<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ciscoasa# show verCisco in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589333#M203323</link>
    <description>&lt;P&gt;ciscoasa# show ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;Compiled on Fri 20-May-11 16:00 by builders&lt;BR /&gt;System image file is "disk0:/asa825-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ciscoasa up 4 days 17 hours&lt;/P&gt;&lt;P&gt;Hardware: &amp;nbsp; ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;Internal ATA Compact Flash, 128MB&lt;BR /&gt;BIOS Flash Firmware Hub @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Boot microcode &amp;nbsp; : CN1000-MC-BOOT-2.00&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IPSec microcode &amp;nbsp;: CNlite-MC-IPSECm-MAIN-2.05&lt;/P&gt;&lt;P&gt;&amp;nbsp;0: Int: Internal-Data0/0 &amp;nbsp; &amp;nbsp;: address is 881d.fcbb.f49e, irq 11&lt;BR /&gt;&amp;nbsp;1: Ext: Ethernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f496, irq 255&lt;BR /&gt;&amp;nbsp;2: Ext: Ethernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f497, irq 255&lt;BR /&gt;&amp;nbsp;3: Ext: Ethernet0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f498, irq 255&lt;BR /&gt;&amp;nbsp;4: Ext: Ethernet0/3 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f499, irq 255&lt;BR /&gt;&amp;nbsp;5: Ext: Ethernet0/4 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49a, irq 255&lt;BR /&gt;&amp;nbsp;6: Ext: Ethernet0/5 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49b, irq 255&lt;BR /&gt;&amp;nbsp;7: Ext: Ethernet0/6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49c, irq 255&lt;BR /&gt;&amp;nbsp;8: Ext: Ethernet0/7 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49d, irq 255&lt;BR /&gt;&amp;nbsp;9: Int: Internal-Data0/1 &amp;nbsp; &amp;nbsp;: address is 0000.0003.0002, irq 255&lt;BR /&gt;10: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 255&lt;BR /&gt;11: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 255&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp;: 8&lt;BR /&gt;VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 20, DMZ Unrestricted&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 10&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Active/Standby&lt;BR /&gt;VPN-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VPN-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled&lt;BR /&gt;SSL VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 25&lt;BR /&gt;Dual ISPs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VLAN Trunk Ports &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 8&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; : Disabled&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;/P&gt;&lt;P&gt;This platform has an ASA 5505 Security Plus license.&lt;/P&gt;&lt;P&gt;Serial Number:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Configuration last modified by enable_15 at 16:40:04.047 UTC Thu Nov 20 2014&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's the version info. &amp;nbsp;Misread your reply initially, thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Nov 2014 15:25:51 GMT</pubDate>
    <dc:creator>WStoffel1</dc:creator>
    <dc:date>2014-11-24T15:25:51Z</dc:date>
    <item>
      <title>ASA 5505 with THREE wan links, no load balancing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589331#M203318</link>
      <description>&lt;P&gt;So i've been confronted with an interesting problem. &amp;nbsp;As of right now it's a blank slate as I'm not sure how to do this. &amp;nbsp;There's a broadband Internet connection from the cable company that needs to be configured as the internet connection for the Lan, 192.168.0.0/23. &amp;nbsp;That traffic obviously needs to be natted through the Outside interface. &amp;nbsp;This would also be the default route. &amp;nbsp;So far a pretty plain vanilla setup is my point.&lt;/P&gt;&lt;P&gt;There's an Exchange server at 192.168.0.5 that needs to have email traffic sourced out of ISP2. &amp;nbsp;That outside interface is also the MX record for the mail server. &amp;nbsp;12.3.11.16/30 is the network, .17 being the default gateway. &amp;nbsp;.18 being my interface that needs to be natted to 192.168.0.5 allowing pop3, imap, https, smtp.&lt;/P&gt;&lt;P&gt;then there's an RDS (terminal server) at 192.168.0.6 that they want rdp or port 3389 to use ISP3. &amp;nbsp;This outside network is 12.5.14.56/29, 12.5.14.57 is the default gateway, .58 is my outside interface. &amp;nbsp; My terminal server clients would connect to 12.5.14.58.&lt;/P&gt;&lt;P&gt;Interfaces would look like this based on info so far:&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.254 255.255.254.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 50.7.89.4 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;nameif ISP2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 12.3.11.18 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Vlan4&lt;BR /&gt;nameif ISP3&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 12.5.14.58 255.255.255.248&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;which then becomes more of a design thing if it's technically possible...do i create a dmz and put isp2 an 3 there?&lt;/P&gt;&lt;P&gt;the current set up is a hodge podge of equipment with this meant to consolidate...when i say blank slate i mean it, anything can be done to get this working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;it's the third wan link thats a hang up. &amp;nbsp;any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589331#M203318</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2019-03-12T05:07:17Z</dc:date>
