<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Why is it nat (inside,outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821414#M172711</link>
    <description>&lt;P&gt;&lt;EM&gt;Why is it nat (inside,outside)? shouldn't it be nat (dmz,outside)?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I type inside because, as mentioned, it is just an example and I don't need to scroll through to remember the exact details and saves me some time.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;nat (DMZ,outside) static interface service&amp;nbsp;tcp 8080 8080&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;this nat statement should be placed under an object so for example.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network dmz_server&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host &amp;lt;private IP of server&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (DMZ,outside) static interface service tcp 8080 8080&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The above command should not give you an error, but if it does give you the error i suggest trying a different&amp;nbsp;NAT statement like the following:&lt;/P&gt;
&lt;P&gt;object network dmz_server&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host &amp;lt;private IP of server&amp;gt;&lt;/P&gt;
&lt;P&gt;object service TCP_8080&lt;BR /&gt; service tcp source eq 8080&lt;/P&gt;
&lt;P&gt;nat (DMZ,outside) source static&amp;nbsp;&lt;SPAN&gt;dmz_server interface service&amp;nbsp;TCP_8080&amp;nbsp;TCP_8080&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Feb 2016 09:14:46 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-02-11T09:14:46Z</dc:date>
    <item>
      <title>Cisco ASA 9.1 DMZ host can ping specific inside server but inside server cannot ping the DMZ host</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821405#M172694</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Help please. DMZ host can ping inside server but the inside server cannot ping the DMZ host.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could this be a firewall issue?or routing issue?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DMZ host 172.29.29.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;Inside server 10.193.1.6 255.255.0.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After i added the line below, the DMZ host can ping 10.193.1.6 but not vice versa.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip access-list extended SMMPH_ACL&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 172.29.29.0 0.0.0.255&lt;/P&gt;
&lt;P&gt;------------------------------------&lt;/P&gt;
&lt;P&gt;Running config of layer3 switch.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;SMMNLCS001#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;
&lt;P&gt;Current configuration : 19320 bytes&lt;BR /&gt;!&lt;BR /&gt;! Last configuration change at 12:16:10 PST Thu Feb 11 2016 by danb&lt;BR /&gt;! NVRAM config last updated at 20:52:16 PST Sat May 21 2011 by danb&lt;BR /&gt;!&lt;BR /&gt;version 15.0&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec localtime show-timezone year&lt;BR /&gt;service timestamps log datetime msec localtime show-timezone year&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname SMMNLCS001&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 4 7.jZ4Dex7mHRhj/CulqZZbF6pyUlk6mDe08.brH568Y&lt;BR /&gt;!&lt;BR /&gt;username trends privilege 15 secret 4 .cKm1oYIOn2SBy78jTl2qhWyXNWIGDQWODGDZNpxOpE&lt;BR /&gt;username sumitomoph privilege 15 secret 4 A5GQfPGE/7y3mkzO33UWd/J.LiN2Zs3YuLghBtsPF7g&lt;BR /&gt;username ryant privilege 15 secret 4 GY6.GikMCy.B0u9wqcZ/SmhMbY/9gAluniDOyIiuAzo&lt;BR /&gt;username danb privilege 15 secret 4 oEYGAEA45KcUlPEbW1d3tGg32upBNIQuqAtdB2qyk9.&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone PST 8 0&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;ip routing&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no ip domain-lookup&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki trustpoint TP-self-signed-1701104512&lt;BR /&gt;&amp;nbsp;enrollment selfsigned&lt;BR /&gt;&amp;nbsp;subject-name cn=IOS-Self-Signed-Certificate-1701104512&lt;BR /&gt;&amp;nbsp;revocation-check none&lt;BR /&gt;&amp;nbsp;rsakeypair TP-self-signed-1701104512&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto pki certificate chain TP-self-signed-1701104512&lt;BR /&gt;&amp;nbsp;certificate self-signed 01&lt;BR /&gt;&amp;nbsp; 3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030&lt;BR /&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274&lt;BR /&gt;&amp;nbsp; 69666963 6174652D 31373031 31303435 3132301E 170D3131 30333330 30313239&lt;BR /&gt;&amp;nbsp; 32395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649&lt;BR /&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 37303131&lt;BR /&gt;&amp;nbsp; 30343531 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281&lt;BR /&gt;&amp;nbsp; 81008E7B B1C88A43 D346C6F0 B415D6D0 39FA6E43 97B62494 4EA501CC CF14AD6B&lt;BR /&gt;&amp;nbsp; 16803A29 D10DAE4E C595786C B3BBB3A2 C6050A02 BDD413F9 0B7A3745 BD875088&lt;BR /&gt;&amp;nbsp; 159A7CC9 FAEAE347 5F9BE4E5 932D23E8 08FF7C27 418CF04A E1847BDE 00652789&lt;BR /&gt;&amp;nbsp; 793284D4 413473EF 1CCDA7DE 7027DA21 B9B02C58 37A8DB47 D2A0A1D7 A4BFD2D4&lt;BR /&gt;&amp;nbsp; DBDF0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603&lt;BR /&gt;&amp;nbsp; 551D2304 18301680 14B9262F E47A74C7 AE0CA0B1 52B85F8D 10E5F7CB 9B301D06&lt;BR /&gt;&amp;nbsp; 03551D0E 04160414 B9262FE4 7A74C7AE 0CA0B152 B85F8D10 E5F7CB9B 300D0609&lt;BR /&gt;&amp;nbsp; 2A864886 F70D0101 05050003 