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in extended deny object-group IP-ICMP any object-group Private-Networks &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in remark Permit traffic to internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list dmz_access_in extended permit ip 172.16.20.0 255.255.255.0 any &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in extended deny ip any 172.16.1.0 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in extended permit ip 172.16.30.0 255.255.255.0 any inactive &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 remark Allow access from offices &amp;amp; wifi to server&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 extended permit object-group DM_INLINE_SERVICE_1 172.16.30.0 255.255.255.0 object ccc-server &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 remark Allow access from offices and wifi to printer&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 extended permit object-group DM_INLINE_PROTOCOL_1 172.16.30.0 255.255.255.0 object Printer &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 remark Block all traffic to private networks&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 extended deny object-group IP-ICMP any object-group Private-Networks &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 remark Allow access to Internet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list Guest_access_in_1 extended permit ip 172.16.30.0 255.255.255.0 any &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_access_in remark Remote access to DMZ server on port 3389&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_access_in extended permit object 3389 any object Internet_RDP &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_access_in extended permit object 3389 object obj-host-172.16.20.20 object obj-host-&lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt; inactive &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_access_in extended deny object-group IP-ICMP any any &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list outside_cryptomap extended permit ip 172.16.10.0 255.255.255.0 192.168.13.0 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;pager lines 24&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;logging enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;logging asdm informational&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no logging message 302015&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no logging message 302016&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu outside 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu PointtoPoint 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu management 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu Port-channel1 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu internal 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu dmz 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;mtu Guest 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no failover&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no asdm history enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;arp timeout 14400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no arp permit-nonconnected&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (dmz,Guest) source dynamic any interface destination static obj-host-&lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt; obj-host-172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network PORT-FORWARD&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nat (dmz,outside) static interface service tcp 3389 3389 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network INSIDE-OUT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nat (dmz,Guest) static 172.16.20.20 service tcp 3389 3389 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network obj-host-&lt;SPAN&gt;184.188.4.x&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nat (Guest,outside) static obj-host-172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network outsidea&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nat (dmz,outside) static 172.16.20.20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network inside-subnet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nat (internal,outside) dynamic interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network dmz-subnet&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; nat (dmz,outside) dynamic interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (internal,outside) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (internal,dmz) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (dmz,outside) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (Guest,outside) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (Guest,dmz) after-auto source dynamic any interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (management,internal) after-auto source dynamic any interface inactive&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group outside_access_in in interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group dmz_access_in in interface dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-group Guest_access_in_1 in interface Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout xlate 3:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout pat-xlate 0:00:30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;timeout floating-conn 0:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;user-identity default-domain LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;aaa authentication http console LOCAL &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;aaa authentication ssh console LOCAL &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;http server enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;http 172.16.20.0 255.255.255.0 dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;http 0.0.0.0 0.0.0.0 management&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;http 172.16.10.0 255.255.255.0 internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no snmp-server location&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no snmp-server contact&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;service sw-reset-button&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec security-association pmtu-aging infinite&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map outside_map 1 match address outside_cryptomap&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map outside_map 1 set pfs &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map outside_map 1 set peer 166.249.84.7 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map outside_map interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ca trustpool policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev2 policy 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; integrity sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 5 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; prf sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime seconds 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev2 policy 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-192&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; integrity sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 5 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; prf sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime seconds 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev2 policy 20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; integrity sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 5 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; prf sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime seconds 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev2 policy 30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption 3des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; integrity sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 5 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; prf sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime seconds 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev2 policy 40&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; integrity sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 5 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; prf sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime seconds 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 enable outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication crack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication rsa-sig&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 40&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication crack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-192&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 50&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication rsa-sig&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-192&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 60&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes-192&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 70&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication crack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 80&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication rsa-sig&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 90&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption aes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication crack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption 3des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 110&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication rsa-sig&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption 3des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 120&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption 3des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 130&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication crack&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 140&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication rsa-sig&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ikev1 policy 150&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; encryption des&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;telnet timeout 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no ssh stricthostkeycheck&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ssh 172.16.10.0 255.255.255.0 internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ssh timeout 60&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ssh version 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;ssh key-exchange group dh-group1-sha1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;console timeout 15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no vpn-addr-assign dhcp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no ipv6-vpn-addr-assign aaa&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no ipv6-vpn-addr-assign local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcp-client client-id interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd address 172.16.10.10-172.16.10.20 internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd lease 604800 interface internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd option 3 ip 172.16.10.1 interface internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd enable internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd address 172.16.20.20-172.16.20.20 dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd lease 1048575 interface dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd option 3 ip 172.16.20.1 interface dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd enable dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd address 172.16.30.30-172.16.30.50 Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd lease 86400 interface Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd option 3 ip 172.16.30.1 interface Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dhcpd enable Guest&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;threat-detection basic-threat&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;threat-detection statistics&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dynamic-filter updater-client enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dynamic-filter enable interface outside &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dynamic-filter drop blacklist interface outside &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;group-policy DfltGrpPolicy attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vpn-tunnel-protocol ikev1 ssl-clientless&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;group-policy GroupPolicy1 internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;group-policy GroupPolicy1 attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vpn-tunnel-protocol ikev1 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;group-policy VPN_IT internal&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;group-policy VPN_IT attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vpn-idle-timeout 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vpn-session-timeout none&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; vpn-tunnel-protocol ikev1 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;dynamic-access-policy-record VPN_IT_DAP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; description "Information Technology VPN Access"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; priority 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;username mike.griffin password OoaeDIDEu33lt1pl encrypted privilege 15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group