<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CISCO ASA 5510 - Configuring with a range of public IP Addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421085#M307801</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option 1 is not possible with the ASA in the above way specifically as you cant really have 2 default routes active at the same time. And as ASA has no concept of &lt;STRONG&gt;"secondary"&lt;/STRONG&gt; address under its interface that means the secondary subnet is only present in the NAT configurations of the device and the ASA would use Proxy ARP to make sure that there is connectivity from the WAN to these IP addresses even though they are not configured on any interface of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess Option 2 is the simplest solution. The ISP would simply forward all traffic regarding the new subnet to the ASAs current WAN interface IP address and ASA would match the destination IP address to an existing NAT you have from the new subnet. Traffic would be forwarded back to the ISP using the current default route on the ASA. No additional default route needs to be added. There would be no need for ARP/Proxy ARP between the ISP gateway and ASA for this new subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear you got it working though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question and rate helpfull answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Dec 2013 12:55:02 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-12-13T12:55:02Z</dc:date>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421063#M307761</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently have an ASA 5510 firewall which is configured with 1x usable public IP address, which has a different default gateway/subnet to the below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to keep the above and I also need to configure the firewall with the below range:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP Range: 81.121.211.192/29&lt;/P&gt;&lt;P&gt;Subnet: 255.255.255.248&lt;/P&gt;&lt;P&gt;Gateway: 81.121.211.193 - Please use this as your default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your use: 81.121.211.194 - 81.121.211.198 (inclusive)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you advise how this should be configured on the ASDM?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421063#M307761</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2019-03-12T03:12:49Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421064#M307766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You wont have to add this configuration on your ASA other than to configure the NAT configurations that use these IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISP should route this network towards your current public IP address configured on your external ASA interface. Or if they dont route the network towards your ASA then they need to configure the new public subnet as a &lt;STRONG&gt;"secondary" &lt;/STRONG&gt;address range on their gateway interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are running a newer ASA software and the ISP configures the new subnet on their gateway interface towards your ASA then you will need to add this configuration command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;arp permit-nonconnected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In either case, you wont need to&amp;nbsp; configure the IP address on any ASA interface or configure any additional routes on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Dec 2013 16:53:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421064#M307766</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-04T16:53:44Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421065#M307771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for this;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Couple of questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ISP sent me this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;I will be allocating your additional range shortly, could you please advise how you would like this to be configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(1) As a secondary range with it's own default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(2) Use an IP from your current range which is live on your network (88.121.23.246). We will then configure a route for your new range with this IP as the next-hop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;88.121.23.246 is our current public address. What's the best way to have it setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 09:55:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421065#M307771</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-05T09:55:15Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421066#M307773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an ASA firewall facing the ISP and the ISP has stated that they route the new public network towards your current external interface IP address then you wont need any ARP or interface/route related configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can just start configuring NAT with the new public IP addresses and start using them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have doubts do a Static NAT for a test host on the internal network using a new public IP address and test connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 10:00:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421066#M307773</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T10:00:32Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421067#M307775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for your fast reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have noticed that the ISP as put in place (1) As a secondary range with it's own default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what is the better option to go for? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 10:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421067#M307775</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-05T10:59:21Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421068#M307778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which ever way the ISP does the configuration on their end it should be enough for you to start configuring NAT using the new public IP address space.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF the ISP has NOT routed the network towards your current external IP address of the ASA then if you have a newer ASA software you have to add the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;arp permit-nonconnected&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still don't know what software you are using on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried configuring a test host with the new public IP address and testing if it works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 12:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421068#M307778</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T12:31:22Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421069#M307781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is ASA 8.2(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASDM 6.4(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISP has NOT routed it towards the existing. I am using the ASDM, can you provide instructions as to how this should be configured?