8181005A 1809B13E DA1E0034 5789218B 29387654&lt;BR /&gt;&amp;nbsp; D4AD144E 4CACA917 11C13BA6 EC9A69D0 71C84FF6 3AD92E2F D248C870 55B10986&lt;BR /&gt;&amp;nbsp; 32CD8C4A AEB85750 1D9DEC03 6E8EAB29 F9403E9B 58840DD7 811159D5 97330B5C&lt;BR /&gt;&amp;nbsp; 2A16A073 F6876A61 77241AFA 455A45BF 792637B6 A1DC8ADC 035A621B A51651CB&lt;BR /&gt;&amp;nbsp; 50DC4FE5 2122AEF4 89C49FFB 97776F&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;archive&lt;BR /&gt;&amp;nbsp;log config&lt;BR /&gt;&amp;nbsp; logging enable&lt;BR /&gt;&amp;nbsp; logging size 1000&lt;BR /&gt;&amp;nbsp; notify syslog contenttype plaintext&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;&amp;nbsp;path flash:archive-config&lt;BR /&gt;&amp;nbsp;write-memory&lt;BR /&gt;&amp;nbsp;time-period 1440&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode rapid-pvst&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;spanning-tree vlan 158 priority 0&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;vlan 29,158,160-161,172,190,193,203&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;&amp;nbsp;description *** Link to SMMKTHB001 Gi0/1, Gi0/2 ***&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;no ip route-cache&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description *** Link to SMMKTHB001 Gi0/1 ***&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;channel-group 1 mode desirable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;description *** Link to SMMKTHB001 Gi0/2 ***&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;&amp;nbsp;channel-group 1 mode desirable&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 160&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 160&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 160&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;&amp;nbsp;switchport access vlan 160&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;&amp;nbsp;switchport access vlan 160&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/8&lt;BR /&gt;&amp;nbsp;switchport access vlan 160&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/9&lt;BR /&gt;&amp;nbsp;switchport access vlan 29&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/10&lt;BR /&gt;&amp;nbsp;switchport access vlan 161&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/11&lt;BR /&gt;&amp;nbsp;switchport access vlan 29&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/12&lt;BR /&gt;&amp;nbsp;description ## connection to SMMNLWC251 WLC ##&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 193&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/13&lt;BR /&gt;&amp;nbsp;description &amp;lt;&amp;lt;&amp;lt;to SMMPH Server Farm L2SW&amp;gt;&amp;gt;&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/14&lt;BR /&gt;&amp;nbsp;description &amp;lt;&amp;lt;&amp;lt;to SMMPH Server Farm L2SW&amp;gt;&amp;gt;&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/15&lt;BR /&gt;&amp;nbsp;switchport access vlan 193&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/16&lt;BR /&gt;&amp;nbsp;switchport access vlan 172&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;ip access-group 172 in&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/17&lt;BR /&gt;&amp;nbsp;switchport access vlan 203&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/18&lt;BR /&gt;&amp;nbsp;description ## connection to 24th floor switch ##&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 158,161,193&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/19&lt;BR /&gt;&amp;nbsp;description ## connection to SMMNLHB002 25F switch ##&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 158,161,193&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/20&lt;BR /&gt;&amp;nbsp;description ## connection to SMMNLHB001 25F switch ##&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 158,161,193&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/21&lt;BR /&gt;&amp;nbsp;switchport access vlan 158&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/22&lt;BR /&gt;&amp;nbsp;switchport access vlan 158&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/23&lt;BR /&gt;&amp;nbsp;switchport access vlan 158&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/24&lt;BR /&gt;&amp;nbsp;switchport access vlan 158&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet1/1&lt;BR /&gt;!&lt;BR /&gt;interface TenGigabitEthernet1/2&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan158&lt;BR /&gt;&amp;nbsp;description CBNC_VLAN&lt;BR /&gt;&amp;nbsp;ip address 10.158.254.250 255.255.0.0 secondary&lt;BR /&gt;&amp;nbsp;ip address 10.158.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;standby 1 ip 10.158.1.1&lt;BR /&gt;&amp;nbsp;standby 1 ip 10.158.2.100 secondary&lt;BR /&gt;&amp;nbsp;standby 1 priority 105&lt;BR /&gt;&amp;nbsp;standby 1 preempt&lt;BR /&gt;&amp;nbsp;ip policy route-map CBNC_RMAP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan160&lt;BR /&gt;&amp;nbsp;description RTR&lt;BR /&gt;&amp;nbsp;ip address 10.160.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;standby 2 ip 10.160.255.254&lt;BR /&gt;&amp;nbsp;standby 2 preempt&lt;BR /&gt;!&lt;BR /&gt;interface Vlan161&lt;BR /&gt;&amp;nbsp;description THPAL_VLAN&lt;BR /&gt;&amp;nbsp;ip address 10.161.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;standby 3 ip 10.161.1.1&lt;BR /&gt;&amp;nbsp;standby 3 preempt&lt;BR /&gt;&amp;nbsp;ip policy route-map THPAL_RMAP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan172&lt;BR /&gt;&amp;nbsp;description &amp;lt;&amp;lt;DMZ-2 Segment&amp;gt;&amp;gt;&lt;BR /&gt;&amp;nbsp;ip address 172.22.