<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Iam not sure how to do it? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899392#M172227</link>
    <description>&lt;P&gt;Iam not sure how to do it? can you tell me what commands exactly?&lt;/P&gt;</description>
    <pubDate>Thu, 25 Feb 2016 13:59:11 GMT</pubDate>
    <dc:creator>Abdulkader Naji</dc:creator>
    <dc:date>2016-02-25T13:59:11Z</dc:date>
    <item>
      <title>allow inbound range of public IPs to pass through the ASA to reach my email server behind the DMZ</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899390#M172225</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;I have emails server server &lt;SPAN&gt;10.10.10.249&lt;/SPAN&gt; hosted on-premise &amp;nbsp;with public address NATed at ASA outside interface and recently installed application which require to allow a set of IPs to access the server the IPs are :-&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Trebuchet MS','sans-serif'; color: black;"&gt;74.201.84.80&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Trebuchet MS','sans-serif'; color: black;"&gt;74.201.152.59&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Trebuchet MS','sans-serif'; color: black;"&gt;74.201.154.214&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Trebuchet MS','sans-serif'; color: black;"&gt;165.254.168.201&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Trebuchet MS','sans-serif'; color: black;"&gt;I'm sure the server can reach all services outside but what shall I do??&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;The ASA Configuration&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;=========================================================================================================&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;nameif outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;security-level 0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;ip address 82.X.x.x 255.255.255.252&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;nameif inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;security-level 100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;ip address 10.10.10.2 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; line-height: 115%; font-family: 'Lucida Console';"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 120 extended permit ip 10.10.10.0 255.255.255.0 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 120 extended permit ip 10.10.11.0 255.255.255.0 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 120 extended permit ip 10.10.12.0 255.255.255.0 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 140 extended permit tcp any interface outside eq telnet&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 140 extended permit tcp any interface outside eq imap4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 140 extended permit tcp any interface outside eq https&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 140 extended permit tcp any interface outside eq smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 140 extended permit tcp any interface outside eq pop3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list 133 extended permit icmp any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list no_nat extended permit ip 10.10.20.0 255.255.255.0 any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list no_nat extended permit ip any 10.10.20.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list SMTP_Restrict extended permit tcp host 10.10.10.249 any eq smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list SMTP_Restrict extended deny tcp any any eq smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-list SMTP_Restrict extended permit ip any any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;nat (inside) 0 access-list no_nat&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;nat (inside) 1 access-list 120&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;static (inside,outside) tcp interface smtp 10.10.10.249 smtp netmask 255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;static (inside,outside) tcp interface https 10.10.10.249 https netmask 255.255.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;static (inside,outside) tcp interface pop3 10.10.10.249 pop3 netmask 255.255.255&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;static (inside,outside) tcp interface imap4 10.10.10.249 imap4 netmask 255.255.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;static (inside,outside) tcp interface telnet 10.10.10.1 telnet netmask 255.255.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-group 140 in interface outside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;access-group SMTP_Restrict in interface inside&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;route outside 0.0.0.0 0.0.0.0 82.147.202.137 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;route inside 10.10.11.0 255.255.255.0 10.10.10.1 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;route inside 10.10.12.0 255.255.255.0 10.10.10.1 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;============================================================================================================================&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Lucida Console';"&gt;I think this rows should be omitted to resolve the issue&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; text-align: left; line-height: normal; text-autospace: none; direction: ltr; unicode-bidi: embed;"&gt;&lt;/P&gt;
&lt;P&gt;nat (inside) 0 access-list no_nat&lt;BR /&gt;access-list no_nat extended permit ip 10.10.20.0 255.255.255.0 any&lt;BR /&gt;access-list no_nat extended permit ip any 10.10.20.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899390#M172225</guid>
      <dc:creator>Abdulkader Naji</dc:creator>
      <dc:date>2019-03-12T07:23:47Z</dc:date>
    </item>
    <item>
      <title>How do you figure that</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899391#M172226</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How do you figure that removing the no-nat will solve the issue? &amp;nbsp;the no nat is defining an internal address of 10.10.20.0/24 while your server is on 10.10.10.249&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;you need to create a NAT statement for each of the public addresses pointing to the 10.10.10.249 server.&lt;/P&gt;
&lt;P&gt;and then access-lists permitting the traffic.&lt;/P&gt;
&lt;P&gt;Are you having issues with the original server setup using the outside interface?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 24 Feb 2016 12:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899391#M172226</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-24T12:20:47Z</dc:date>
    </item>
    <item>
      <title>Iam not sure how to do it?</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899392#M172227</link>
      <description>&lt;P&gt;Iam not sure how to do it? can you tell me what commands exactly?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 13:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899392#M172227</guid>
      <dc:creator>Abdulkader Naji</dc:creator>
      <dc:date>2016-02-25T13:59:11Z</dc:date>
    </item>
    <item>
      <title>Here is an example of what</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899393#M172228</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Here is an example of what you can do. &amp;nbsp;But you will need to change make changes with regards to the ports so the correct public IP is translated with the correct port. &amp;nbsp;And in turn you will then need to adjust the access-list configuration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside,outside) tcp 74.201.84.80 http 10.10.10.249 http&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside,outside) tcp 74.201.152.59&amp;nbsp;https 10.10.10.249 https&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside,outside) tcp 74.201.154.214&amp;nbsp;pop3&amp;nbsp;10.10.10.249&amp;nbsp;pop3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (inside,outside) tcp 165.254.168.201&amp;nbsp;smtp&amp;nbsp;10.10.10.249&amp;nbsp;smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list 140 extended permit tcp any 74.201.84.80 eq http&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list 140 extended permit tcp any 74.201.152.59 eq https&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list 140 extended permit tcp any 74.201.154.214 eq pop3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;access-list 140 extended permit tcp any 165.254.168.201 eq smtp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 14:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899393#M172228</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-25T14:10:26Z</dc:date>
    </item>
    <item>
      <title>what I want to allow internet</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899394#M172229</link>
      <description>&lt;P&gt;what I want to allow internet public IP as I listed above to be able to accessing my email server.&lt;/P&gt;
&lt;P&gt;I'm not sure but I think the direction should be from outside to inside.if I'm not wrong.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 14:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899394#M172229</guid>
      <dc:creator>Abdulkader Naji</dc:creator>
      <dc:date>2016-02-25T14:27:14Z</dc:date>
    </item>
    <item>
      <title>The example I gave is from</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899395#M172231</link>
      <description>&lt;P&gt;The example I gave is from outside to inside. &amp;nbsp;Static NAT i bidirectional. and access-list 140 is the access-list configured on the outside interface.&lt;/P&gt;
&lt;P&gt;you need to figure out what port your email server is using. &amp;nbsp;Normally it is port tcp/25 (smtp), outlook web access uses port tcp/443. &amp;nbsp;If you do not know which port your mail server is using then I suggest you talk with the server administrator to find out.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 14:49:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899395#M172231</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-25T14:49:29Z</dc:date>
    </item>
    <item>
      <title>thanks</title>
      <link>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899396#M172233</link>
      <description>&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2016 15:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-inbound-range-of-public-ips-to-pass-through-the-asa-to/m-p/2899396#M172233</guid>
      <dc:creator>Abdulkader Naji</dc:creator>
      <dc:date>2016-02-25T15:11:09Z</dc:date>
    </item>
  </channel>
</rss>

