<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Karsten, i have in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524298#M235568</link>
    <description>&lt;P&gt;Thanks Karsten, i have started searching config example for this workaround, it would be very greatful and appreciated if you can share&amp;nbsp;&amp;nbsp;this.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Aug 2014 15:17:26 GMT</pubDate>
    <dc:creator>Anukalp S</dc:creator>
    <dc:date>2014-08-15T15:17:26Z</dc:date>
    <item>
      <title>inside to outside ip</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524281#M235533</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Hi Experts..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have users sitting on inside and they are trying to access a DMZ server with its outside(public) ip (X.X.X.191) which is static nat but they are unable to reach server. I have allowed same security permit traffic inter &amp;amp; intra interface. ALso have disable spoofing. Still unable to reach. Pls help me out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj-ANY&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj-ftp-server&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static X.X.X.191&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524281#M235533</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2019-03-12T04:38:14Z</dc:date>
    </item>
    <item>
      <title>Have you permitted traffic</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524282#M235534</link>
      <description>&lt;P&gt;Have you permitted traffic same-security intra-interface?&lt;/P&gt;&lt;P&gt;If so, and it's still not working, please run:&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp [user ip address] 1025 x.x.x.191 [server port]&lt;/P&gt;&lt;P&gt;...and share the output&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 14:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524282#M235534</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-08-14T14:06:29Z</dc:date>
    </item>
    <item>
      <title>This problem has to be solved</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524283#M235536</link>
      <description>&lt;P&gt;This problem has to be solved by manipulating DNS in a way that the internal users resolve the DMZ-server to the real address instead of the translated address. The users have to access the server by FQDN and not by IP-address.&lt;/P&gt;&lt;P&gt;There are two common ways to get that working:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;DNS-Doctoring on the ASA.&lt;BR /&gt;For that you just add the keyword "dns" to your nat-statement:&lt;P style="font-size: 14px;"&gt;&lt;CODE&gt;object network obj-ftp-server&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) static X.X.X.191 dns&lt;/CODE&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Add the FQDN of the server to your internal DNS.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 14 Aug 2014 14:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524283#M235536</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-14T14:11:13Z</dc:date>
    </item>
    <item>
      <title> Hi.. Currently i am trying</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524284#M235539</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi.. Currently i am trying to ping this server outside ip to check reachability, here is logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; X.X.X.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group IN in interface inside&lt;BR /&gt;access-list IN extended permit icmp any4 any4&lt;BR /&gt;access-list IN remark Allow Domain for Entire Network&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.110.38/0 to X.X.X.5/18216&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 160797423, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 14:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524284#M235539</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-14T14:40:47Z</dc:date>
    </item>
    <item>
      <title> Hi.. Currently i am trying</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524285#M235540</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi.. Currently i am trying to ping this server outside ip to check reachability, here is logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; X.X.X.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group IN in interface inside&lt;BR /&gt;access-list IN extended permit icmp any4 any4&lt;BR /&gt;access-list IN remark Allow Domain for Entire Network&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.110.38/0 to X.X.X.5/18216&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 160797423, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 14:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524285#M235540</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-14T14:42:11Z</dc:date>
    </item>
    <item>
      <title> Hi.. Currently i am trying</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524286#M235541</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi.. Currently i am trying to ping this server outside ip to check reachability, here is logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; X.X.X.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group IN in interface inside&lt;BR /&gt;access-list IN extended permit icmp any4 any4&lt;BR /&gt;access-list IN remark Allow Domain for Entire Network&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.110.38/0 to X.X.X.5/18216&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 160797423, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 14:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524286#M235541</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-14T14:48:15Z</dc:date>
    </item>
    <item>
      <title> Hi,Users need to test some</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524287#M235543</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Users need to test some application running on this server, so they need to check this using only outside ip, so pls how could it work. We are running ASA in HA.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 15:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524287#M235543</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-14T15:25:10Z</dc:date>
    </item>
    <item>
      <title>That can be done with some</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524288#M235545</link>
      <description>&lt;P&gt;That can be done with some dirty NAT-tricks; but really, you don't wan't to do that ... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;That's what DNS is for.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 15:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524288#M235545</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-14T15:52:04Z</dc:date>
    </item>
    <item>
      <title>Hi, since i have denied</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524289#M235546</link>
      <description>&lt;P&gt;Hi, since i have denied request to this server&amp;nbsp;local ip from inside so i believe DNS option wouldn't work&amp;nbsp; after adding DNS statement.&lt;/P&gt;&lt;P&gt;Could you share this tricky nat satament to achieve communication through outside ip.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 16:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524289#M235546</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-14T16:21:18Z</dc:date>
