<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: install transparent asa into existing network with public ip in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408765#M309790</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What address where you trying to reach??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Nov 2013 19:20:05 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-07T19:20:05Z</dc:date>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408746#M309763</link>
      <description>&lt;P&gt;&amp;nbsp; Hi all, I'm trying to find the best approach on getting my ASA to replace our Juniper, we have public ip's from our isp and it's set to nat the gateway and mip the inside ip's to outside public ip's.&lt;/P&gt;&lt;P&gt;&amp;nbsp; I tried hooking up the asa into the leased router, added my inside rules to be accessed outside but not able to get to the web or ping, I read that nat is not needed on the ASA in transparent mode though it's possible, but in my setup with our isp I may need to use nat or could I go away with it, what would be my best option to get this setup, any samples or links would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Carlo&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408746#M309763</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2019-03-12T02:59:21Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408747#M309765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you using on the ASA?&lt;/P&gt;&lt;P&gt;Do you know how transparent firewall works?&lt;/P&gt;&lt;P&gt;What is the function that the juniper takes in your network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI: It would be best to address this wih a design team&lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 02:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408747#M309765</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T02:36:28Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408748#M309766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you using on the ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; It's got asa 9.1 &lt;/P&gt;&lt;P&gt;Do you know how transparent firewall works?&lt;/P&gt;&lt;P&gt;Yes but I'm pretty novice at networking since I take on a few things besides networking at my work, I set it up about 5yrs ago and kinda out of practice now, the difference with this and juniper, the juniper's trust and untrust int has different ip's, the untrust has our public ip and trust has internal and nat'd, where the asa has one ip for the inside and outside, but the same bump in the wire right.&lt;/P&gt;&lt;P&gt;What is the function that the juniper takes in your network?&lt;/P&gt;&lt;P&gt;&amp;nbsp; The Juniper ns25 is in transparent mode(interestingly I looked at the juniper's trust and untrust it shows it's a layer3 as where from what I read about the asa in transparent mode is a layer2)&lt;/P&gt;&lt;P&gt;&amp;nbsp; I found this article here that could be similar to my scenario and I need to read up on it, I think nat needs to be setup similar to the juniper over to the asa to map the outside public ip to internal ip of our gateway, there was a converter I found here but it wouldn't take my juniper config, worst comes to worst I'll open a tac ticket to see if they can convert the juniper to asa, I'm just avoiding having to redo my internal ip's - &lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-31116" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 20:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408748#M309766</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-03T20:10:03Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408749#M309768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually read the next:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/nat_overview.html#wp1107431"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/nat_overview.html#wp1107431&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Nov 2013 20:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408749#M309768</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-03T20:54:22Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408750#M309769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;FYI: TAC does not have a tool to convert from Juniper firewall to Cisco ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2013 20:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408750#M309769</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-04T20:43:26Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408751#M309771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the link and Tac info, I'm reading up on the transparent nat setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2013 21:17:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408751#M309771</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-04T21:17:30Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408752#M309772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi, so I read the docs, now my question, on our old firewall the gateway we used was the one set on the nat'd trust int, and the public ip gateway of the router is untrust, so on the asa I just create a static nat for the public gateway nat'd to an internal ip that can be used as the gateway -&lt;/P&gt;&lt;P&gt;nat (inside,outside) static mygateway, then we could still use the old gateway we always had right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408752#M309772</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-05T00:19:42Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408753#M309774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure about your last question but let's give it a try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the firewall going to run on transparent or Routed mode?&lt;/P&gt;&lt;P&gt;If it's on transparent then you will need to assign an IP address to the ASA for management purposes but the IP subnet between the inside users and the untrust gateway should be the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said if you want the ASA to run on L3 mode (splitting the broadcast-domain) then you just need to set a default route on the ASA poiting to the untrust gateway (Outside Modem) and on the inside PCs the ASA as the default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408753#M309774</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-05T00:33:10Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408754#M309775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry I did not get the concept, maybe if you could explain this a bit better.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408754#M309775</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-05T00:33:48Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408755#M309777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio thanks for replying, the asa5510 is already set for transparent mode, with management int set, I had it set in a lab for testing, but its when I tested on the actual connection from isp, it wasn't allowing ping or web, so I may just need to add a route, I thought I read somewhere that transparent mode doesn't support routing, I'll give it a try, thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408755#M309777</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-05T00:41:56Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408756#M309779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does need a route for special Purposes (Managment, Syslog, AAA, To know where to forward packets where it does not have a valid MAC address entry)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So add it pointing to the Outside gateway (Remember inside and outside interface must be on the same subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408756#M309779</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-05T00:50:50Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408757#M309781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jumora, here's a sample setup -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;old firewall (untrust = 12.1.1.1) ip of leased router (this was the outside ip gateway I think I can't see in the router since it's not managed by us, but it's nat'd to our internal gateway ip) &amp;gt;(trust = 101.2.2.2) this is our internal gateway ip&lt;/P&gt;&lt;P&gt;that's the current setting in the juniper&lt;/P&gt;&lt;P&gt;so on the asa, the new config for nat would be&lt;/P&gt;&lt;P&gt;nat (inside,outside) static mygateway - then we can still use 101.2.2.2 as gateway, I think this is what I'm missing to get an open connection to the outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408757#M309781</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-05T00:51:01Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408758#M309782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio, yes the inside and outside are in a bvi group with internal ip and same subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408758#M309782</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-05T00:53:57Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408759#M309784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio I think your right on the route setting, it's been a while since I configured the juniper, I looked at the juniper route setting, the outside ip routes to our internal network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 01:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408759#M309784</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-05T01:03:42Z</dc:date>
    </item>
    <item>
      <title>install transparent asa into existing network with public ip's</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408760#M309785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I get you, yeah NAT, go for it so that the upstream router can add it to the ARP table. Also add the routes that Julio mentioned for routing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 01:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408760#M309785</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-05T01:27:22Z</dc:date>
    </item>
    <item>
      <title>Re: install transparent asa into existing network with public ip</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408761#M309786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys, so I went and put my route to outside pointing to my isp's router gateway as well as nat, but somehow I can't ping, here's my edited run-config. Let me know what I'm missing, thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 17:36:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408761#M309786</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-06T17:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: install transparent asa into existing network with public ip</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408762#M309787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Give me logs I need to see logs to see what is the ASA indicating.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 18:37:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408762#M309787</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-06T18:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: install transparent asa into existing network with public ip</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408763#M309788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here's my sh logging output, can't get the whole log to show in putty, but these are focused on the bvi int, it seems to show a bunch of errors or teardowns that I also see when looking at asdm latest syslog message. I added a simple network topology diagram. Any help would be great&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Nov 2013 19:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408763#M309788</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-06T19:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: install transparent asa into existing network with public ip</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408764#M309789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; We're you able to look into my logs, is there any other way to see what's happening in the traffic inside the asa besides logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 17:04:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408764#M309789</guid>
      <dc:creator>Carlomd</dc:creator>
      <dc:date>2013-11-07T17:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: install transparent asa into existing network with public ip</title>
      <link>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408765#M309790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What address where you trying to reach??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Nov 2013 19:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/install-transparent-asa-into-existing-network-with-public-ip-s/m-p/2408765#M309790</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-07T19:20:05Z</dc:date>
    </item>
  </channel>
</rss>

