<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Also note that 8.2 is pretty in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858136#M172472</link>
    <description>&lt;P&gt;Also note that 8.2 is pretty old code now. &amp;nbsp;You should consider upgrading to 9.x software on your ASA.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Feb 2016 19:13:10 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-02-16T19:13:10Z</dc:date>
    <item>
      <title>How to do inbound NAT in ASA v8.2</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858134#M172466</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Due to shortage&amp;nbsp;of public addresses we would like to take advantage of inbound NAT (from internet to the internal network) using the public interface of the ASA, is that possible for the following topology? If so please also provide configuration guide line.&lt;/P&gt;
&lt;P&gt;Local&amp;nbsp;SMTP server listening on TCP 25&amp;nbsp;&amp;lt;------ Cisco ASA &amp;lt;------ internet &amp;lt;----- Remote&amp;nbsp;SMTP server&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please note we do&amp;nbsp;NAT overload for the configuration and that works.&lt;/P&gt;
&lt;P&gt;Local&amp;nbsp;SMTP server ------&amp;gt; Cisco ASA ------&amp;gt; internet -----&amp;gt; Remote&amp;nbsp;SMTP server listening on TCP 25&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Thanks in advance&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Darius.Fariborz@cgi.com&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858134#M172466</guid>
      <dc:creator>dfariborz</dc:creator>
      <dc:date>2019-03-12T07:19:01Z</dc:date>
    </item>
    <item>
      <title>Yes, and there is more than</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858135#M172469</link>
      <description>&lt;P&gt;Yes, and there is more than one way. &amp;nbsp;My preference is to use object NAT.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network smtp-server&lt;BR /&gt;&amp;nbsp;host&amp;nbsp;&amp;lt;internal IP address&amp;gt;&lt;BR /&gt;object network smtp-server&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static &amp;lt;public ip address&amp;gt;&amp;nbsp;service tcp smtp smtp &lt;/PRE&gt;</description>
      <pubDate>Tue, 16 Feb 2016 19:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858135#M172469</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-16T19:12:29Z</dc:date>
    </item>
    <item>
      <title>Also note that 8.2 is pretty</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858136#M172472</link>
      <description>&lt;P&gt;Also note that 8.2 is pretty old code now. &amp;nbsp;You should consider upgrading to 9.x software on your ASA.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 19:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858136#M172472</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-16T19:13:10Z</dc:date>
    </item>
    <item>
      <title>static (inside,outside) tcp</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858137#M172476</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;static (inside,outside) tcp interface 25 &amp;lt;INSIDE IP&amp;gt; 25 netmask 255.255.255.255&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list acl_out extended permit tcp any host &amp;lt;PUB IP OF ASA&amp;gt; eq 25&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This will use the Public IP of the ASA and map port 25 to the inside IP Address.&lt;/P&gt;
&lt;P&gt;You may need to adjust the name of the outside ACL or your interface nameif's to match yours.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 21:21:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858137#M172476</guid>
      <dc:creator>Tom K</dc:creator>
      <dc:date>2016-02-16T21:21:05Z</dc:date>
    </item>
    <item>
      <title>Thank you chaps. We shall try</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858138#M172480</link>
      <description>&lt;P&gt;Thank you chaps. We shall try in a few weeks time and will let you know.&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Darius&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2016 18:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858138#M172480</guid>
      <dc:creator>dfariborz</dc:creator>
      <dc:date>2016-02-17T18:24:05Z</dc:date>
    </item>
    <item>
      <title>Hi Philip/Guys</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858139#M172483</link>
      <description>&lt;P&gt;Hi Philip/Guys&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am having some issue with ASA NAT, we are using Access-List to Translate many Private Pools to Single Public IP on Router, and now I want to move all NAT to ASA 5510. Which exact NAT type will serve my task.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip nat inside source list ABC&amp;nbsp;interface FastEthernet0/0 overload&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ABC ( Have Multiple Private IP Subnets),&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858139#M172483</guid>
      <dc:creator>CISCO512ALI</dc:creator>
      <dc:date>2016-02-18T03:08:18Z</dc:date>
    </item>
    <item>
      <title>There is more than one way of</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858140#M172486</link>
      <description>&lt;P&gt;There is more than one way of doing this. &amp;nbsp;I personally like using object NAT.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is an example that will NAT anything in the 192.168.0.0/16 range. &amp;nbsp;You can create as many copies of this as you want, one for each internal network.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network internal1-network&lt;BR /&gt;&amp;nbsp;subnet 192.168.0.0&amp;nbsp;255.255.0.0&lt;BR /&gt;object network internal1-network&lt;BR /&gt;&amp;nbsp;nat (any,outside) dynamic&amp;nbsp;interface&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:13:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858140#M172486</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-18T03:13:41Z</dc:date>
    </item>
    <item>
      <title>If you want to NAT to a</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858141#M172488</link>
      <description>&lt;P&gt;If you want to NAT to a specific IP address interface of the outside interface IP address then use:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network internal1&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;network&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;any&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;dynamic&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;FONT color="#000088"&gt;a.b.c.d&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858141#M172488</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-18T03:14:33Z</dc:date>
    </item>
    <item>
      <title>Thanks Philip,</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858142#M172490</link>