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;standby 4 ip 172.22.255.254&lt;BR /&gt;&amp;nbsp;standby 4 preempt&lt;BR /&gt;!&lt;BR /&gt;interface Vlan190&lt;BR /&gt;&amp;nbsp;ip address 10.190.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;standby 5 ip 10.190.255.254&lt;BR /&gt;&amp;nbsp;standby 5 preempt&lt;BR /&gt;!&lt;BR /&gt;interface Vlan193&lt;BR /&gt;&amp;nbsp;ip address 10.193.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;standby 6 ip 10.193.255.254&lt;BR /&gt;&amp;nbsp;standby 6 preempt&lt;BR /&gt;&amp;nbsp;ip policy route-map SMMPH_RMAP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan203&lt;BR /&gt;&amp;nbsp;description &amp;lt;&amp;lt;&amp;lt;SMMPH Backup Server NW&amp;gt;&amp;gt;&amp;gt;&lt;BR /&gt;&amp;nbsp;ip address 10.203.255.250 255.255.0.0&lt;BR /&gt;&amp;nbsp;ip access-group 103 out&lt;BR /&gt;&amp;nbsp;standby 7 ip 10.203.255.254&lt;BR /&gt;&amp;nbsp;standby 7 preempt&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 10.158.2.6&lt;BR /&gt;ip route 10.20.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.30.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.40.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.50.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.60.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.70.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.80.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.90.1.0 255.255.255.0 10.160.1.1&lt;BR /&gt;ip route 10.159.0.0 255.255.0.0 10.160.1.1&lt;BR /&gt;ip route 10.171.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.172.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.172.12.111 255.255.255.255 10.160.1.1&lt;BR /&gt;ip route 10.173.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.174.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.175.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.176.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.177.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.178.0.0 255.255.0.0 10.160.1.1&lt;BR /&gt;ip route 10.179.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.180.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 10.210.0.0 255.255.0.0 10.160.1.5&lt;BR /&gt;ip route 116.50.215.136 255.255.255.248 10.160.1.3&lt;BR /&gt;ip route 122.216.84.178 255.255.255.255 10.160.1.3&lt;BR /&gt;ip route 172.16.0.0 255.255.0.0 10.160.1.3&lt;BR /&gt;ip route 172.21.0.0 255.255.0.0 172.22.1.1&lt;BR /&gt;ip route 172.23.0.0 255.255.0.0 172.22.1.1&lt;BR /&gt;ip route 172.30.0.0 255.255.0.0 10.158.2.6&lt;BR /&gt;ip route 192.168.1.0 255.255.255.0 10.160.1.3&lt;BR /&gt;ip route 192.168.10.0 255.255.255.252 10.160.1.1&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended CBNC_ACL&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.159.0.0 0.0.255.255 172.30.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.0.0 0.0.255.255 10.158.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.0.0 0.0.255.255 10.159.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.0.0 0.0.255.255 10.0.0.0 0.255.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.0.0 0.0.255.255 10.210.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.0.0 0.0.255.255 host 10.161.1.32&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.0.0 0.0.255.255 10.193.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.3.0 0.0.0.255 host 10.193.1.61&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.30.1.0 0.0.0.255 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.30.1.0 0.0.0.255 host 10.193.1.6&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.30.1.0 0.0.0.255 host 10.193.1.61&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.30.1.0 0.0.0.255 host 10.193.1.62&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.30.1.0 0.0.0.255 host 10.193.1.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.30.1.0 0.0.0.255 host 10.193.1.26&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.40.1.0 0.0.0.255 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.40.1.0 0.0.0.255 host 10.193.1.6&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.10.0 0.0.0.255 host 10.193.1.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.40.1.0 0.0.0.255 host 10.193.1.61&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.40.1.0 0.0.0.255 host 10.193.1.62&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.40.1.0 0.0.0.255 host 10.193.1.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.40.1.0 0.0.0.255 host 10.193.1.26&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.1.0 0.0.0.255 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.1.0 0.0.0.255 host 10.193.1.6&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.1.0 0.0.0.255 host 10.193.1.61&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.1.0 0.0.0.255 host 10.193.1.62&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.60.1.0 0.0.0.255 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.60.1.0 0.0.0.255 host 10.193.1.6&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.60.1.0 0.0.0.255 host 10.193.1.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.60.1.0 0.0.0.255 host 10.193.1.26&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.60.1.0 0.0.0.255 host 10.193.1.61&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.1.0 0.0.0.255 host 10.193.1.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.60.1.0 0.0.0.255 host 10.193.1.62&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.50 host 10.193.1.65&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.1.0 0.0.0.255 host 10.193.1.26&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.31 10.193.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.50 10.161.