<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Assigning multiple Public IP's to ASA 5512-X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897659#M28072</link>
    <description>&lt;P&gt;Echo reply would not work as a synthetic packet as is used by packet-tracer since there is no record of the echo request having been in through the device.&lt;/P&gt;
&lt;P&gt;Again, I highly recommend to use tcp as a test through the firewall and in a way that matches real world traffic flows.&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jul 2019 14:56:51 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2019-07-25T14:56:51Z</dc:date>
    <item>
      <title>Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894143#M28049</link>
      <description>&lt;P&gt;Hi ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been provided with 5 usable ip's x.x.x.x/29 from the ISP&lt;/P&gt;&lt;P&gt;I need to assign 5 public ips to my ASA using VLANS&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do i go about configuring the outside interface?&lt;/P&gt;&lt;P&gt;Currently WAN connection goes to int 0/0 and I have assigned that an IP address provided -81.209.115.101 I would like to assign the second IP on 0/0.200 another available ip -81.209.115.102&lt;/P&gt;&lt;P&gt;Inside network is not yet ready -- but assume there is one ( how would the NAT /ACL's be done in this situation)&lt;/P&gt;&lt;P&gt;Please can someone advice me on this configuration...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks:)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 17:02:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894143#M28049</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-20T17:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894150#M28050</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well the whole post is a little unclear, for me at least.&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the very begginig you said you need to assign 5 &lt;STRONG&gt;public ips &lt;/STRONG&gt;to one interface.&lt;/P&gt;&lt;P&gt;After that you talking about to sub interface assiging 10.20.30.200 ip which is &lt;STRONG&gt;private IP.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;It matter becuse configuration will differ if your ISP want you to do encapsulation on the WAN interface or not.&lt;/P&gt;&lt;P&gt;Also do you want to make one vlan = 1 public ip or all vlans using pool of all avaiable IPs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 16:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894150#M28050</guid>
      <dc:creator>kubn2</dc:creator>
      <dc:date>2019-07-20T16:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894162#M28051</link>
      <description>&lt;P&gt;Hi Sorry&amp;nbsp; i cannot post any configs yet as not much has been done.. I have updated the IP address .. its a public one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So yes I need for eg:&amp;nbsp; vlan1 - with 1 public ip , vlan2 with the another public ip and so on ..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the outside interface where the WAN line comes in, how would that be configured and from there how can I assign available public ips to different vlans..&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your inputs and help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 17:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894162#M28051</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-20T17:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894177#M28052</link>
      <description>&lt;P&gt;For one interface on ASA you can assign only one ip address. So from the pool of 5 addresses assign one to WAN interface.&lt;/P&gt;&lt;P&gt;I don't have ASA avaiable now but configuration can look like this:&lt;/P&gt;&lt;P&gt;create access list called for example: "&lt;STRONG&gt;V10&lt;/STRONG&gt;" and permit in this acl whole Vlan 10 subnet so for example 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;after that create nat (inside) &lt;U&gt;10&lt;/U&gt; access-list &lt;STRONG&gt;V10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;after that global (outside) &lt;U&gt;10&lt;/U&gt;&amp;nbsp;81.209.115.102.&lt;/P&gt;&lt;P&gt;So now all traffic from Vlan 10 which is 10.10.10.0/24 should use public ip of&amp;nbsp;81.209.115.102.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now you just repat this for each subnet but do not reuse &lt;STRONG&gt;V10&lt;/STRONG&gt; or &lt;U&gt;10&lt;/U&gt; number because it will messup.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 18:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894177#M28052</guid>
      <dc:creator>kubn2</dc:creator>
      <dc:date>2019-07-20T18:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894283#M28053</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/880990"&gt;@kubn2&lt;/a&gt;&amp;nbsp;your post cites the old (pre-8.3) NAT syntax.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/855445"&gt;@machine23&lt;/a&gt;&amp;nbsp;you should use object NAT. Create an object for each internal VLAN/subnet and then an associated NAT rule telling the ASA that any traffic from a given source subnet gets translated to a specified public IP.&lt;/P&gt;
&lt;P&gt;The easiest setup (and most common) is to have your five internal subnets on 5 different VLANs on a L3 switch. The gateway for each subnet is an SVI on the switch. The switch has a sixth subnet that connects it to the ASA and the ASA inside address is the default route for the switch.&lt;/P&gt;
&lt;P&gt;Say your internal subnets are 192.168.1.0/24 through 192.168.5.0/24. ASA interfaces are named inside and outside.&lt;/P&gt;
&lt;PRE&gt;object network vlan2_public
&amp;nbsp;host 81.209.115.102
object network vlan2
 subnet 192.168.2.0 255.255.255.0
 nat (inside,outside) static vlan2_public&lt;/PRE&gt;
&lt;P&gt;..and so forth for VLANS 3-5.&lt;/P&gt;
&lt;P&gt;Since you want to use the existing outside interface address for one VLAN (say VLAN 1), it uses a slightly different configuration and can be done as follows:&lt;/P&gt;
&lt;PRE&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/PRE&gt;
