<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Looks good as long as you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-3/m-p/2665417#M198548</link>
    <description>&lt;P&gt;Looks good as long as you only need dynamic NAT sourced from the AV server. &amp;nbsp;If you need any sort of access from the outside in to the AV server then you would need to use static NAT. &amp;nbsp;I'm sure it is there, but make sure you have a route for 10.10.10.2 or the network it lives on back through the Non-App interface.&lt;/P&gt;</description>
    <pubDate>Thu, 19 Mar 2015 14:05:01 GMT</pubDate>
    <dc:creator>jj27</dc:creator>
    <dc:date>2015-03-19T14:05:01Z</dc:date>
    <item>
      <title>NAT Configuration on ASA 9.1(3)</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-3/m-p/2665416#M198505</link>
      <description>&lt;P style="font-size: 14.3999996185303px;"&gt;I installed an ASA 5585 firewall for one of our customer. I am trying to map inside antivirus IP 10.10.10.2 to the outside interface IP &lt;SPAN style="font-size: 14.3999996185303px;"&gt;192.168.10.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;Here is the NAT configuration. Please assist whether this configuration will work, post I need to implement the same.&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;nameif MD_MSCO&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.10.4 255.255.255.128 standby &lt;SPAN style="font-size: 14.3999996185303px;"&gt;192.168.10.5&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;interface Port-channel20.30&lt;BR /&gt;&amp;nbsp;nameif Non-App&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.124.27.164 255.255.255.248 standby &lt;SPAN style="font-size: 14.3999996185303px;"&gt;10.12&lt;/SPAN&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;4.27.165&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14.3999996185303px;"&gt;&amp;nbsp;ciscoasa(config)# object network my-inside-net&lt;BR /&gt;ciscoasa(config-network-object)# host &lt;SPAN style="font-size: 14.3999996185303px;"&gt;10.10.10.2&lt;/SPAN&gt;&lt;BR /&gt;ciscoasa(config-network-object)# nat (&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Non-App&lt;/SPAN&gt;,&lt;SPAN style="font-size: 14.3999996185303px;"&gt;MD_MSCO&lt;/SPAN&gt;) dynamic interface&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-3/m-p/2665416#M198505</guid>
      <dc:creator>MOHAMMED IBRAHIM THAKKADI AHAMED</dc:creator>
      <dc:date>2019-03-12T05:39:49Z</dc:date>
    </item>
    <item>
      <title>Looks good as long as you</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-3/m-p/2665417#M198548</link>
      <description>&lt;P&gt;Looks good as long as you only need dynamic NAT sourced from the AV server. &amp;nbsp;If you need any sort of access from the outside in to the AV server then you would need to use static NAT. &amp;nbsp;I'm sure it is there, but make sure you have a route for 10.10.10.2 or the network it lives on back through the Non-App interface.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 14:05:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-on-asa-9-1-3/m-p/2665417#M198548</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2015-03-19T14:05:01Z</dc:date>
    </item>
  </channel>
</rss>

