<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic from my past experience, i in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602262#M205524</link>
    <description>&lt;P&gt;from my past experience, i did similar configuration of NAT to exchange server using other model of&amp;nbsp;FW, the only different is the public IP is /30. The outside interface is the 10.x.x.b, and able to do NAT.&lt;/P&gt;&lt;P&gt;The only different with above config is the public ip is /29.&lt;/P&gt;</description>
    <pubDate>Sat, 01 Nov 2014 14:33:50 GMT</pubDate>
    <dc:creator>Mohd Khairul Nizam</dc:creator>
    <dc:date>2014-11-01T14:33:50Z</dc:date>
    <item>
      <title>ASA 5515 change Outside IP address</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602258#M205520</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;I have a working ASA 5515 configuration that now working fine.&lt;/P&gt;&lt;P&gt;Outside interface is 110.74.132.50/29.&lt;/P&gt;&lt;P&gt;Now customer want to change the Outside interface to 110.74.132.52/29 because they said that some email can't get through because of fail SPF check.&lt;/P&gt;&lt;P&gt;I can change the interface but wouldn't it will effect the existing NAT??? mostly NAT that already point to 110.74.132.52???&lt;/P&gt;&lt;P&gt;Below is the configuration&lt;/P&gt;&lt;P&gt;=====================&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(2)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname ASHFW01&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 110.74.132.50 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.1&lt;BR /&gt;&amp;nbsp;vlan 12&lt;BR /&gt;&amp;nbsp;nameif VLAN12&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.12.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.2&lt;BR /&gt;&amp;nbsp;vlan 20&lt;BR /&gt;&amp;nbsp;nameif VLAN20&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.20.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.3&lt;BR /&gt;&amp;nbsp;vlan 30&lt;BR /&gt;&amp;nbsp;nameif VLAN30&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.30.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.4&lt;BR /&gt;&amp;nbsp;vlan 50&lt;BR /&gt;&amp;nbsp;nameif VLAN50&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.1.50.254 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone SGT 8&lt;BR /&gt;dns domain-lookup VLAN12&lt;BR /&gt;dns domain-lookup VLAN20&lt;BR /&gt;dns domain-lookup VLAN30&lt;BR /&gt;dns domain-lookup VLAN50&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network TerminalServer-RDP&lt;BR /&gt;&amp;nbsp;host 10.1.12.13&lt;BR /&gt;object network Exch-SMTP&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-POP3&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-SMTPS&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-RDP&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network MgmtSvr-RDP&lt;BR /&gt;&amp;nbsp;host 10.1.12.30&lt;BR /&gt;object network Exch-HTTPS&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Exch-HTTP&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object network Portal&lt;BR /&gt;&amp;nbsp;host 10.1.12.14&lt;BR /&gt;&amp;nbsp;description Portal&lt;BR /&gt;object service Portal80&lt;BR /&gt;&amp;nbsp;service tcp source eq www destination eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;description Portal80&lt;BR /&gt;object service SalesMobile9090&lt;BR /&gt;&amp;nbsp;service tcp destination eq 9090&amp;nbsp;&lt;BR /&gt;&amp;nbsp;description SalesMobile9090&lt;BR /&gt;object network MgmtSvr&lt;BR /&gt;&amp;nbsp;host 10.1.12.30&lt;BR /&gt;object network TerminalServer&lt;BR /&gt;&amp;nbsp;host 10.1.12.13&lt;BR /&gt;object network ExchServer&lt;BR /&gt;object network ExchSvr&lt;BR /&gt;&amp;nbsp;host 10.1.20.2&lt;BR /&gt;object service smtp2&lt;BR /&gt;&amp;nbsp;service tcp destination eq 587&amp;nbsp;&lt;BR /&gt;object network SalesMobile&lt;BR /&gt;&amp;nbsp;host 10.1.12.14&lt;BR /&gt;&amp;nbsp;description SalesMobile&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object MgmtSvr&lt;BR /&gt;&amp;nbsp;network-object object TerminalServer&lt;BR /&gt;&amp;nbsp;network-object object Exch-RDP&lt;BR /&gt;object-group service Exch-Services&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pop3&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object object smtp2&amp;nbsp;&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq smtp&amp;nbsp;&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;&amp;nbsp;network-object object Exch-HTTP&lt;BR /&gt;&amp;nbsp;network-object object Exch-HTTPS&lt;BR /&gt;&amp;nbsp;network-object object Exch-POP3&lt;BR /&gt;&amp;nbsp;network-object object Exch-SMTP&lt;BR /&gt;&amp;nbsp;network-object object Exch-SMTPS&lt;BR /&gt;access-list outside_access_in extended permit icmp any4 any&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 object-group rdp&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Portal eq www&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit object SalesMobile9090 any object SalesMobile&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit ip any object-group DM_INLINE_NETWORK_2&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended deny ip any any&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu VLAN12 1500&lt;BR /&gt;mtu VLAN20 1500&lt;BR /&gt;mtu VLAN30 1500&lt;BR /&gt;mtu VLAN50 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any VLAN12&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network TerminalServer-RDP&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.51 service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network Exch-SMTP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp smtp smtp&amp;nbsp;&lt;BR /&gt;object network Exch-POP3&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp pop3 pop3&amp;nbsp;&lt;BR /&gt;object network Exch-SMTPS&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp 587 587&amp;nbsp;&lt;BR /&gt;object network Exch-RDP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network MgmtSvr-RDP&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.53 service tcp 3389 3389&amp;nbsp;&lt;BR /&gt;object network Exch-HTTPS&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp https https&amp;nbsp;&lt;BR /&gt;object network Exch-HTTP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp www www&amp;nbsp;&lt;BR /&gt;object network Portal&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.51 service tcp www www&amp;nbsp;&lt;BR /&gt;object network SalesMobile&lt;BR /&gt;&amp;nbsp;nat (VLAN12,outside) static 110.74.132.51 service tcp 9090 9090&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;nat (any,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 110.74.132.49 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602258#M205520</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2019-03-12T05:01:12Z</dc:date>
    </item>
    <item>
      <title>Hi,This is just an assumption</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602259#M205521</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This is just an assumption on the basis of the issue that i have seen , the outbound traffic must be using the interface IP for the Interface PAT and that's why they want you to change the Interface IP itself so that both Inbound and outbound traffic uses .52&lt;/P&gt;&lt;P&gt;We can specifically NAT the EMAIL server internal IP to use this .52 address for outbound connections as well and i think that should resolve this issue without changing the Interface IP.&lt;/P&gt;&lt;P&gt;Something like this:-&lt;/P&gt;&lt;P&gt;object network obj-EMAILSRV&lt;/P&gt;&lt;P&gt;host &amp;lt;ip&amp;gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic .52&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 12:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602259#M205521</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-01T12:58:26Z</dc:date>
    </item>
    <item>
      <title>Hi,From your posted</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602260#M205522</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;From your posted configuration, I can see that your Exchange server is already using the public ip 110.74.132.52, means that email server is already seen to the internet (outside world) with that public ip, so if your intention to change the ASA outside ip address is to let the Exchange server exit with the ip address 110.74.132.52 then that would not solve any issue since as mentioned before that Exchange server is already mapped to the ip address 110.74.133.52. I would try to solve the SPF issue by adding the appropriate SPF record on the registrant provider, ASA would not be the cause of SPF checking failure instead it would be due to some misconfigured or missing SPF record at the registrant, but&amp;nbsp;beside that, please note that if you go to assign the ASA outside interface with the same ip address used in the static natting (110.74.132.52) you would lose all those static nats mapped to that ip address, ASA would delete them all.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 13:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602260#M205522</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-11-01T13:21:25Z</dc:date>
    </item>
    <item>
      <title>Hi, I did try to change it to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602261#M205523</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did try to change it to. 52, NAT is not working,. It says that it is overlap with the Outside interface.&lt;/P&gt;&lt;P&gt;i try telnet 110.74.132.52 &amp;lt;port&amp;gt; (25,587,110,80) from outside,&amp;nbsp;all is not working after change to .52&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 14:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602261#M205523</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-11-01T14:17:12Z</dc:date>
    </item>
    <item>
      <title>from my past experience, i</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602262#M205524</link>
