<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot add 102 and 103 NAT, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500035#M206535</link>
    <description>&lt;P&gt;Cannot add 102 and 103 NAT, Here's the output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASAFCHFW(config)# nat (Branch_Office) 102 0.0.0.0 0.0.0.0&lt;BR /&gt;Duplicate NAT entry&lt;BR /&gt;ASAFCHFW(config)# nat (Inside) 102 0.0.0.0 0.0.0.0&lt;BR /&gt;Duplicate NAT entry&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2014 14:34:45 GMT</pubDate>
    <dc:creator>Eduardo Guerra</dc:creator>
    <dc:date>2014-10-02T14:34:45Z</dc:date>
    <item>
      <title>Want to NAT into a single IP address</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500029#M206529</link>
      <description>&lt;P&gt;I have configured 5 interfaces Inside, Outside, DMZ, Branch_Offices and Management (This one as security level 100 to connect to another network). I need to NAT into a single IP everything from Inside and from Branch_Offices into Management. I need to use Interface IP Address because on the other network permission is assigned for this IP only.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any Suggestions? Here's the config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASAFCHFW&lt;/P&gt;&lt;P&gt;domain-name&lt;/P&gt;&lt;P&gt;enable password 6Jfo5anznhoG00fM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address XXX.YYY.ZZZ.123 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Branch_Office&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 172.16.31.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif management&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.200.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;domain-name&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network POSLINKSER&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.41.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.41.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.41.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.41.104&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.41.105&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.41.106&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.27.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.27.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.27.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.27.104&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.27.105&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.27.106&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.42.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.42.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.42.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.42.104&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.42.105&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.42.106&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.23.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.23.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.23.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.23.104&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.23.105&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.23.106&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.39.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.39.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.39.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.39.104&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.39.105&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.39.106&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.40.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.40.102&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.40.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.40.104&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.40.105&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.40.106&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object host 192.168.0.62&lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;port-object eq 3389&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip host 172.16.31.2 any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit udp host 172.16.31.2 any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 3000&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq https&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit udp host 172.16.31.2 any eq domain&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq pop3&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq smtp&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq www&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 1000&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq echo&lt;/P&gt;&lt;P&gt;access-list Inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list Inside extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list Inside extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list Inside extended permit udp any any&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any host XXX.YYY.ZZZ.122&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host XXX.YYY.ZZZ.122&lt;/P&gt;&lt;P&gt;access-list 100 extended permit udp any host XXX.YYY.ZZZ.122&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp host XXX.YYY.ttt.162 host XXX.YYY.ZZZ.124 obje&lt;/P&gt;&lt;P&gt;ct-group RDP&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host XXX.YYY.ZZZ.125 object-group RDP&lt;/P&gt;&lt;P&gt;access-list linkser extended permit ip 193.168.1.0 255.255.255.0 192.168.0.0 255&lt;/P&gt;&lt;P&gt;.255.0.0&lt;/P&gt;&lt;P&gt;access-list linkser extended permit ip 192.168.0.0 255.255.0.0 193.168.1.0 255.2&lt;/P&gt;&lt;P&gt;55.255.0&lt;/P&gt;&lt;P&gt;access-list netflow-export extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host XXX.YYY.ZZZ.125 eq 338&lt;/P&gt;&lt;P&gt;9 log&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.0.25 eq 3389&lt;/P&gt;&lt;P&gt;log&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;no logging message 106015&lt;/P&gt;&lt;P&gt;no logging message 313001&lt;/P&gt;&lt;P&gt;no logging message 313008&lt;/P&gt;&lt;P&gt;no logging message 106023&lt;/P&gt;&lt;P&gt;no logging message 710003&lt;/P&gt;&lt;P&gt;no logging message 106100&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302018&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;no logging message 302021&lt;/P&gt;&lt;P&gt;no logging message 302020&lt;/P&gt;&lt;P&gt;flow-export destination Inside 192.168.0.55 9996&lt;/P&gt;&lt;P&gt;flow-export template timeout-rate 1&lt;/P&gt;&lt;P&gt;flow-export delay flow-create 60&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Branch_Office 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.0.43 Outside&lt;/P&gt;&lt;P&gt;icmp permit any Outside&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 101 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 101 interface&lt;/P&gt;&lt;P&gt;global (management) 101 interface&lt;/P&gt;&lt;P&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,Branch_Office) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,Branch_Office) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,DMZ) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 172.16.3.0 172.16.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,DMZ) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.44.0 192.168.44.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.21.0 192.168.21.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.35.0 192.168.35.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.37.0 192.168.37.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.43.0 192.168.43.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.45.0 192.168.45.