<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Folks, please help me in in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552749#M236959</link>
    <description>&lt;P&gt;Folks, please help me in sorting this out as I need to settle this down today&lt;/P&gt;</description>
    <pubDate>Tue, 01 Jul 2014 12:03:50 GMT</pubDate>
    <dc:creator>syedhashmi455</dc:creator>
    <dc:date>2014-07-01T12:03:50Z</dc:date>
    <item>
      <title>NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552748#M236958</link>
      <description>&lt;P&gt;Hi Friends&lt;/P&gt;&lt;P&gt;Please guide me if my configuration is ok. I amnot able to ping the public ip throughthe ASA resulting in failure to login to the sip server.&lt;/P&gt;&lt;P&gt;I need to nat the inside network to outside.&lt;BR /&gt;&lt;BR /&gt;Nat required between&lt;BR /&gt;88.55.164.10 to 101.164.50.50&lt;BR /&gt;88.55.164.11 to 101.164.50.25&lt;BR /&gt;&lt;BR /&gt;Please note the version of ASA below:&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 8.4(7)&lt;BR /&gt;Device Manager Version 7.1(6)&lt;BR /&gt;&lt;BR /&gt;I have configured as below&lt;BR /&gt;&lt;BR /&gt;access-list 200 extended permit tcp any host 88.55.164.10&lt;BR /&gt;access-list 200 extended permit tcp any host 88.55.164.11&lt;BR /&gt;access-group 200 in interface outside&lt;BR /&gt;&lt;BR /&gt;object network obj_sip-101.164.50.50&lt;BR /&gt;host 101.164.50.50&lt;BR /&gt;object network obj_sip_1-101.164.50.25&lt;BR /&gt;host 101.164.50.25&lt;BR /&gt;&lt;BR /&gt;object network obj_sip-101.164.50.50&lt;BR /&gt;nat (inside,outside) static 88.55.164.10&lt;BR /&gt;object network obj_sip_1-101.164.50.25&lt;BR /&gt;nat (inside,outside) static 88.55.164.11&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:24:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552748#M236958</guid>
      <dc:creator>syedhashmi455</dc:creator>
      <dc:date>2019-03-12T04:24:38Z</dc:date>
    </item>
    <item>
      <title>Folks, please help me in</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552749#M236959</link>
      <description>&lt;P&gt;Folks, please help me in sorting this out as I need to settle this down today&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 12:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552749#M236959</guid>
      <dc:creator>syedhashmi455</dc:creator>
      <dc:date>2014-07-01T12:03:50Z</dc:date>
    </item>
    <item>
      <title>When you are saying that you</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552750#M236960</link>
      <description>&lt;P&gt;When you are saying that you can not ping the public IP through the ASA, which IP are you trying to ping?&lt;/P&gt;&lt;P&gt;Are you able to ping the internet from any of those two servers (50.50 and 50.25)?&lt;/P&gt;&lt;P&gt;could you issue the following packet tracer on the ASA:&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 101.164.50.25 12345 4.2.2.2 5060 detail&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 101.164.50.50 12345 4.2.2.2 5060 detail&lt;/P&gt;&lt;P&gt;Could you please post the full ASA configuration (sanitised)? I feel it is easier to troubleshoot when seeing the whole picture.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 12:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552750#M236960</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T12:38:30Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Please check the</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552751#M236961</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Please check the ASA config attached.&lt;/P&gt;&lt;P&gt;Also check the topology attached. I am trying to acheive the nat mentioned in the topology.&lt;/P&gt;&lt;P&gt;I am not able to launch the application if the user is connected from outside.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ahmed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 12:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552751#M236961</guid>
      <dc:creator>syedhashmi455</dc:creator>
      <dc:date>2014-07-01T12:56:55Z</dc:date>
    </item>
    <item>
      <title>At first glance you do not</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552752#M236962</link>
      <description>&lt;P&gt;At first glance you do not have any ACLs applied that allow access from the outside in.&amp;nbsp; You would need to add the following commands:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit ip host 88.55.164.10 any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit ip any host 88.55.164.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any host 101.164.50.25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip any host 101.164.50.50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that you will now be allowing all traffic in to those hosts.&amp;nbsp; If possible it would be best to identify the exact ports that you need to have opened and only open for those ports.&lt;/P&gt;&lt;P&gt;Add these commands and then test.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 13:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552752#M236962</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T13:05:10Z</dc:date>
    </item>
    <item>
      <title>bingo, thank you so much.</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552753#M236963</link>
      <description>&lt;P&gt;bingo, thank you so much. resolved&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 13:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552753#M236963</guid>
      <dc:creator>syedhashmi455</dc:creator>
      <dc:date>2014-07-01T13:23:38Z</dc:date>
    </item>
    <item>
      <title>Thank you for the rating ☺</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552754#M236964</link>
      <description>Thank you for the rating ☺</description>
      <pubDate>Tue, 01 Jul 2014 13:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/2552754#M236964</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T13:28:21Z</dc:date>
    </item>
  </channel>
</rss>