    </item>
    <item>
      <title>Hi,If I understand it</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589332#M203321</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If I understand it correctly you are trying to get the traffic working through 3 ISP network on the ASA device.&lt;/P&gt;&lt;P&gt;I think the Static NAT on the ISP interfaces for the Inbound connections should work just fine.&lt;/P&gt;&lt;P&gt;The issue here would be the Outbound traffic and how to direct that to the internet for the specific ISP interfaces.&lt;/P&gt;&lt;P&gt;Some workaround can be made for that using the NAT statement but we have to be specific on the ASA device version.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 22 Nov 2014 10:23:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589332#M203321</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-22T10:23:57Z</dc:date>
    </item>
    <item>
      <title>ciscoasa# show verCisco</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589333#M203323</link>
      <description>&lt;P&gt;ciscoasa# show ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;Compiled on Fri 20-May-11 16:00 by builders&lt;BR /&gt;System image file is "disk0:/asa825-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ciscoasa up 4 days 17 hours&lt;/P&gt;&lt;P&gt;Hardware: &amp;nbsp; ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;Internal ATA Compact Flash, 128MB&lt;BR /&gt;BIOS Flash Firmware Hub @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Boot microcode &amp;nbsp; : CN1000-MC-BOOT-2.00&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IPSec microcode &amp;nbsp;: CNlite-MC-IPSECm-MAIN-2.05&lt;/P&gt;&lt;P&gt;&amp;nbsp;0: Int: Internal-Data0/0 &amp;nbsp; &amp;nbsp;: address is 881d.fcbb.f49e, irq 11&lt;BR /&gt;&amp;nbsp;1: Ext: Ethernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f496, irq 255&lt;BR /&gt;&amp;nbsp;2: Ext: Ethernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f497, irq 255&lt;BR /&gt;&amp;nbsp;3: Ext: Ethernet0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f498, irq 255&lt;BR /&gt;&amp;nbsp;4: Ext: Ethernet0/3 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f499, irq 255&lt;BR /&gt;&amp;nbsp;5: Ext: Ethernet0/4 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49a, irq 255&lt;BR /&gt;&amp;nbsp;6: Ext: Ethernet0/5 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49b, irq 255&lt;BR /&gt;&amp;nbsp;7: Ext: Ethernet0/6 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49c, irq 255&lt;BR /&gt;&amp;nbsp;8: Ext: Ethernet0/7 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is 881d.fcbb.f49d, irq 255&lt;BR /&gt;&amp;nbsp;9: Int: Internal-Data0/1 &amp;nbsp; &amp;nbsp;: address is 0000.0003.0002, irq 255&lt;BR /&gt;10: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 255&lt;BR /&gt;11: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 255&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp;: 8&lt;BR /&gt;VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 20, DMZ Unrestricted&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 10&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Active/Standby&lt;BR /&gt;VPN-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VPN-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled&lt;BR /&gt;SSL VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 25&lt;BR /&gt;Dual ISPs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VLAN Trunk Ports &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 8&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; : Disabled&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;/P&gt;&lt;P&gt;This platform has an ASA 5505 Security Plus license.&lt;/P&gt;&lt;P&gt;Serial Number:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Configuration register is 0x1&lt;BR /&gt;Configuration last modified by enable_15 at 16:40:04.047 UTC Thu Nov 20 2014&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's the version info. &amp;nbsp;Misread your reply initially, thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2014 15:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589333#M203323</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2014-11-24T15:25:51Z</dc:date>
    </item>
    <item>
      <title>Hi,Unfortunately , on this</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589334#M203325</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Unfortunately , on this ASA 8.2.5 code , you would only be able to route the traffic on the basis of the NAT statement on the basis of Destination service port.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 12:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589334#M203325</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-26T12:22:29Z</dc:date>
    </item>
    <item>
      <title>Meaning updated code *would*</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589335#M203326</link>
      <description>&lt;P&gt;Meaning updated code *would* be able to correctly route traffic? &amp;nbsp;What version? &amp;nbsp;I can get it updated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Nov 2014 15:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-with-three-wan-links-no-load-balancing/m-p/2589335#M203326</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2014-11-26T15:23:43Z</dc:date>
    </item>
  </channel>
</rss>