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.28.0 192.168.28.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.33.0 192.168.33.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.30.0 192.168.30.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.25.0 192.168.25.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.27.0 192.168.27.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.26.0 192.168.26.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.34.0 192.168.34.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.23.0 192.168.23.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.39.0 192.168.39.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.29.0 192.168.29.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.22.0 192.168.22.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.32.0 192.168.32.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) XXX.YYY.ZZZ.122 172.16.31.2 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 193.168.1.0 193.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.18.0 192.168.18.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.24.0 192.168.24.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.41.0 192.168.41.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.40.0 192.168.40.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,Outside) XXX.YYY.ZZZ.125 192.168.0.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.42.0 192.168.42.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.47.0 192.168.47.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group 100 in interface Outside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 XXX.YYY.ZZZ.121 20&lt;/P&gt;&lt;P&gt;route Branch_Office 172.16.1.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 172.16.2.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 172.16.3.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.1.0.0 255.255.192.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.18.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.20.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.21.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.22.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.23.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.24.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.25.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.26.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.27.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.28.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.29.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.30.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.31.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.32.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.33.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.34.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.35.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.37.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.39.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.40.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.41.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.42.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.43.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.44.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.45.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.47.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.100.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 193.168.1.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet XXX.YYY.ttt.160 255.255.255.248 Outside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 Branch_Office&lt;/P&gt;&lt;P&gt;telnet 172.16.31.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username eguerra password dr6zkC4iOPQHLH5f encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map netflow-export-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;match access-list netflow-export&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&amp;nbsp;class netflow-export-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; flow-export event-type all destination 192.168.0.55&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:5348605d189f72458cc23bac225698be&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASAFCHFW#&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500029#M206529</guid>
      <dc:creator>Eduardo Guerra</dc:creator>
      <dc:date>2019-03-12T04:50:57Z</dc:date>
    </item>
    <item>
      <title>does the setup work for</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500030#M206530</link>
      <description>&lt;P&gt;does the setup work for inside to management, but you are having issues from branch office to management?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 18:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500030#M206530</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-01T18:23:44Z</dc:date>
    </item>
    <item>
      <title>It does not work neither for</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500031#M206531</link>
      <description>&lt;P&gt;It does not work neither for Inside or Branch_Offices. I cannot reach from anywhere but if i connect cable direct to a PC and assign IP address i can reach that network&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 19:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500031#M206531</guid>
      <dc:creator>Eduardo Guerra</dc:creator>
      <dc:date>2014-10-01T19:32:37Z</dc:date>
    </item>
    <item>
      <title>Run a packet tracer and see</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500032#M206532</link>
      <description>&lt;P&gt;Run a packet tracer and see if that tells you where the packet is being stopped:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp &amp;lt;inside host IP&amp;gt; 12345 &amp;lt;management host IP&amp;gt; 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Branch_Office tcp &amp;lt;Branch_Office host IP&amp;gt; 12345 &amp;lt;management host IP&amp;gt; 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Post the output here.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 06:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500032#M206532</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-02T06:03:00Z</dc:date>
    </item>
    <item>
      <title>Here are the answers:Result</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500033#M206533</link>
      <description>&lt;P&gt;Here are the answers:&lt;/P&gt;&lt;DIV&gt;Result of the command: "packet-tracer input inside tcp 192.168.0.50 12345 192.168.200.1 80 detail"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab876b98, priority=1, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1360068933, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/DIV&gt;&lt;DIV&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Found no matching flow, creating a new flow&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in &amp;nbsp; 192.168.200.0 &amp;nbsp; 255.255.255.252 management&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab877400, priority=2, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1026969, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab8793a8, priority=0, domain=permit-ip-option, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=2627387, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xac268b00, priority=17, domain=flow-export, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1865794, user_data=0xac24dbc0, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: host-limits&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip Inside 192.168.0.0 255.255.255.0 DMZ any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; static translation to 192.168.