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.50 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.50 host 10.193.1.6&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.11 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.12 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.159.1.0 0.0.0.255 10.193.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.159.1.0 0.0.0.255 10.161.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.159.1.0 0.0.0.255 172.21.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.159.1.0 0.0.0.255 172.22.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.159.1.0 0.0.0.255 172.23.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.20.0 0.0.0.255 host 10.193.1.40&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.20.0 0.0.0.255 host 10.193.1.103&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.20.0 0.0.0.255 host 10.193.1.21&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.20.0 0.0.0.255 host 10.193.1.26&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.158.20.0 0.0.0.255 host 10.193.1.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.158.2.150 host 10.193.1.11&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.0.0 0.0.255.255 10.161.3.0 0.0.0.1&lt;BR /&gt;&amp;nbsp;permit ip 10.20.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.30.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.40.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.50.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.60.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.70.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.80.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.90.1.0 0.0.0.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.158.0.0 0.0.255.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.159.0.0 0.0.255.255 any&lt;BR /&gt;&amp;nbsp;permit ip 192.168.10.0 0.0.0.3 any&lt;BR /&gt;ip access-list extended SMMPH_ACL&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 172.29.29.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 172.30.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.160.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 172.16.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 172.21.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 172.22.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 172.23.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.158.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 10.30.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 10.30.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.61 10.30.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.62 10.30.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.21 10.30.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.26 10.30.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 10.40.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 10.40.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.61 10.40.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.11 host 10.158.3.2&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.11 host 10.158.3.3&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.62 10.40.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.21 10.40.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.26 10.40.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.1.0 0.0.0.255 host 10.158.2.31&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.40 10.158.20.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.103 10.158.20.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.21 10.158.20.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.26 10.158.20.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 10.158.20.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 10.50.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 10.50.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.61 10.50.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.62 10.50.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 10.60.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 10.60.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.21 10.60.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.26 10.60.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.61 10.60.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.21 10.50.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.62 10.60.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.26 10.50.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 host 10.158.2.50&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.6 host 10.158.2.50&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.65 host 10.158.2.50&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 host 10.158.2.11&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.1 host 10.158.2.12&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.1.0 0.0.0.255 10.159.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.61 10.158.3.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.193.1.11 host 10.158.2.150&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.193.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.161.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.171.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.172.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.173.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.174.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.175.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.176.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.177.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.178.