<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Sameer,I am bit confused in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482464#M267530</link>
    <description>&lt;P&gt;Hi Sameer,&lt;/P&gt;&lt;P&gt;I am bit confused here.... if you have the inetrnet router connected to the fw you can use the public IP's on outside interface right.... or you have the private LAN in between internet and fw segment.... because case to case it differs...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you said some are working... are they configured in the same manner which is working???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
    <pubDate>Wed, 16 Apr 2014 10:18:38 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2014-04-16T10:18:38Z</dc:date>
    <item>
      <title>Static NAT on ASA 5520-version 9.1(2)</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482457#M267518</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Hi All ,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;I have an issue with static NAT on ASA 5520 Version 9.1(2) firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Configuration as below&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;description outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;nameif OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip address 10.x.x.x 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;!interface GigabitEthernet0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;description dmz1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;nameif dmz1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;security-level 50&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;ip address 10.10.10.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;nat configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;object network obj-10.10.10.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;host 10.10.10.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;nat (dmz1,OUTSIDE) static obj-213.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ACL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list OUTSIDE_access_in line 1 extended permit tcp host 76.x.x.x host 10.10.10.2 eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list dmz1_access_in line 24 extended permit tcp host 10.10.10.2 host 76.x.x.x eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Packet-tracer output&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;asa# packet-tracer input outside tcp 76.x.x.x 22 213.x.x.x 22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype: static&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;object network obj-10.10.10.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;nat (dmz1,OUTSIDE) static obj-213.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;NAT divert to egress interface dmz1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Untranslate 213.x.x.x/22 to 10.10.10.2/22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list OUTSIDE_access_in extended permit ip host 76.x.x.x host 10.10.10.2 eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype: per-session&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: IDS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;class-map IPS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;match any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;class IPS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp; ips inline fail-open&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 6&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype: ipsec-tunnel-flow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;object network obj-10.10.10.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;nat (dmz1,OUTSIDE) static obj-213.x.x.x&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype: per-session&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Phase: 9&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Phase: 10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Type: FLOW-CREATION&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;New flow created with id 20646801, packet dispatched to next module&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;input-interface: OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;output-interface: dmz1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;output-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Action: allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;&amp;nbsp;acl output&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;access-list OUTSIDE_access_in line 27 extended permit tcp host 76.x.x.x eq ssh host 10.10.10.2 eq ssh (hitcnt=0) 0x933a0526&lt;BR /&gt;But I tried to telnet 213.x.x.x &amp;nbsp;22 , &amp;nbsp;but no luck .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;I would appreciate help on this matter .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482457#M267518</guid>
      <dc:creator>msameerkn</dc:creator>
      <dc:date>2019-03-12T04:04:47Z</dc:date>
    </item>
    <item>
      <title>It looks like the other post</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482458#M267520</link>
      <description>&lt;P&gt;It looks like the other post we were working on got deleted or something. You mentioned you see no access-list hits for OUTSIDE_access_in. &amp;nbsp;&lt;/P&gt;&lt;P&gt;I noticed your outside interface is on a 10.x.x.x IP range yet your public IP is 213.x.x.x. &amp;nbsp;Is it possible that your ISP's device is not in bridged mode to allow the public assigned IP range through to your firewall? &amp;nbsp;I would start there...&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 14:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482458#M267520</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-04-15T14:02:40Z</dc:date>
    </item>
    <item>
      <title>sorry for that , moved to</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482459#M267523</link>
      <description>&lt;P&gt;sorry for that , moved to firewall section &amp;nbsp;, ISP device is bridged mode , other public ip address are working fine , &amp;nbsp;checked with ISP and confirmed that &amp;nbsp;directly routed to our firewall &amp;nbsp;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;while we are checking the packet trace all status are allow and up .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 14:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482459#M267523</guid>
      <dc:creator>msameerkn</dc:creator>
      <dc:date>2014-04-15T14:14:52Z</dc:date>
    </item>
    <item>
      <title>Try modifying the ACE in your</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482460#M267525</link>
      <description>&lt;P&gt;Try modifying the ACE in your ACL. &amp;nbsp;It is very unlikely that the source port of your public IP trying to SSH is 22.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;instead of:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list OUTSIDE_access_in line 27 extended permit tcp host 76.x.x.x eq ssh host 10.10.10.2 eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;try:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list OUTSIDE_access_in line 27 extended permit tcp host 76.x.x.x host 10.10.10.2 eq ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Also confirm the source IP 76.x.x.x is correct when performing your test.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 14:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482460#M267525</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2014-04-15T14:20:05Z</dc:date>
    </item>
    <item>
      <title>modified the access- list</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482461#M267527</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;modified the access- list with any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;access-list OUTSIDE_access_in line 27 extended permit ip host 76.x.x.x any4 .. but no luck&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 9pt; font-family: Arial, sans-serif; background-position: initial initial; background-repeat: initial initial;"&gt;I have doubts there are lots of existing Nat rules , it will make any issue ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 14:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482461#M267527</guid>
      <dc:creator>msameerkn</dc:creator>
      <dc:date>2014-04-15T14:24:49Z</dc:date>
    </item>
    <item>
      <title>Hi Sameer, Hope you are</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482462#M267528</link>
      <description>&lt;P&gt;Hi Sameer,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope you are trying to access from outside ( Internet )&amp;nbsp;to a server in DMZ right???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is the outside interface is connecetd to a public network directly???? bcoz i see some 10.x.x.x mentioned there????&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 14:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482462#M267528</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-04-15T14:31:07Z</dc:date>
    </item>
    <item>
      <title>Hi Karthik , you're right ,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482463#M267529</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Hi Karthik ,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;you're right , &amp;nbsp;trying to accessing from outside ,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;ISP provided the private ip address to connect their device , we have 30 Public ip address , some of them used and working .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 15:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482463#M267529</guid>
      <dc:creator>msameerkn</dc:creator>
      <dc:date>2014-04-15T15:12:26Z</dc:date>
    </item>
    <item>
      <title>Hi Sameer,I am bit confused</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482464#M267530</link>
      <description>&lt;P&gt;Hi Sameer,&lt;/P&gt;&lt;P&gt;I am bit confused here.... if you have the inetrnet router connected to the fw you can use the public IP's on outside interface right.... or you have the private LAN in between internet and fw segment.... because case to case it differs...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you said some are working... are they configured in the same manner which is working???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 10:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482464#M267530</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-04-16T10:18:38Z</dc:date>
    </item>
    <item>
      <title>John , It seems issue on ISP</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482465#M267531</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;John , It seems issue on ISP , used another public ip address and working fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;.Karthik , this&amp;nbsp;data center&amp;nbsp;belongs to the ISP and they provided the private IP address to configure on the outside .&amp;nbsp;&amp;nbsp;sorry I have no more information to explain ,don’t have access to ISP device .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px;"&gt;Thanks for all your support .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 18:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-5520-version-9-1-2/m-p/2482465#M267531</guid>
      <dc:creator>msameerkn</dc:creator>
      <dc:date>2014-04-16T18:38:31Z</dc:date>
    </item>
  </channel>
</rss>