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 23871, untranslate_hits = 5933&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab94dca0, priority=5, domain=host, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=2829359, user_data=0xab94d0a0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=192.168.0.0, mask=255.255.255.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip Inside any management any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 101 (192.168.200.2 [Interface PAT])&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 11179, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Dynamic translate 192.168.0.50/12345 to 192.168.200.2/58950 using netmask 255.255.255.255&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab948d68, priority=1, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=11178, user_data=0xab948ca8, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 9&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip management any Inside any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;out id=0xab4b41d8, priority=1, domain=nat-reverse, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=11178, user_data=0xac737b68, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: Inside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: management&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;Result of the command: "packet-tracer input inside tcp 192.168.0.50 12345 192.168.200.1 80 detail"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab876b98, priority=1, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1360068933, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/DIV&gt;&lt;DIV&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Found no matching flow, creating a new flow&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in &amp;nbsp; 192.168.200.0 &amp;nbsp; 255.255.255.252 management&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab877400, priority=2, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1026969, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab8793a8, priority=0, domain=permit-ip-option, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=2627387, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xac268b00, priority=17, domain=flow-export, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=1865794, user_data=0xac24dbc0, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: host-limits&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip Inside 192.168.0.0 255.255.255.0 DMZ any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; static translation to 192.168.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 23871, untranslate_hits = 5933&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab94dca0, priority=5, domain=host, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=2829359, user_data=0xab94d0a0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=192.168.0.0, mask=255.255.255.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip Inside any management any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 101 (192.168.200.2 [Interface PAT])&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 11179, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Dynamic translate 192.168.0.50/12345 to 192.168.200.2/58950 using netmask 255.255.255.255&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab948d68, priority=1, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=11178, user_data=0xab948ca8, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 9&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip management any Inside any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;out id=0xab4b41d8, priority=1, domain=nat-reverse, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=11178, user_data=0xac737b68, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: Inside&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: management&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result of the command: "packet-tracer input Branch_Office tcp 192.168.26.10 12345 192.168.200.1 80 detail"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 1&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab7f5c98, priority=1, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=2545039495, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/DIV&gt;&lt;DIV&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 2&lt;/DIV&gt;&lt;DIV&gt;Type: FLOW-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Found no matching flow, creating a new flow&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 3&lt;/DIV&gt;&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;&lt;DIV&gt;Subtype: input&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;in &amp;nbsp; 192.168.200.0 &amp;nbsp; 255.255.255.252 management&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 4&lt;/DIV&gt;&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab7f6500, priority=2, domain=permit, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=895169, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 5&lt;/DIV&gt;&lt;DIV&gt;Type: IP-OPTIONS&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab7f84a8, priority=0, domain=permit-ip-option, deny=true&lt;/DIV&gt;&lt;DIV&gt;hits=1929410, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 6&lt;/DIV&gt;&lt;DIV&gt;Type:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xac268480, priority=17, domain=flow-export, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=982647, user_data=0xac24dbc0, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 7&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: host-limits&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;static (Branch_Office,Inside) 192.168.26.0 192.168.26.0 netmask 255.255.255.0&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip Branch_Office 192.168.26.0 255.255.255.0 Inside any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; static translation to 192.168.26.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 47339, untranslate_hits = 26257&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab96bd48, priority=5, domain=host, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=62871, user_data=0xab96b148, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=192.168.26.0, mask=255.255.255.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 8&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip Branch_Office any management any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 101 (192.168.200.2 [Interface PAT])&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 1, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;Dynamic translate 192.168.26.10/12345 to 192.168.200.2/19406 using netmask 255.255.255.255&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;in &amp;nbsp;id=0xab945368, priority=1, domain=nat, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=0, user_data=0xab9452a8, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Phase: 9&lt;/DIV&gt;&lt;DIV&gt;Type: NAT&lt;/DIV&gt;&lt;DIV&gt;Subtype: rpf-check&lt;/DIV&gt;&lt;DIV&gt;Result: DROP&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; match ip management any Branch_Office any&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;&lt;DIV&gt;Additional Information:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;out id=0xac6b4578, priority=1, domain=nat-reverse, deny=false&lt;/DIV&gt;&lt;DIV&gt;hits=0, user_data=0xac6f4a38, cs_id=0x0, flags=0x0, protocol=0&lt;/DIV&gt;&lt;DIV&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/DIV&gt;&lt;DIV&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Result:&lt;/DIV&gt;&lt;DIV&gt;input-interface: Branch_Office&lt;/DIV&gt;&lt;DIV&gt;input-status: up&lt;/DIV&gt;&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;&lt;DIV&gt;output-interface: management&lt;/DIV&gt;&lt;DIV&gt;output-status: up&lt;/DIV&gt;&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;&lt;DIV&gt;Action: drop&lt;/DIV&gt;&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500033#M206533</guid>