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.179.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.180.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.193.0.0 0.0.255.255 10.210.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;permit ip 10.193.0.0 0.0.255.255 any&lt;BR /&gt;ip access-list extended THPAL_ACL&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.160.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.2.0 0.0.0.255 host 10.158.3.2&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.2.0 0.0.0.255 host 10.158.3.3&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.2.0 0.0.0.255 host 10.158.2.103&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.1.22 host 10.158.2.103&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.2.0 0.0.0.255 host 10.158.2.31&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.1.32 10.158.10.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.2.0 0.0.0.255 host 10.158.2.50&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.161.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.171.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.172.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.50.0.0 0.0.255.255 10.161.3.0 0.0.0.1&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.173.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.174.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.175.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.176.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.177.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.178.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.179.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.180.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.193.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 10.210.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 172.16.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 172.21.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 172.22.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 172.23.0.0 0.0.255.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.0.0 0.0.255.255 192.168.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.101 10.158.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip 10.161.2.0 0.0.0.255 10.159.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.102 10.158.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.101 10.158.255.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.102 10.158.255.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.98 10.158.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.96 10.158.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.99 10.158.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.97 10.158.2.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.189 192.168.10.0 0.0.0.3&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.173 host 10.158.2.33&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.174 host 10.158.2.33&lt;BR /&gt;&amp;nbsp;deny&amp;nbsp;&amp;nbsp; ip host 10.161.2.172 host 10.158.2.33&lt;BR /&gt;&amp;nbsp;permit ip 10.160.0.0 0.0.255.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.161.0.0 0.0.255.255 any&lt;BR /&gt;&amp;nbsp;permit ip 10.193.0.0 0.0.255.255 any&lt;BR /&gt;!&lt;BR /&gt;logging trap notifications&lt;BR /&gt;logging host 10.193.1.65&lt;BR /&gt;access-list 10 permit 10.158.2.12&lt;BR /&gt;access-list 10 permit 10.158.10.100&lt;BR /&gt;access-list 10 permit 10.158.10.101&lt;BR /&gt;access-list 10 permit 10.193.1.0 0.0.0.255 log&lt;BR /&gt;access-list 10 permit 10.161.2.0 0.0.0.255&lt;BR /&gt;access-list 10 permit 10.160.0.0 0.0.255.255&lt;BR /&gt;access-list 103 permit ip 10.203.0.0 0.0.255.255 10.160.0.0 0.0.255.255 log&lt;BR /&gt;access-list 103 permit ip 10.203.0.0 0.0.255.255 203.167.81.224 0.0.0.15&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.193.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.193.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.173.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.173.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.161.3.0 0.0.0.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.161.3.0 0.0.0.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.194.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.194.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.174.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.174.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.210.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.210.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.176.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.176.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.161.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.21.0.0 0.0.255.255 10.159.0.0 0.0.255.255&lt;BR /&gt;access-list 172 permit ip 172.22.0.0 0.0.255.255 10.159.0.0 0.0.255.255&lt;BR /&gt;!&lt;BR /&gt;route-map THPAL_RMAP permit 10&lt;BR /&gt;&amp;nbsp;match ip address THPAL_ACL&lt;BR /&gt;&amp;nbsp;set ip next-hop 10.160.1.3&lt;BR /&gt;!&lt;BR /&gt;route-map SMMPH_RMAP permit 10&lt;BR /&gt;&amp;nbsp;match ip address SMMPH_ACL&lt;BR /&gt;&amp;nbsp;set ip next-hop 10.160.1.3&lt;BR /&gt;!&lt;BR /&gt;route-map CBNC_RMAP permit 10&lt;BR /&gt;&amp;nbsp;match ip address CBNC_ACL&lt;BR /&gt;&amp;nbsp;set ip next-hop 10.158.2.6&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;snmp-server community MNLSMMPHSNMP.com.ph RO&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;access-class 10 in&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;access-class 10 in&lt;BR /&gt;&amp;nbsp;logging synchronous&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;monitor session 1 source vlan 160 - 161 , 172 , 190 , 193 , 203&lt;BR /&gt;monitor session 1 destination interface Gi0/7&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:16:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821405#M172694</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2019-03-12T07:16:28Z</dc:date>