CCCIT type remote-access&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group CCCIT general-attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; address-pool VPN_Sessions_Pool&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; password-management password-expire-in-days 7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group CCCIT ipsec-attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ikev1 pre-shared-key *****&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group 166.249.84.7 type ipsec-l2l&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group 166.249.84.7 general-attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; default-group-policy GroupPolicy1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group 166.249.84.7 ipsec-attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; ikev1 pre-shared-key *****&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;class-map inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; match default-inspection-traffic&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;policy-map type inspect dns preset_dns_map&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; parameters&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; message-length maximum client auto&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; message-length maximum 512&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; class inspection_default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect dns preset_dns_map &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect ftp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect h323 h225 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect h323 ras &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect rsh &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect rtsp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect esmtp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect sqlnet &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect skinny &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect sunrpc &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect xdmcp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect sip &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect netbios &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect tftp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect ip-options &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect icmp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt; inspect icmp error &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;prompt hostname context &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;no call-home reporting anonymous&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;hpm topN enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Cryptochecksum:9554744cd0294d85e1b16467db4b0cd0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;: end&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 14:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944970#M148116</guid>
      <dc:creator>webmike10</dc:creator>
      <dc:date>2017-01-02T14:16:28Z</dc:date>
    </item>
    <item>
      <title>Looking for internal user to</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944971#M148119</link>
      <description>&lt;P&gt;Looking for&amp;nbsp;internal&amp;nbsp;&lt;SPAN&gt;user to access OUTSIDE&amp;nbsp; 184.188.4.x. on port 3389&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jan 2017 14:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944971#M148119</guid>
      <dc:creator>webmike10</dc:creator>
      <dc:date>2017-01-02T14:18:46Z</dc:date>
    </item>
    <item>
      <title>Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944972#M148122</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;object network Guest_nw&lt;BR /&gt;subnet 172.16.30.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;Object network 184.188.4.x&lt;BR /&gt;host 184.188.4.x&lt;/P&gt;
&lt;P&gt;object service RDP_TCP&lt;BR /&gt;service tcp destination eq 3389&lt;/P&gt;
&lt;P&gt;nat ( guest , outside ) source dynamic Guest_nw interface destnation 184.188.4.x 184.188.4.x service RDP_TCP RDP_TCP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;make sure this will be NAT ordered &amp;nbsp;in line 1 .&lt;/P&gt;
&lt;P&gt;#access-list Guest_access_in_1 &amp;nbsp;extended permit tcp host&amp;nbsp;&lt;SPAN&gt;184.188.4.x &amp;nbsp;172.16.30.0 255.255.255.0 eq 3389&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;also ensure the Access-list in line 1 .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;so , Guest network users will do only RDP to outside network&amp;nbsp;184.188.4.X .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Rate &amp;nbsp;this if helps you .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;thanks,&lt;/P&gt;
&lt;P&gt;Mani.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 05:10:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944972#M148122</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2017-01-03T05:10:36Z</dc:date>
    </item>
    <item>
      <title>There is still a confusion.</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944973#M148125</link>
      <description>&lt;P&gt;There is still a confusion. Please let me know if the below is correct:&lt;/P&gt;
&lt;P&gt;you would like to access the dmz server 172.16.20.20 on its public ip address 184.188.4.x from uers located behind guest interface. So, essentially, the server 184.188.4.x is physically present behind dmz as 172.16.20.20. Please confirm.&lt;/P&gt;
&lt;P&gt;Also, There are few weird looking NAT statements which we need to remove/modify which we can check after confirming the requirement here.&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;-&lt;BR /&gt;AJ&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 06:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944973#M148125</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-01-03T06:52:32Z</dc:date>
    </item>
    <item>
      <title>What you are looking for is</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944974#M148128</link>
      <description>&lt;P&gt;What you are looking for is DNS re-write. &amp;nbsp;Just add the &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/SPAN&gt; keyword to the end of your NAT statement but then also make sure that if the server / PC is located on another interface on the ASA that you allow the traffic to the private IP in the access list.&lt;/P&gt;
&lt;P&gt;But if you are accessing the IP directly and not via a FQDN then you can use the NAT suggestion further up in this post.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 11:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944974#M148128</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-03T11:00:44Z</dc:date>
    </item>
    <item>