      <dc:creator>Eduardo Guerra</dc:creator>
      <dc:date>2014-10-02T13:25:43Z</dc:date>
    </item>
    <item>
      <title>I suggest changing you NAT</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500034#M206534</link>
      <description>&lt;P&gt;I suggest changing you NAT statements to the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (Outside) 101 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (DMZ) 102 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (management) 103 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Branch_Office) 102 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside) 102 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (management) 102 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Branch_Office) 103 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside) 103 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500034#M206534</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-02T13:46:51Z</dc:date>
    </item>
    <item>
      <title>Cannot add 102 and 103 NAT,</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500035#M206535</link>
      <description>&lt;P&gt;Cannot add 102 and 103 NAT, Here's the output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASAFCHFW(config)# nat (Branch_Office) 102 0.0.0.0 0.0.0.0&lt;BR /&gt;Duplicate NAT entry&lt;BR /&gt;ASAFCHFW(config)# nat (Inside) 102 0.0.0.0 0.0.0.0&lt;BR /&gt;Duplicate NAT entry&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 14:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500035#M206535</guid>
      <dc:creator>Eduardo Guerra</dc:creator>
      <dc:date>2014-10-02T14:34:45Z</dc:date>
    </item>
    <item>
      <title>Sorry I forgot to mention you</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500036#M206536</link>
      <description>&lt;P&gt;Sorry I forgot to mention you need to remove the old configuration before you enter the new ones.&amp;nbsp; So do this in during a service window so you can have some down time.&lt;/P&gt;&lt;P&gt;Remember to take a backup of the old configuration in case you need to rollback&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 18:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500036#M206536</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-02T18:48:52Z</dc:date>
    </item>
    <item>
      <title>Marius, I can ping 192.168</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500037#M206537</link>
      <description>&lt;P&gt;Marius, I can ping 192.168.200.1 from ASA now but i cannot ping from inside network&lt;/P&gt;&lt;P&gt;Here's the config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASAFCHFW&lt;/P&gt;&lt;P&gt;domain-name farmaciachavez.com.bo&lt;/P&gt;&lt;P&gt;enable password 6Jfo5anznhoG00fM encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address xxx.yyy.zzz.123 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Branch_Office&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 172.16.31.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.0.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif management&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.200.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;domain-name farmaciachavez.com.bo&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service RDP tcp&lt;/P&gt;&lt;P&gt;&amp;nbsp;port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group network Subredes&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.13.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.14.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.17.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.18.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.19.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.22.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.23.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.24.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.25.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.26.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.27.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.28.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.29.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.32.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.33.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.34.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.35.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.36.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.37.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.38.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.39.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.41.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.42.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.43.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.44.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.45.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.46.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.47.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.48.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.49.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.51.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.52.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;network-object 192.168.53.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit ip host 172.16.31.2 any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit udp host 172.16.31.2 any&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 3000&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq https&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit udp host 172.16.31.2 any eq domain&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq pop3&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq smtp&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq www&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq 1000&lt;/P&gt;&lt;P&gt;access-list dmz_in extended permit tcp host 172.16.31.2 any eq echo&lt;/P&gt;&lt;P&gt;access-list Inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list Inside extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list Inside extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list Inside extended permit udp any any&lt;/P&gt;&lt;P&gt;access-list 100 extended permit ip any host xxx.yyy.zzz.122&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host xxx.yyy.zzz.122&lt;/P&gt;&lt;P&gt;access-list 100 extended permit udp any host xxx.yyy.zzz.122&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host xxx.yyy.zzz.125 object-group RDP&lt;/P&gt;&lt;P&gt;access-list linkser extended permit ip 193.168.1.0 255.255.255.0 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list linkser extended permit ip 192.168.0.0 255.255.0.0 193.