<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic It would help if you could at in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889444#M157695</link>
    <description>&lt;P&gt;It would help if you could at least say what kind of device you have. &amp;nbsp;Cisco 800 series running IOS, Cisco ASA 5505 running 8.4(7), etc.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you post your current NAT configuration?&lt;/P&gt;</description>
    <pubDate>Mon, 23 May 2016 20:21:10 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-05-23T20:21:10Z</dc:date>
    <item>
      <title>Another NAT question.....</title>
      <link>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889443#M157694</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have an OUTSIDE interface (goes to another private network 10.1.1.254/24)&lt;/P&gt;
&lt;P&gt;On the INSIDE interface (192.168.200.0/24) we have various servers. These are statically natted to a different ip eg 10.1.1.1 &amp;gt; 192.168.200.1, 10.1.1.2 &amp;gt; 192.168.200.10 etc&lt;/P&gt;
&lt;P&gt;There is no dynamic nat from the INSIDE to the OUTSIDE or no global nat set.&lt;/P&gt;
&lt;P&gt;I now need to add a DMZ (172.31.1.1/24) with dynamic NAT to the OUTSIDE. Will this break the static nat's (on the INSIDE interface) already in place?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889443#M157694</guid>
      <dc:creator>louis0001</dc:creator>
      <dc:date>2019-03-12T07:47:16Z</dc:date>
    </item>
    <item>
      <title>It would help if you could at</title>
      <link>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889444#M157695</link>
      <description>&lt;P&gt;It would help if you could at least say what kind of device you have. &amp;nbsp;Cisco 800 series running IOS, Cisco ASA 5505 running 8.4(7), etc.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you post your current NAT configuration?&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2016 20:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889444#M157695</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-05-23T20:21:10Z</dc:date>
    </item>
    <item>
      <title>Sorry, Because I posted in</title>
      <link>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889445#M157696</link>
      <description>&lt;P&gt;Sorry, Because I posted in firewalling I assumed it would be an ASA. It's an ASA 5510 running 8.2&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2016 05:25:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889445#M157696</guid>
      <dc:creator>louis0001</dc:creator>
      <dc:date>2016-05-24T05:25:28Z</dc:date>
    </item>
    <item>
      <title>There is also IOS Firewall.</title>
      <link>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889446#M157697</link>
      <description>&lt;P&gt;There is also IOS Firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can add a dynamic NAT for just the DMZ to the outside interface without breaking the existing static NAT (assuming the IP addresses don't overlap anywhere).&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2016 08:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-nat-question/m-p/2889446#M157697</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-05-24T08:01:51Z</dc:date>
    </item>
  </channel>
</rss>