      <description>&lt;P&gt;from my past experience, i did similar configuration of NAT to exchange server using other model of&amp;nbsp;FW, the only different is the public IP is /30. The outside interface is the 10.x.x.b, and able to do NAT.&lt;/P&gt;&lt;P&gt;The only different with above config is the public ip is /29.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 14:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602262#M205524</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-11-01T14:33:50Z</dc:date>
    </item>
    <item>
      <title>hi Vibhor,You're right, they</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602263#M205525</link>
      <description>&lt;P&gt;hi Vibhor,&lt;/P&gt;&lt;P&gt;You're right, they insist for the traffic to go out&amp;nbsp;using&amp;nbsp;.52. They said it will resolve the SPF issues.&lt;/P&gt;&lt;P&gt;so your advise is i remove below&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;object network Exch-SMTP&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp smtp smtp&amp;nbsp;&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;object network Exch-POP3&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp pop3 pop3&amp;nbsp;&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;object network Exch-SMTPS&lt;/SPAN&gt;&lt;BR style="font-size: 14.4444446563721px;" /&gt;&lt;SPAN style="font-size: 14.4444446563721px;"&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp 587 587&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and substitute with &amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14.4444446563721px; background-color: rgb(249, 249, 249);"&gt;object network obj-ExchageServer&lt;/P&gt;&lt;P style="font-size: 14.4444446563721px; background-color: rgb(249, 249, 249);"&gt;host 10.1.20.2&lt;/P&gt;&lt;P style="font-size: 14.4444446563721px; background-color: rgb(249, 249, 249);"&gt;NAT (inside,outside) dynamic 110.74.132.52&lt;/P&gt;</description>
      <pubDate>Sat, 01 Nov 2014 14:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602263#M205525</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-11-01T14:38:35Z</dc:date>
    </item>
    <item>
      <title>That would be normal, since</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602264#M205526</link>
      <description>&lt;P&gt;That would be normal, since you assigned that ip address on the outside interface, but you would still be able to do it by using the "interface" key instead of the ip address, example:&lt;/P&gt;&lt;P&gt;object network Exch-SMTP&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) static&amp;nbsp;&lt;STRONG&gt;interface&lt;/STRONG&gt; service tcp&amp;nbsp;smtp smtp&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Sun, 02 Nov 2014 00:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602264#M205526</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-11-02T00:03:43Z</dc:date>
    </item>
    <item>
      <title>As mentioned in my previous</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602265#M205528</link>
      <description>&lt;P&gt;As mentioned in my previous post, you would still be able to do nat, it is possibile, but as I told you before, in case you are going to use the same ip address used on the outside interface, you need to use the keyword "interface" in the nat statement instead of the ip address itself.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aref&lt;/P&gt;</description>
      <pubDate>Sun, 02 Nov 2014 00:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602265#M205528</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2014-11-02T00:07:22Z</dc:date>
    </item>
    <item>
      <title>Hi,Apologies for the delay</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602266#M205530</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Apologies for the delay.&lt;/P&gt;&lt;P&gt;Have you tried the Dynamic NAT with the .52 IP ?&lt;/P&gt;&lt;P&gt;If yes , send a packet tracer for the email server trying to go to the internet ?&lt;/P&gt;&lt;P&gt;packet input inside &amp;lt;Server Private IP&amp;gt; tcp &amp;lt;IP address&amp;gt; 3456 4.2.2.2 80 det&lt;/P&gt;&lt;P&gt;When you use a Static PAT , the device mapped to the port wil never use the same mapped IP for the Outbound traffic.&lt;/P&gt;&lt;P&gt;Let me know how it goes ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sun, 02 Nov 2014 00:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602266#M205530</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-02T00:51:00Z</dc:date>
    </item>
    <item>
      <title>i did do the dynamic NAT as</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602267#M205532</link>