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list netflow-export extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xxx.yyy.zzz.125 eq 3389 log&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 192.168.0.25 eq 3389 log&lt;/P&gt;&lt;P&gt;access-list AlianzaNET extended permit ip object-group Subredes 192.168.200.0 255.255.255.252&lt;/P&gt;&lt;P&gt;access-list AlianzaNET extended permit ip 192.168.200.0 255.255.255.252 192.168.0.0 255.255.128.0&lt;/P&gt;&lt;P&gt;access-list AlianzaNET extended permit ip 192.168.0.0 255.255.128.0 192.168.200.0 255.255.255.252&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;no logging message 106015&lt;/P&gt;&lt;P&gt;no logging message 313001&lt;/P&gt;&lt;P&gt;no logging message 313008&lt;/P&gt;&lt;P&gt;no logging message 106023&lt;/P&gt;&lt;P&gt;no logging message 710003&lt;/P&gt;&lt;P&gt;no logging message 106100&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302018&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;no logging message 302021&lt;/P&gt;&lt;P&gt;no logging message 302020&lt;/P&gt;&lt;P&gt;flow-export destination Inside 192.168.0.55 9996&lt;/P&gt;&lt;P&gt;flow-export template timeout-rate 1&lt;/P&gt;&lt;P&gt;flow-export delay flow-create 60&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu Branch_Office 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit host 192.168.0.43 Outside&lt;/P&gt;&lt;P&gt;icmp permit any Outside&lt;/P&gt;&lt;P&gt;icmp permit any DMZ&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Outside) 101 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 101 interface&lt;/P&gt;&lt;P&gt;global (management) 102 interface&lt;/P&gt;&lt;P&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (management) 102 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,Branch_Office) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,Branch_Office) 172.16.31.0 172.16.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,DMZ) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 172.16.2.0 172.16.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 172.16.3.0 172.16.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,DMZ) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.44.0 192.168.44.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.21.0 192.168.21.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.35.0 192.168.35.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.37.0 192.168.37.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.43.0 192.168.43.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.45.0 192.168.45.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.28.0 192.168.28.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.33.0 192.168.33.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.30.0 192.168.30.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.25.0 192.168.25.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.27.0 192.168.27.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.26.0 192.168.26.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.34.0 192.168.34.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.23.0 192.168.23.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.39.0 192.168.39.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.29.0 192.168.29.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.22.0 192.168.22.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.32.0 192.168.32.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) xxx.yyy.zzz.122 172.16.31.2 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 193.168.1.0 193.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.18.0 192.168.18.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.24.0 192.168.24.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.41.0 192.168.41.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.40.0 192.168.40.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Inside,Outside) xxx.yyy.zzz.125 192.168.0.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.42.0 192.168.42.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (Branch_Office,Inside) 192.168.47.0 192.168.47.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group 100 in interface Outside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 xxx.yyy.zzz.121 20&lt;/P&gt;&lt;P&gt;route Branch_Office 172.16.1.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 172.16.2.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 172.16.3.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.1.0.0 255.255.192.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.18.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.20.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.21.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.22.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.23.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.24.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.25.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.26.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.27.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.28.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.29.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.30.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.31.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.32.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.33.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.34.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.35.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.37.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.39.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.40.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.41.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.42.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.43.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.44.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.45.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.47.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 192.168.100.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;route Branch_Office 193.168.1.0 255.255.255.0 192.168.2.2 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 Outside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 Branch_Office&lt;/P&gt;&lt;P&gt;telnet 172.16.31.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 Inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username eguerra password dr6zkC4iOPQHLH5f encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map netflow-export-class&lt;/P&gt;&lt;P&gt;&amp;nbsp;match access-list netflow-export&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error&lt;/P&gt;&lt;P&gt;&amp;nbsp;class netflow-export-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; flow-export event-type all destination 192.168.0.55&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:9b94ab60ff7bf936ff1f1c4b36c25670&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 20:01:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500037#M206537</guid>
      <dc:creator>Eduardo Guerra</dc:creator>
      <dc:date>2014-10-02T20:01:50Z</dc:date>
    </item>
    <item>
      <title>You need to remove the old</title>
      <link>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500038#M206538</link>
      <description>&lt;P&gt;You need to remove the old dynamic NAT commands first and then reapply the new ones&lt;/P&gt;&lt;P&gt;Here they are again:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (Outside) 101 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (DMZ) 102 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (management) 103 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Branch_Office) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (management) 101 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Branch_Office) 102 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside) 102 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (management) 102 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Branch_Office) 103 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (Inside) 103 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 03 Oct 2014 06:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/want-to-nat-into-a-single-ip-address/m-p/2500038#M206538</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-03T06:56:52Z</dc:date>
    </item>
  </channel>
</rss>