      <description>&lt;P&gt;Thanks Philip,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will elaborate more, what we are required.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Currently using CISCO Router for NAT, with FE0/0 and FE0/0.1,&amp;nbsp;&lt;SPAN&gt;FE0/0.2, FE0/0.3 with having separate IP Sub-net such as 192.168.1.0/24, 192.168.10.0/24,192.168.20.0/24 and NAT is done via ACCESS LIST.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Let me share my current router config.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- ip nat inside source list GAX interface FastEthernet0/0 overload&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- ip access-list extended GAX&lt;BR /&gt;- permit tcp any host 192.168.1.141 eq 902&lt;BR /&gt;- permit tcp any host 192.168.1.143 eq 5060&lt;BR /&gt;- permit ip 192.168.1.0 0.0.0.255 any&lt;BR /&gt;- permit ip 192.168.50.0 0.0.0.255 any&lt;BR /&gt;- permit ip 192.168.10.0 0.0.0.255 any&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface FastEthernet0/1&lt;BR /&gt; description USERS&lt;BR /&gt; no ip address&lt;BR /&gt; ip access-group 109 in&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip inspect GAX in&lt;BR /&gt; ip inspect GAX out&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; rate-limit input 15000000 2812500 2812500 conform-action transmit exceed-action drop&lt;BR /&gt; rate-limit output 15000000 2812500 2812500 conform-action transmit exceed-action drop&lt;BR /&gt; load-interval 30&lt;BR /&gt; duplex full&lt;BR /&gt; speed 100&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.1&lt;BR /&gt; encapsulation dot1Q 1 native&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly max-reassemblies 1000&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.20&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.30&lt;BR /&gt; encapsulation dot1Q 30&lt;BR /&gt; ip address 192.168.20.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.33&lt;BR /&gt; encapsulation dot1Q 33&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1.50&lt;BR /&gt; description XXXXXXXX&lt;BR /&gt; encapsulation dot1Q 50&lt;BR /&gt; ip address 192.168.50.1 255.255.255.0&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Now I did create sub-interface/VLAN on ASA Firewall, but still unable to NAT all to one Public IP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please suggest as per scenario.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:23:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858142#M172490</guid>
      <dc:creator>CISCO512ALI</dc:creator>
      <dc:date>2016-02-18T03:23:15Z</dc:date>
    </item>
    <item>
      <title>The one object will do it</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858143#M172491</link>
      <description>&lt;P&gt;The one object will do it just fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network internal&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;network&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;subnet &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0.0&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.255&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;0.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; network internal&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;network&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;any&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;dynamic&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858143#M172491</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-18T03:27:00Z</dc:date>
    </item>
    <item>
      <title>Hi Philip</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858144#M172492</link>
      <description>&lt;P&gt;Hi Philip&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just down with below config, am I good to go&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network Internal-Network&lt;BR /&gt; subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;ciscoasa# show nat&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (any) to (OUTSIDE) source dynamic Internal-Network interface&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 x.y.z.z&amp;nbsp;1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858144#M172492</guid>
      <dc:creator>CISCO512ALI</dc:creator>
      <dc:date>2016-02-18T03:46:29Z</dc:date>
    </item>
    <item>
      <title>Give it a try.  I've never</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858145#M172493</link>
      <description>&lt;P&gt;Give it a try. &amp;nbsp;I've never used auto-NAT.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 03:48:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858145#M172493</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-18T03:48:26Z</dc:date>
    </item>
    <item>
      <title>Well I used IP instead of</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858146#M172494</link>
      <description>&lt;P&gt;Well I used IP instead of Interface, but then it refused as IP is already used by Interface, that is my outside interface&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 04:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858146#M172494</guid>
      <dc:creator>CISCO512ALI</dc:creator>
      <dc:date>2016-02-18T04:15:26Z</dc:date>
    </item>
    <item>
      <title>If you specify an IP address</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858147#M172495</link>
      <description>&lt;P&gt;If you specify an IP address it has to be one on the outside interface not in use. &amp;nbsp;If you want to use the actual interface IP address, then use the example I gave, exactly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is it - again.&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; network &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;internal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;network&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;nat &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;any&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;outside&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;dynamic&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Feb 2016 04:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858147#M172495</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-18T04:19:53Z</dc:date>
    </item>
    <item>
      <title>Hi Philip</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858148#M172496</link>
      <description>&lt;P&gt;Hi Philip&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is on outside interface&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address X&amp;gt;X&amp;gt;X&amp;gt;&amp;nbsp;Y&amp;gt;Y&amp;gt;Y&amp;gt;Y&lt;BR /&gt;ciscoasa#&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2016 05:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-inbound-nat-in-asa-v8-2/m-p/2858148#M172496</guid>
      <dc:creator>CISCO512ALI</dc:creator>
      <dc:date>2016-02-18T05:35:52Z</dc:date>
    </item>
  </channel>
</rss>