&lt;P&gt;That will also handle any other internal subnets you might add in the future.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 11:51:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894283#M28053</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-21T11:51:46Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894303#M28054</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/880990"&gt;@kubn2&lt;/a&gt;&amp;nbsp;- thanks for your input&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; My internal subnet plans are exactly like what you have specified.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Makes more sense now.&amp;nbsp; Only confusion is how would I configure my outside interfaces - this is how i would have it please let me know if this is the right way or not..&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif Inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;description STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 81.209.115.101 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.102&lt;BR /&gt;vlan 102&lt;BR /&gt;nameif TEST1&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 81.209.115.102 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.103&lt;BR /&gt;vlan TEST2&lt;BR /&gt;nameif TEST2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 81.209.115.103 255.255.255.224&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 08:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894303#M28054</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-21T08:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894332#M28055</link>
      <description>&lt;P&gt;You don't give the outside secondary or subinterface configurations. Just the single interface IP is assigned under config-if.&lt;/P&gt;
&lt;P&gt;The other NAT addresses are automatically assigned to the outside based on the facts that:&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;a. the nat statements say (inside,&lt;STRONG&gt;outside)&lt;/STRONG&gt; and&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;b. the assigned addresses are ones that would normally use the outside interface for egress - either because they're part of a connected network (which they are) or are reachable via the ASA's routing table.&lt;/P&gt;
&lt;P&gt;If/when you use subinterfaces is when the connection from the ASA is a trunk (802.1q). We almost never see that on an ASA outside interface. Sometimes I've seen people use it on the inside when they want the ASA to be the gateway for multiple subnets and don't want to use multiple physical interfaces for that.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 11:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3894332#M28055</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-21T11:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3895972#M28056</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/880990"&gt;@kubn2&lt;/a&gt;&amp;nbsp; Thank you for the reply .. I will be more specific in what needs to achieved , as now i have started to configure.&lt;/P&gt;&lt;P&gt;So if we can just look at the GUEST network and make that work I can then replicate to the others aka BLACK,WHITE,BROWN&lt;/P&gt;&lt;P&gt;I have a 24 Port&amp;nbsp; layer 3 Switch with VLANS Similar to the ASA interfaces VLAN..with IP addresses set accordingly - Im guessing i do not need to trunk ? it should just work as the ASA is configured native vlan.&lt;/P&gt;&lt;P&gt;An Example of my requirement which will make more sense :-&lt;/P&gt;&lt;P&gt;1- I plug in a machine on a port on the Switch on the GUEST VLAN ( a link from the GUEST VLAN is going to interface 0/5 on the ASA also on the same VLAN)&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- I want that machine to get DHCP from the ASA&amp;nbsp;&lt;/P&gt;&lt;P&gt;3- It has to have the public IP as per config below (GUESTWAN-8.161.119.237)&lt;/P&gt;&lt;P&gt;Is my connection from the Switch to the ASA right?&lt;/P&gt;&lt;P&gt;Then comes NAT/ACL's where I need help &lt;span class="lia-unicode-emoji" title=":face_with_open_mouth:"&gt;😮&lt;/span&gt; I sincerely appreciate any help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&lt;BR /&gt;!&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 8.161.119.133 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif BLACK&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.50.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.90&lt;BR /&gt;vlan 90&lt;BR /&gt;nameif WHITE&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.90.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3.70&lt;BR /&gt;vlan 70&lt;BR /&gt;nameif BROWN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.70.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;description Guest network&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5.80&lt;BR /&gt;vlan 80&lt;BR /&gt;nameif GUEST&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.80.254 255.255.254.0&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif managment&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.100.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name wifi.local&lt;BR /&gt;object network BLACKWAN&lt;BR /&gt;host 8.161.119.234&lt;BR /&gt;description BLACK&lt;BR /&gt;object network WHITEWAN&lt;BR /&gt;host 8.161.119.235&lt;BR /&gt;description WHITE&lt;BR /&gt;object network BROWNWAN&lt;BR /&gt;host 8.161.119.236&lt;BR /&gt;description BROWN&lt;BR /&gt;object network GUESTWAN&lt;BR /&gt;host 8.161.119.237&lt;BR /&gt;description Guest&lt;BR /&gt;object network GUEST-Inside&lt;BR /&gt;subnet 192.168.80.0 255.255.254.0&lt;BR /&gt;object network BLACK-Inside&lt;BR /&gt;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;object network WHITE-Inside&lt;BR /&gt;subnet 192.168.90.0 255.255.255.0&lt;BR /&gt;object network BROWN-Inside&lt;BR /&gt;subnet 192.168.70.0 255.255.255.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list Outside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any object GUEST-Inside&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network GUEST-Inside&lt;BR /&gt;nat (GUEST,Outside) static GUESTWAN&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.80.3-192.168.80.243 GUEST&lt;BR /&gt;dhcpd enable GUEST&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly 6&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly 6&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:cbb2fa37e5ae6946462449f62baa195a&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 19:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3895972#M28056</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-23T19:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896336#M28057</link>
