<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Karsten, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859429#M155175</link>
    <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;Thank you for that, my results below:&lt;/P&gt;
&lt;P&gt;I used my external ip: 119.158.174.195 (laptop at home)&lt;/P&gt;
&lt;P&gt;FW-DR# packet-tracer input outside tcp 119.158.174.195 1433 158.69.20.23 1433&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;NAT divert to egress interface inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Untranslate 158.69.20.23/1433 to 192.168.10.205/1433&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp any object sqldr eq 1433&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 737, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you think that can be a problem:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NAT divert to egress interface inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Untranslate 158.69.20.23/1433 to 192.168.10.205/1433&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For interall server IP: 192.168.10.205 results below:&lt;/P&gt;
&lt;P&gt;FW-DR# packet-tracer input outside tcp 192.168.10.205 1433 158.69.20.23 1433&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 158.69.20.23/1433 to 192.168.10.205/1433&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp any object sqldr eq 1433&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2016 09:46:33 GMT</pubDate>
    <dc:creator>szczyrk80</dc:creator>
    <dc:date>2016-04-01T09:46:33Z</dc:date>
    <item>
      <title>Static NAT problem ASA 5525</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859425#M155171</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I have a problem with setting up static mapping on 5525 with the latest software,&lt;/P&gt;
&lt;P&gt;Configuration&amp;nbsp;attached.&lt;/P&gt;
Briefly, that has been implemented on ASA5525

object network sqldr
host 192.168.10.205
access-list acl_out extended permit tcp any object sqldr eq 1433
object network sqldr
nat (inside,outside) static 158.69.20.23
access-group acl_out in interface outside

When checking access-list acl_out I can see some hits when trying telneting that server from outside:

access-list acl_out line 4 extended permit tcp any object sqldr eq 1433 (hitcnt=3) 0x6b735618
  access-list acl_out line 4 extended permit tcp any host 192.168.10.205 eq 1433 (hitcnt=3) 0x6b735618


&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;Checking&amp;nbsp;what's my IP on server .10.205 still showing global outside address 158.69.20.20 instead of 158.69.20.23&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Also can not telnet that server from any external IP on port 1433&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Any advice much appreciated&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Sebastian&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859425#M155171</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2019-03-12T07:33:54Z</dc:date>
    </item>
    <item>
      <title>The main-problem is that your</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859426#M155172</link>
      <description>&lt;P&gt;The main-problem is that your NAT-order is wrong. The dynamic PAT always has to go to the end. You can correct it the following way:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;no nat (inside,outside) source dynamic Generic_All interface&lt;BR /&gt;nat (inside,outside) after-auto source dynamic Generic_All interface&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 20:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859426#M155172</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-03-31T20:58:05Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859427#M155173</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;That works like a charm,&lt;/P&gt;
&lt;P&gt;Server now is getting public it as wanted,&lt;/P&gt;
&lt;P&gt;However, telnet connection from outside on port 1433 is still&amp;nbsp;failing,&lt;/P&gt;
&lt;P&gt;As before I can see hits in access-list,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list acl_out extended permit tcp any object sqldr eq 1433&lt;/P&gt;
&lt;P&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;/P&gt;
&lt;P&gt;nat (inside,outside) after-auto source dynamic Generic_All interface&lt;BR /&gt;access-group acl_out in interface outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have checked that port externally and internally and it is still blocked despite heaving access-list in place&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Obviously, firewall on that server etc. all disabled&lt;/P&gt;
&lt;P&gt;Is there anything to do with access list?&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 09:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859427#M155173</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2016-04-01T09:20:49Z</dc:date>
    </item>
    <item>
      <title>You can use packet-tracer to</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859428#M155174</link>
      <description>&lt;P&gt;You can use packet-tracer to find the reason:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;packet-tracer input outside tcp 1.2.3.4 1234&amp;nbsp;&lt;SPAN&gt;158.69.20.23 1433&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;And test the port from the firewall:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;ping tcp 192.168.10.205 1433&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 01 Apr 2016 09:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859428#M155174</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-04-01T09:21:53Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859429#M155175</link>
      <description>&lt;P&gt;Hi Karsten,&lt;/P&gt;
&lt;P&gt;Thank you for that, my results below:&lt;/P&gt;
&lt;P&gt;I used my external ip: 119.158.174.195 (laptop at home)&lt;/P&gt;
&lt;P&gt;FW-DR# packet-tracer input outside tcp 119.158.174.195 1433 158.69.20.23 1433&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;STRONG&gt;NAT divert to egress interface inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Untranslate 158.69.20.23/1433 to 192.168.10.205/1433&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp any object sqldr eq 1433&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 737, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you think that can be a problem:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NAT divert to egress interface inside&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Untranslate 158.69.20.23/1433 to 192.168.10.205/1433&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For interall server IP: 192.168.10.205 results below:&lt;/P&gt;
&lt;P&gt;FW-DR# packet-tracer input outside tcp 192.168.10.205 1433 158.69.20.23 1433&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 158.69.20.23/1433 to 192.168.10.205/1433&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-list acl_out extended permit tcp any object sqldr eq 1433&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network sqldr&lt;BR /&gt; nat (inside,outside) static 158.69.20.23&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 09:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859429#M155175</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2016-04-01T09:46:33Z</dc:date>
    </item>
    <item>
      <title>That's what is expected. The</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859430#M155176</link>
      <description>&lt;P&gt;That's what is expected. The ASA would handle the connection as needed.&amp;nbsp;You need to continue troubleshooting on the server.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 09:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859430#M155176</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-04-01T09:47:04Z</dc:date>
    </item>
    <item>
      <title>Lates results from ASDM</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859431#M155177</link>
      <description>&lt;P&gt;Lates results from ASDM packet tracer&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 09:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859431#M155177</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2016-04-01T09:56:11Z</dc:date>
    </item>
    <item>
      <title>Great, thank you</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859432#M155180</link>
      <description>&lt;P&gt;Great, thank you&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All working as expected, there is no response on port 1433 because nothing is using it&lt;/P&gt;
&lt;P&gt;Creating allow access list for rdp 3389 works like a charm&lt;/P&gt;
&lt;P&gt;Thank you for your help !!!&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 10:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-problem-asa-5525/m-p/2859432#M155180</guid>
      <dc:creator>szczyrk80</dc:creator>
      <dc:date>2016-04-01T10:09:43Z</dc:date>
    </item>
  </channel>
</rss>