    </item>
    <item>
      <title>&gt; Hi, since i have denied</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524290#M235547</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Hi, since i have denied request to this server&amp;nbsp;local ip from inside so i believe DNS option wouldn't work&amp;nbsp; after adding DNS statement.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;It will work because in that case you connect to the real IP of the server and not to the translated outside NAT-address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;I don't have a working config for the workaround, but it was discussed on the supportforum before. With a little bit searching you will probably find it.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Aug 2014 19:53:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524290#M235547</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-14T19:53:37Z</dc:date>
    </item>
    <item>
      <title>Hi..I did try adding DNS in</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524291#M235556</link>
      <description>&lt;P&gt;Hi..&lt;/P&gt;&lt;P&gt;I did try adding DNS in NAT statement, after adding it when&amp;nbsp; i tried pinging this server with its name it was&amp;nbsp;resolving server DMZ ip not outside nat ip. Since as i said above that there is no communication between inside to this server DMZ ip, so i was unable to reach it.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 11:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524291#M235556</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-15T11:56:28Z</dc:date>
    </item>
    <item>
      <title>what is the packet-tracer</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524292#M235560</link>
      <description>&lt;P&gt;what is the packet-tracer output when you use the real IP?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 12:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524292#M235560</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-15T12:08:29Z</dc:date>
    </item>
    <item>
      <title>hi..As i said, i have made</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524293#M235563</link>
      <description>&lt;P&gt;hi..&lt;/P&gt;&lt;P&gt;As i said, i have made communication dney&amp;nbsp;&amp;nbsp;to this serve real ip from inside through ACL as my organization asked me so. This server can be accessible through outside NAT ip only.&lt;/P&gt;&lt;P&gt;So if adding DNS in NAT statement &amp;nbsp;would cause server name to be resolved with real ip only, then how could we connect it.&lt;/P&gt;&lt;P&gt;Also my client who are accessing this server over internet can also be unable to reach it as server name resolve real ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thats why i am looking for solution which can make this server communication through outside nat ip.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 12:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524293#M235563</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-15T12:32:29Z</dc:date>
    </item>
    <item>
      <title>If you want to communicate</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524294#M235564</link>
      <description>&lt;P&gt;If you want to communicate with that server you have to allow it! And as the server ha a specific IP you have to allow the communication to that IP. For your external users, they have to access the server with the public IP.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 12:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524294#M235564</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-15T12:56:41Z</dc:date>
    </item>
    <item>
      <title>Thanks karsten for your help.</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524295#M235565</link>
      <description>&lt;P&gt;Thanks karsten for your help.. i need to coordinate with my seniors on this matter, also will look for workaround which can make communication using outside ip, if you can share that will be appreciable.&lt;/P&gt;&lt;P&gt;On the other hand, could you pls tell me that why i can not reach server outside nat ip from inside, why ASA is not permitting it, actually i need to justify this to my seniors.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 13:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524295#M235565</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-15T13:33:23Z</dc:date>
    </item>
    <item>
      <title>Thanks Karsten for your help,</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524296#M235566</link>
      <description>&lt;P&gt;Thanks Karsten for your help, i will be coordinating with my seniors on this, and will look for workaround to make communication through outside nat ip, if you can help me on this that will be highly appreciable.&lt;/P&gt;&lt;P&gt;Also could you tell me why i can not reach outside nat ip from indise, why ASA is denying it. What could be the reason, Actually i need to justify this to my seniors.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 14:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524296#M235566</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-15T14:13:14Z</dc:date>
    </item>
    <item>
      <title>&gt; Also could you tell me why</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524297#M235567</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Also could you tell me why i can not reach outside nat ip from indise, why ASA is denying it. What could be the reason, Actually i need to justify this to my seniors.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;It's the way the ASA works internally. Generalized: When the ASA sees the public IP it decides to route the Packet to the outside interface. And then it's too late for a new decision that the destination is actually on a different interface. The workaround is to NAT on the destination because that decision is done earlier. But that's not the right way to use the ASA.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 14:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524297#M235567</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-15T14:28:25Z</dc:date>
    </item>
    <item>
      <title>Thanks Karsten, i have</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524298#M235568</link>
      <description>&lt;P&gt;Thanks Karsten, i have started searching config example for this workaround, it would be very greatful and appreciated if you can share&amp;nbsp;&amp;nbsp;this.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Aug 2014 15:17:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524298#M235568</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-15T15:17:26Z</dc:date>
    </item>
    <item>
      <title>Hi.. I did try to explore NAT</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524299#M235571</link>
      <description>&lt;P&gt;Hi.. I did try to explore NAT configuration for this problem to could not get successful. Pls help me out sharing config fo this.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2014 16:35:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-ip/m-p/2524299#M235571</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2014-08-22T16:35:19Z</dc:date>
    </item>
  </channel>
</rss>