      <description>&lt;P&gt;Your proposed configuration has trunking configured. That's only necessary if you need to transport multiple logical VLANs with their associated IP traffic on the same physical interface.&lt;/P&gt;
&lt;P&gt;So get rid of that and do something like this:&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet0/5
description Guest network
nameif GUEST
security-level 100
ip address 192.168.80.254 255.255.254.0&lt;/PRE&gt;
&lt;P&gt;Then cable one physical switch port to each ASA physical interface that's in use for your internal VLANs / subnets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your outside interface (&lt;SPAN&gt;8.161.119.133 255.255.255.248&lt;/SPAN&gt;) is not in the same subnet as the assigned static NAT addresses. That's OK as long as your provider knows to expect those addresses and will route traffic to them back to your ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your NAT rules should look something like this:&lt;/P&gt;
&lt;PRE&gt;object network GUEST-Inside
  subnet 192.168.80.0 255.255.254.0
  nat (GUEST,outside) dynamic GUESTWAN&lt;/PRE&gt;
&lt;P&gt;They are "Dynamic PAT with AutoNAT. You can see a comprehensive description of the various types with configuration examples here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.practicalnetworking.net/stand-alone/cisco-asa-nat/#dynamicpat" target="_blank" rel="noopener"&gt;https://www.practicalnetworking.net/stand-alone/cisco-asa-nat/#dynamicpat&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why do you want to allow all traffic from the Internet inbound to your Guest subnet? That's not advisable. Return traffic for sessions initiated internally will automatically be allowed since the ASA is a stateful firewall and keeps track of TCP sessions and UDP flows.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 04:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896336#M28057</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-24T04:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896426#M28059</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; The connection between the ASA and SW worked great after getting rid the VLAN and following your advise.&lt;/P&gt;&lt;P&gt;According to ISP-&lt;/P&gt;&lt;P&gt;&lt;A href="https://protect-eu.mimecast.com/s/hBUECG5QNInWB1cK7MNW?domain=5.151.119.232" target="_blank" rel="noopener"&gt;8.161.119.232/29&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Default Gateway: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="https://protect-eu.mimecast.com/s/hBUECG5QNInWB1cK7MNW?domain=5.151.119.232" target="_blank" rel="noopener"&gt;8.161.119.238&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Usable IPs:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;A href="https://protect-eu.mimecast.com/s/hBUECG5QNInWB1cK7MNW?domain=5.151.119.232" target="_blank" rel="noopener"&gt;8.161.119&lt;/A&gt;.233-237&lt;/P&gt;&lt;P&gt;Subnet Mask:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="https://protect-eu.mimecast.com/s/8oqSCKZ5liK8D2t3OhVa?domain=255.255.255.248" target="_blank" rel="noopener"&gt;255.255.255.248&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I have NAT'ed as per your advise and no joy - *PACKET TRACER - Nat-xlate-failed&lt;/P&gt;&lt;P&gt;From the ASA-Outside int I can ping the gateway(.238) and .233 address .. nothing else.&lt;/P&gt;&lt;P&gt;I do not want traffic inbound I was just trying different settings.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 07:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896426#M28059</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-24T07:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896853#M28061</link>
      <description>&lt;P&gt;Your outside interface config says:&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet0/0
nameif Outside
security-level 0
ip address 8.161.119.133 255.255.255.248&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;Did you mean for it to be .233?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2019 16:32:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896853#M28061</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-24T16:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896956#M28062</link>
      <description>Hi sorry I meant it to be .233&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Jul 2019 18:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3896956#M28062</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-24T18:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897185#M28064</link>
      <description>&lt;P&gt;OK. So the IP was incorrect. Given that, what's the correct current configuration and what are you trying to packet-trace?&lt;/P&gt;
&lt;P&gt;What was failing to ping (source IP and location and destination address)?&lt;/P&gt;
&lt;P&gt;Ping through an ASA firewall does not work by default. You need to add icmp inspection. Ping is generally not a good test to use with firewalls since it is connectionless and stateless It may succeed while a stateful protocol like tcp fails due to asymmetric routing or other factors.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 02:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897185#M28064</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-25T02:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897363#M28066</link>