      <title>I get an error when executing</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944975#M148131</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;I get an error when executing&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;&lt;G class="gr_ gr_71 gr-alert gr_spell gr_run_anim ContextualSpelling" id="71" data-gr-id="71"&gt;nat&lt;/G&gt; ( &lt;G class="gr_ gr_8 gr-alert gr_gramm gr_run_anim Style multiReplace" id="8" data-gr-id="8"&gt;guest ,&lt;/G&gt; outside ) source dynamic Guest_nw interface destination 184.188.4.x 184.188.4.x service RDP_TCP RDP_TCP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;nat ( guest , outside ) source dynamic Guest_nw interface destnation 184.188.4.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^ 184.188.4.2 service RDP_TCP RDP_TCP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif';"&gt;ERROR: % Invalid input detected at '^' marker.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 19:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944975#M148131</guid>
      <dc:creator>webmike10</dc:creator>
      <dc:date>2017-01-03T19:35:23Z</dc:date>
    </item>
    <item>
      <title>behind which NAT statement? </title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944976#M148133</link>
      <description>&lt;P&gt;behind which NAT statement?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Jan 2017 19:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944976#M148133</guid>
      <dc:creator>webmike10</dc:creator>
      <dc:date>2017-01-03T19:39:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944977#M148135</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;This should do the trick for you:&lt;BR /&gt;&lt;BR /&gt;nat (Guest,dmz) 1 source static any any destination static 184.188.4.x Internet_RDP service RDP_TCP RDP_TCP&lt;BR /&gt;nat (Internal,dmz) 2 source static any any destination static 184.188.4.x Internet_RDP service RDP_TCP RDP_TCP&lt;BR /&gt;&lt;BR /&gt;I reused the Internet_RDP object for the real server but you can come up with a new one of you want to.&lt;BR /&gt;&lt;BR /&gt;Also, not sure if the static NAT entry shown in your configuration is still in place, if it is make you you remove it:&lt;BR /&gt;&lt;BR /&gt;*nat (dmz,Guest) source dynamic any interface destination static obj-host-184.188.4.x obj-host-172.16.20.20*&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;__ __&lt;BR /&gt;Pablo&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 01:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944977#M148135</guid>
      <dc:creator>Pablo</dc:creator>
      <dc:date>2017-01-04T01:16:11Z</dc:date>
    </item>
    <item>
      <title>assuming that the server is</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944978#M148136</link>
      <description>&lt;P&gt;assuming that the server is located on the dmz interface.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network outsidea&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat (dmz,outside) static 172.16.20.20 dns&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 08:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944978#M148136</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-01-04T08:29:07Z</dc:date>
    </item>
    <item>
      <title>Here i have give you model .</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944979#M148139</link>
      <description>&lt;P&gt;Here i have give you model .&lt;/P&gt;
&lt;P&gt;to create object&amp;nbsp;for guest network&lt;/P&gt;
&lt;P&gt;#object network Guest_NW&lt;/P&gt;
&lt;P&gt;#&lt;SPAN&gt;subnet 172.16.30.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;to create object for guest to access rdp from outside network .&lt;/P&gt;
&lt;P&gt;#object network Outside_host&lt;/P&gt;
&lt;P&gt;#host&amp;nbsp;&lt;SPAN&gt;184.188.4.X&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;to create service policy for RDP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#object service RDP_TCP&lt;BR /&gt;&lt;SPAN&gt;#service tcp destination eq 3389&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#nat ( guest , outside ) source dynamic Guest_nw interface destination Outside_host Outside_host service RDP_TCP RDP_TCP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;#access-list Guest_access_in_1 &amp;nbsp;extended permit tcp host&amp;nbsp;&lt;SPAN&gt;184.188.4.x &amp;nbsp;172.16.30.0 255.255.255.0 eq 3389&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;also ensure the Access-list in line 1 .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Mani&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 11:21:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944979#M148139</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2017-01-04T11:21:44Z</dc:date>
    </item>
    <item>
      <title>Thank you for all the</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944980#M148141</link>
      <description>&lt;P&gt;Thank you for all the responses. &amp;nbsp;Pablo, yours did the trick! &amp;nbsp;Much appreciated!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 19:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/2944980#M148141</guid>
      <dc:creator>webmike10</dc:creator>
      <dc:date>2017-01-04T19:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/3807148#M148143</link>
      <description>&lt;P&gt;Just so I get this straight, the client is attempting to connect to the public IP address from Guest or Inside network. If I implement this NAT solution, what I see is the traffic never really hits the outside IP of the firewall. The public IP in the client outbound request is just getting translated to the DMZ or internal IP address. So an ACL must permit this traffic from say the Guest network to the inside or DMZ. Is that correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 21 Feb 2019 20:51:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/3807148#M148143</guid>
      <dc:creator>pwasik</dc:creator>
      <dc:date>2019-02-21T20:51:20Z</dc:date>
    </item>
    <item>
      <title>Re: Hi ,</title>
      <link>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/4026238#M148147</link>
      <description>&lt;P&gt;Yes, I have the same question&lt;/P&gt;&lt;P&gt;I have local server setup with private IP address 192.168.1.50 this local server protected by the ASA CISCO 5506-x firewall.&lt;/P&gt;&lt;P&gt;I need all external users get access to my local server by using this public IP 50.77.224.57.&lt;/P&gt;&lt;P&gt;That's mean when external user type 50.77.224.57 in their browser they should get access to my local server which it has private IP 192.168.1.50&lt;/P&gt;&lt;P&gt;Does anyone know how to implement that by using ASA CISCO 5506-x?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2020 02:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-public-ip-address-internally/m-p/4026238#M148147</guid>
      <dc:creator>Yasser_kifah</dc:creator>
      <dc:date>2020-02-09T02:41:55Z</dc:date>
    </item>
  </channel>
</rss>