    </item>
    <item>
      <title>I would think this is most</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821406#M172695</link>
      <description>&lt;P&gt;I would think this is most likely a firewall issue. &amp;nbsp;Being able to ping the 10.193.1.6 address from the DMZ indicates that routing is correct. &amp;nbsp;is the firewall an ASA? &amp;nbsp;are you sure that that traffic flows through the firewall? &amp;nbsp;Check the access rules on the inside interface, see if there is a rule allowing icmp traffic from 10.193.1.6 to 172.29.29.2.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 06:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821406#M172695</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T06:45:21Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821407#M172696</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you. That worked!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have other issues, I have the dmz host private ip address translated statically to the outside ip address which is public ip.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But I cannot ping that outside interface public ip from the DMZ host. Is that really the case?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 08:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821407#M172696</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-11T08:11:18Z</dc:date>
    </item>
    <item>
      <title>That is how the ASA works by</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821408#M172698</link>
      <description>&lt;P&gt;That is how the ASA works by design. &amp;nbsp;You can only ping the ingress interface, you can not ping an interface that is not the ingress interface.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 08:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821408#M172698</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T08:14:55Z</dc:date>
    </item>
    <item>
      <title>Hello Alright. Our current</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821409#M172700</link>
      <description>&lt;P&gt;Hello Alright. Our current setup is we have RA VPN setup using the outside interface public ip. Then the DMZ host statically translated to outside interface public ip address which is the same ip for VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Right now, i have a mobile device management but i cannot access it from outside (e.g. &lt;A href="http://public" target="_blank"&gt;http://public&lt;/A&gt; ip address:8080/mobile)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My outside acl is permit any to my MDM dmz host. The service is IP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't know what could be wrong&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 08:21:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821409#M172700</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-11T08:21:38Z</dc:date>
    </item>
    <item>
      <title>Do you have a NAT statement</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821410#M172702</link>
      <description>&lt;P&gt;Do you have a NAT statement for this server / mobile device?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network public_ip&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 1.2.3.4&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network private_ip&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 10.10.10.10&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (inside,outside) static&amp;nbsp;public_ip service tcp 8080 8080&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 08:40:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821410#M172702</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T08:40:02Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821411#M172704</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't have that nat statement.&lt;/P&gt;
&lt;P&gt;I only have this on below for the dmz to outside&amp;nbsp;translation&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network&amp;nbsp;mdmserver&lt;BR /&gt; host 172.29.29.2&lt;BR /&gt; &lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;nat (DMZ,outside) static interface &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;---------------------&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;Question on your nat statement&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 1.2.3.4 -&amp;gt; public ip for mdm server?, &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network private_ip&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 10.10.10.10 -&amp;gt;real ip for mdm server?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (inside,outside) static&amp;nbsp;public_ip service tcp 8080 8080 -&amp;gt; shouldn't this be nat (dmz,outside)?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Thanks in advance&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 08:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821411#M172704</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-11T08:51:13Z</dc:date>
    </item>
    <item>
      <title>Keep in mind that these are</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821412#M172707</link>