      <description>&lt;P&gt;Just tried - packet-tracer input Outside icmp 192.168.80.254 0 1 8.161.119.237 xml and got error:&lt;/P&gt;&lt;P&gt;nat-no-xlate-to-pat-pool) Conneciton PAT address without pre-existing xlate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&lt;/P&gt;&lt;P&gt;xlate per-session deny BLACKp any4 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny BLACKp any4 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny BLACKp any6 any4&lt;/P&gt;&lt;P&gt;xlate per-session deny BLACKp any6 any6&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any4 any6 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any4 eq domain&lt;/P&gt;&lt;P&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 8.161.119.233 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif BLACK&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.50.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif WHITE&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.90.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif BROWN&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.70.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif GUEST&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.80.254 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;management-only&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif managment&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.1000.100 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;&amp;nbsp;domain-name wifi.local&lt;/P&gt;&lt;P&gt;object network BLACKWAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 8.161.119.234&lt;/P&gt;&lt;P&gt;&amp;nbsp;description BLACK&lt;/P&gt;&lt;P&gt;object network WHITEWAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 8.161.119.235&lt;/P&gt;&lt;P&gt;&amp;nbsp;description WHITE&lt;/P&gt;&lt;P&gt;object network BROWNWAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 8.161.119.236&lt;/P&gt;&lt;P&gt;&amp;nbsp;description BROWN&lt;/P&gt;&lt;P&gt;object network GUESTWAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 8.161.119.237&lt;/P&gt;&lt;P&gt;&amp;nbsp;description Guest&lt;/P&gt;&lt;P&gt;object network GUEST-Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.80.0 255.255.254.0&lt;/P&gt;&lt;P&gt;object network BLACK-Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network WHITE-Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.90.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network BROWN-Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object BLACKp&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object icmp echo-reply&lt;/P&gt;&lt;P&gt;object-group icmp-type ICMP&lt;/P&gt;&lt;P&gt;&amp;nbsp;icmp-object echo-reply&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any object GUEST-Inside&lt;/P&gt;&lt;P&gt;access-list GUEST_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network GUEST-Inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (GUEST,Outside) dynamic GUESTWAN&lt;/P&gt;&lt;P&gt;access-group Outside_access_in in interface Outside&lt;/P&gt;&lt;P&gt;access-group GUEST_access_in in interface GUEST&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.80.2-192.168.80.253 GUEST&lt;/P&gt;&lt;P&gt;dhcpd enable GUEST&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 08:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897363#M28066</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-25T08:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897496#M28068</link>
      <description>&lt;P&gt;You should try:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input GUEST icmp 192.168.80.1 0 1 8.161.119.238 xml&lt;/PRE&gt;
&lt;P&gt;The input nameif should be where the source address would be expected to originate. It should also be a host - not the ASA interface address. We can never originate traffic from an ASA interface that has a different egress interface. The destination address should be something upstream of the ASA - next hop or something in the Internet for example. Putting in the NAT address will never result in a good reply since you cannot connect to or successfully ping your own public IP from your private IP.&lt;/P&gt;
&lt;P&gt;You didn't have icmp inspection on according to your initial config posted so I assume it's still not there. Without that, actual pings will never work (although packet-tracer would since it only analyzes the outbound traffic and doesn't verify return traffic).&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 11:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897496#M28068</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-25T11:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897567#M28070</link>
      <description>&lt;P&gt;Hi , I have enabled ICMP inspection I might have deleted the config line beofre posting it here..&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I Run this with echo-reply or information-request - its fails with the NAT error&lt;/P&gt;&lt;PRE&gt;packet-tracer input GUEST icmp 192.168.80.1 0 1 8.161.119.238 xml&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;When done with just echo everything shows a tick on the packet tracer..&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 12:54:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897567#M28070</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-25T12:54:38Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897659#M28072</link>
      <description>&lt;P&gt;Echo reply would not work as a synthetic packet as is used by packet-tracer since there is no record of the echo request having been in through the device.&lt;/P&gt;
&lt;P&gt;Again, I highly recommend to use tcp as a test through the firewall and in a way that matches real world traffic flows.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 14:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897659#M28072</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-25T14:56:51Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897668#M28074</link>
      <description>I shall try tcp too , so other than that are my settings right ?&lt;BR /&gt;</description>
      <pubDate>Thu, 25 Jul 2019 15:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897668#M28074</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-25T15:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897998#M28077</link>
      <description>&lt;P&gt;At a quick glance they appear correct otherwise.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jul 2019 03:20:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3897998#M28077</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-07-26T03:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Assigning multiple Public IP's to ASA 5512-X</title>
      <link>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3899105#M28078</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp; Thank you for you r continued help , I found out the issue and&amp;nbsp; what fixed it was I needed to put the nat after auto source dynamic and now traffic is flowing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 09:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/assigning-multiple-public-ip-s-to-asa-5512-x/m-p/3899105#M28078</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-07-29T09:02:32Z</dc:date>
    </item>
  </channel>
</rss>