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 17:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421069#M307781</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-05T17:02:49Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421070#M307783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would seem to me that you just start configuring NAT with the new public subnet just like you have done so far for the existing public subnet you are using already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should NOT need any extra configurations, just start configuring NAT using those IP address as needed and test connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 17:16:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421070#M307783</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T17:16:01Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421071#M307784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for slow reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to get this configured, &lt;/P&gt;&lt;P&gt;Do I need to configure a new interface on my asa5510 since my ISP is NOT routing towards my existing public ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only have 2 available WAN ports on the asa5510, but 5 usuable public ip addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your use: 81.121.211.194 - 81.121.211.198 (inclusive)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP Range: 81.121.211.192/29&lt;/P&gt;&lt;P&gt;Subnet: 255.255.255.248&lt;/P&gt;&lt;P&gt;Gateway: 81.121.211.193 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 14:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421071#M307784</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-11T14:10:47Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421072#M307785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should not need any new interface or route configurations on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume that you have gotten the public IP address range to be used as NAT IP address on the ASA? If so then you should be able to configure them on the ASA if the ISP has configured their portion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I suggest before, I would put some test laptop on the LAN network and configure NAT for it using the new public IP address range and testing connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 14:14:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421072#M307785</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-11T14:14:48Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421073#M307786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; "I assume that you have gotten the public IP address range to be used as NAT IP address on the ASA?"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I do this? Ask my ISP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 14:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421073#M307786</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-11T14:24:51Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421074#M307787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont have to ask the ISP for anything if they have already configured their part. You have mentioned that they have configured the new public subnet on their end as a "secondary" network? If this is true then it should be usable at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again I would suggest that you configure Static NAT using one of the new public IP address for some test host on the LAN and actually test traffic.Configuring NAT with the original public IP address space you had and this new one isnt in any way different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 14:29:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421074#M307787</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-11T14:29:09Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421075#M307788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internally I can telnet to 192.168.1.221 on 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I am not able to telnet to 81.121.211.194 externally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/8/1/7/170718-nat.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have added the above nat rule, anything I need to do?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 17:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421075#M307788</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-11T17:03:02Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421076#M307789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would have to add an&lt;STRONG&gt; "access-list"&lt;/STRONG&gt; rule on the external interfaces ACL to allow traffic to this host that has the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you have configured Static PAT (Port Forward) for port TCP/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 17:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421076#M307789</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-11T17:12:50Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421077#M307790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I want to forward public traffic for 443 to 81.121.221.194 which Nats to 192.168.1.221&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the ASDM, do I just need to add an access rule?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 17:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421077#M307790</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-11T17:18:09Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421078#M307791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/2/7/170725-AccessRule.jpg" class="jive-image" /&gt;like this? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2013 17:22:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421078#M307791</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-11T17:22:26Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421079#M307793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Any further thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421079#M307793</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-12T09:13:07Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421080#M307795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the IP address correct? You talk about x.x.211.x and x.x.221.x IP addresses in the above posts. Check which one is the correct public IP address and use it in the NAT and ACL configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that you can try the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 12345 &lt;PUBLIC nat="" ip=""&gt; 443&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post the output of the above command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should tell us if there is any problem with the ASA configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:16:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421080#M307795</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-12T09:16:49Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421081#M307797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Public ip is correct 81.121.211.194 and lan ip is 192.168.1.221 is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thanks for the command, I ran it, see results below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/4/8/170844-Example.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Dec 2013 11:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421081#M307797</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-12T11:20:59Z</dc:date>
    </item>
    <item>
      <title>CISCO ASA 5510 - Configuring with a range of public IP Addresses</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421082#M307798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesnt show the whole output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you copy/paste the output that is shown in the Response -window.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tested connection from the Internet towards this public IP address and have you chekced what happens to the connections? Have you checked that the ACLs hit counter increases as you attempt the connection from the Internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Dec 2013 11:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-configuring-with-a-range-of-public-ip-addresses/m-p/2421082#M307798</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-12T11:30:50Z</dc:date>
    </item>
  </channel>
</rss>