      <description>&lt;P&gt;Keep in mind that these are just examples and you need to tailor them to your own needs.&lt;/P&gt;
&lt;P&gt;in my example, 1.2.3.4 is the public IP &amp;nbsp;and 10.10.10.10 would be the real IP / private IP.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 08:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821412#M172707</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T08:56:14Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821413#M172709</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes I understand.&lt;/P&gt;
&lt;P&gt;Why is it nat (inside,outside)? shouldn't it be nat (dmz,outside)?&lt;/P&gt;
&lt;P&gt;Also, I cannot add this line for example in my config because it says that I overlaps with outside ip address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;my outside interface ip is 122.52.52.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;that's why I use&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;nat (DMZ,outside) static interface service&amp;nbsp;tcp 8080 8080&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;Is it the right config? or do I need to use a public ip other than the outside interface's public IP?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;Thanks&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 09:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821413#M172709</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-11T09:01:12Z</dc:date>
    </item>
    <item>
      <title>Why is it nat (inside,outside</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821414#M172711</link>
      <description>&lt;P&gt;&lt;EM&gt;Why is it nat (inside,outside)? shouldn't it be nat (dmz,outside)?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;I type inside because, as mentioned, it is just an example and I don't need to scroll through to remember the exact details and saves me some time.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#388ec9"&gt;nat (DMZ,outside) static interface service&amp;nbsp;tcp 8080 8080&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;this nat statement should be placed under an object so for example.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network dmz_server&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host &amp;lt;private IP of server&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; nat (DMZ,outside) static interface service tcp 8080 8080&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The above command should not give you an error, but if it does give you the error i suggest trying a different&amp;nbsp;NAT statement like the following:&lt;/P&gt;
&lt;P&gt;object network dmz_server&lt;/P&gt;
&lt;P&gt;&amp;nbsp; host &amp;lt;private IP of server&amp;gt;&lt;/P&gt;
&lt;P&gt;object service TCP_8080&lt;BR /&gt; service tcp source eq 8080&lt;/P&gt;
&lt;P&gt;nat (DMZ,outside) source static&amp;nbsp;&lt;SPAN&gt;dmz_server interface service&amp;nbsp;TCP_8080&amp;nbsp;TCP_8080&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 09:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821414#M172711</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T09:14:46Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821415#M172713</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Yes. I now have that config but still does not work. Is route needed for dmz network to access it from outside?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 10:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821415#M172713</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-11T10:19:29Z</dc:date>
    </item>
    <item>
      <title>Do you have an access list</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821416#M172715</link>
      <description>&lt;P&gt;Do you have an access list entry on the outside interface for this traffic?&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list dmz_in extended permit tcp any &amp;lt;private ip of server&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-group&amp;nbsp;dmz_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you already have an ACL on the outside interface just add the statement to that ACL.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 10:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821416#M172715</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T10:46:38Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821417#M172717</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes i have that config also.&lt;/P&gt;
&lt;P&gt;MY setup is simple. Dmz interface connected to a vlan switchport on layer3 core sw.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Not sure what i'm missing or do i need to use a public ip other than the outside int ip address but i dont have other public ip&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 10:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821417#M172717</guid>
      <dc:creator>drlbaluyut</dc:creator>
      <dc:date>2016-02-11T10:57:09Z</dc:date>
    </item>
    <item>
      <title>No you do not need another</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821418#M172720</link>
      <description>&lt;P&gt;No you do not need another public IP. &amp;nbsp;Could you post your full ASA configuration (remove/change public IPs, usernames and passwords). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 11:00:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-9-1-dmz-host-can-ping-specific-inside-server-but/m-p/2821418#M172720</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-11T11:00:48Z</dc:date>
    </item>
  </channel>
</rss>