      <description>&lt;P&gt;i did do the dynamic NAT as below&lt;/P&gt;&lt;P&gt;object network obj-Exch&lt;BR /&gt;&amp;nbsp;nat (VLAN20,outside) dynamic 110.74.132.52&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the packet tracer&lt;/P&gt;&lt;DIV&gt;=~=~=~=~=~=~=~=~=~=~=&lt;/DIV&gt;&lt;DIV&gt;packet input VLAN20 tcp 10.1.20.2 3456 4.2.2.2 80 det&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 0.0.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; outside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;object network obj-Exch&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;nat (VLAN20,outside) dynamic 110.74.132.52&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Dynamic translate 10.1.20.2/3456 to 110.74.132.52/3456&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff29380920, priority=6, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=143, user_data=0x7fff2a78b150, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=10.1.20.2, mask=255.255.255.255, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN20, output_ifc=outside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff29b7e5b0, priority=0, domain=nat-per-session, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=34718, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a6907c0, priority=0, domain=inspect-ip-options, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=16570, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=VLAN20, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (any,outside) after-auto source dynamic any interface&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;out id=0x7fff29d52ee0, priority=6, domain=nat-reverse, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=10050, user_data=0x7fff2a7f2240, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=outside&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff29b7e5b0, priority=0, domain=nat-per-session, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=34720, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=any, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0x7fff2a5dd570, priority=0, domain=inspect-ip-options, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=22591, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;&lt;DIV&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;input_ifc=outside, output_ifc=any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-CREATION&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;New flow created with id 25944, packet dispatched to next module&lt;/DIV&gt;&lt;DIV&gt;Module information for forward flow ...&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tracer_drop&lt;/DIV&gt;&lt;DIV&gt;snp_fp_inspect_ip_options&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tcp_normalizer&lt;/DIV&gt;&lt;DIV&gt;snp_fp_translate&lt;/DIV&gt;&lt;DIV&gt;snp_fp_adjacency&lt;/DIV&gt;&lt;DIV&gt;snp_fp_fragment&lt;/DIV&gt;&lt;DIV&gt;snp_ifc_stat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Module information for reverse flow ...&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tracer_drop&lt;/DIV&gt;&lt;DIV&gt;snp_fp_inspect_ip_options&lt;/DIV&gt;&lt;DIV&gt;snp_fp_translate&lt;/DIV&gt;&lt;DIV&gt;snp_fp_tcp_normalizer&lt;/DIV&gt;&lt;DIV&gt;snp_fp_adjacency&lt;/DIV&gt;&lt;DIV&gt;snp_fp_fragment&lt;/DIV&gt;&lt;DIV&gt;snp_ifc_stat&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: VLAN20&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: outside&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: allow&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;ASHFW01#&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sun, 02 Nov 2014 03:07:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602267#M205532</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-11-02T03:07:59Z</dc:date>
    </item>
    <item>
      <title>Hi,No , actually..You need to</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602268#M205534</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;No , actually..&lt;/P&gt;&lt;P&gt;You need to remember that the Static PAT Ex.:-&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network Exch-SMTP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;nat (VLAN20,outside) static 110.74.132.52 service tcp smtp smtp&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Will allow the Inbound connection on the SMTP port. But for the Traffic outbound , it the source port is smtp[unlikely as the shource port is randomly selected for every connection] , then only the Mapped Ip will be &lt;SPAN&gt;110.74.132.52 , otherwise it will use the Interface Dynamic PAT.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thus to get this to work , you need all the Static PAt statements as well as the Dynamic NAT for the outbound connection with it.&lt;/P&gt;&lt;P&gt;This should resolve the issue for you.&lt;/P&gt;&lt;P&gt;Also , once you apply this configuration , clear out the previous connections for the server as there might be some still using the interface ip.&lt;/P&gt;&lt;P&gt;clear local-host &amp;lt;IP address&amp;gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2014 15:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602268#M205534</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-11-04T15:44:46Z</dc:date>
    </item>
    <item>
      <title>Hi all, Thanks for all the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602269#M205535</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all the contribution.&amp;nbsp;&lt;BR /&gt;Yes case resolved.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2014 02:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-change-outside-ip-address/m-p/2602269#M205535</guid>
      <dc:creator>Mohd Khairul Nizam</dc:creator>
      <dc:date>2014-11-05T02:11:36Z</dc:date>
    </item>
  </channel>
</rss>

