<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem with NAT in ASA5505 8.3(2) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206620#M347592</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your interface configurations using&lt;STRONG&gt; "show run interface"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood you correctly then there is a server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; that is initiating a connection to a server on &lt;STRONG&gt;"outside" &lt;/STRONG&gt;with the destination port TCP/10042? Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is true, then we dont really need all the NAT configurations you have done. A Dynamic PAT configuration might be all that is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you want to give an own address to the server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; then you would configure Static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the server on the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;needed to access the server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; then you might need Static NAT or Static PAT (Port Forward)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this firewall located inside some LAN network or is it at the edge of LAN and WAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets clear up these few things and then we can look at what is required to correct the situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Jun 2013 11:30:09 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-06-24T11:30:09Z</dc:date>
    <item>
      <title>Problem with NAT in ASA5505 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206619#M347591</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am using ASA5505 with version a 8.3(2) and having problem with the nat configuration.&lt;/P&gt;&lt;P&gt;inside ip - 192.168.1.1/255.255.255.0&lt;/P&gt;&lt;P&gt;outside ip - 10.127.225.10/255.255.255.0&lt;/P&gt;&lt;P&gt;we have TCP10042 as service port thru' which we are passing data from inside network to outside network.&lt;/P&gt;&lt;P&gt;We have Client_server as 10.127.226.21/24 &lt;/P&gt;&lt;P&gt;our DataServer as 192.168.1.3/ 24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we want to send the data from dataServer to Client server thru' port no. 10042.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We did following settings in the ASA thru' ASDM but facing problem that no any nating actually takes place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;Object network Client_Server &lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;host 10.127.226.21&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;Object network DataServer &lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;host 192.168.1.3&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;Object service TCP_10042 &lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;Service tcp source range 1 65535 destination eq 10042&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;Object network Firewall_Outside &lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;host 10.127.225.10&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;object network DataServer(192.168.1.3)&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;nat (inside, outside) static interface service tcp 10042 10042 &lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;object network Firewall_outside (10.l27.225.10)&lt;/P&gt;&lt;P&gt;nat (outside, inside) static DataServer(192.168.1.3) service tcp 10042 10042 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-list inside_access_in extended permit tcp any any&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-list outside_access_in extended permit tcp any any&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-list outside_access_in extended permit ip any any&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P style="margin: 0cm 0cm 0pt;"&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P style="position: absolute; width: 1px; height: 1px; overflow: hidden; left: -10000px;"&gt;﻿&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still we are getting problem for NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when we tried with Packet Transfer check point and found that "Access List - denied due to “Implicit rule”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help how we have to transfer data thru' Firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:02:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206619#M347591</guid>
      <dc:creator>darshan288shah</dc:creator>
      <dc:date>2019-03-12T02:02:00Z</dc:date>
    </item>
    <item>
      <title>Problem with NAT in ASA5505 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206620#M347592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your interface configurations using&lt;STRONG&gt; "show run interface"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood you correctly then there is a server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; that is initiating a connection to a server on &lt;STRONG&gt;"outside" &lt;/STRONG&gt;with the destination port TCP/10042? Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is true, then we dont really need all the NAT configurations you have done. A Dynamic PAT configuration might be all that is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you want to give an own address to the server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; then you would configure Static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the server on the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;needed to access the server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; then you might need Static NAT or Static PAT (Port Forward)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this firewall located inside some LAN network or is it at the edge of LAN and WAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets clear up these few things and then we can look at what is required to correct the situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 11:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206620#M347592</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-24T11:30:09Z</dc:date>
    </item>
    <item>
      <title>Problem with NAT in ASA5505 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206621#M347593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;Thank you for the prompt reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the details of the complete details of the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 12:54:21.049 IST Mon Jun 24 2013&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.127.225.10 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone IST 5 30&lt;/P&gt;&lt;P&gt;object network IP21_Server &lt;/P&gt;&lt;P&gt;host 10.127.226.21&lt;/P&gt;&lt;P&gt;description IP21_Server&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Tank_OPC_Server &lt;/P&gt;&lt;P&gt;host 192.168.1.2&lt;/P&gt;&lt;P&gt;description Tank_OPC_Server&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network CIMIO_TestPC &lt;/P&gt;&lt;P&gt;host 10.127.230.35&lt;/P&gt;&lt;P&gt;description CIMIO_TestPC&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object service TCP_10041 &lt;/P&gt;&lt;P&gt;service tcp source range 1 65535 destination eq 10041 &lt;/P&gt;&lt;P&gt;description TCP-10041&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object service TCP_10042 &lt;/P&gt;&lt;P&gt;service tcp source range 1 65535 destination eq 10042 &lt;/P&gt;&lt;P&gt;description TCP-10042&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object service TCP_135 &lt;/P&gt;&lt;P&gt;service tcp source range 1 65535 destination eq 135 &lt;/P&gt;&lt;P&gt;description TCP_135&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object service TCP_47625 &lt;/P&gt;&lt;P&gt;service tcp source range 1 65535 destination eq 47625 &lt;/P&gt;&lt;P&gt;description TCP-47625&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object service TCP_7777 &lt;/P&gt;&lt;P&gt;service tcp source range 1 65535 destination eq 7777 &lt;/P&gt;&lt;P&gt;description TCP_7777&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object service tcp_all &lt;/P&gt;&lt;P&gt;service tcp source range 1 65535 destination range 1024 65535 &lt;/P&gt;&lt;P&gt;description tcp-all&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Firewall_Outside &lt;/P&gt;&lt;P&gt;host 10.127.225.10&lt;/P&gt;&lt;P&gt;object service Ping &lt;/P&gt;&lt;P&gt;service icmp echo-reply&lt;/P&gt;&lt;P&gt;description Ping&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Rule_2 &lt;/P&gt;&lt;P&gt;subnet 10.127.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description Web Access &lt;/P&gt;&lt;P&gt;object network OPCIP &lt;/P&gt;&lt;P&gt;host 10.0.0.0&lt;/P&gt;&lt;P&gt;object-group network Firewall_Inside_Sys description Firewall_Inside_Sys&lt;/P&gt;&lt;P&gt;network-object object Tank_OPC_Server &lt;/P&gt;&lt;P&gt;object-group network Firewall_Outside_OPC_Sys&lt;/P&gt;&lt;P&gt;description Firewall_Outside_OPC_Sys &lt;/P&gt;&lt;P&gt;network-object object CIMIO_TestPC&lt;/P&gt;&lt;P&gt;network-object object IP21_Server &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt;port-object eq 49153&lt;/P&gt;&lt;P&gt;port-object eq 49154&lt;/P&gt;&lt;P&gt;port-object eq 49155&lt;/P&gt;&lt;P&gt;port-object eq 49156&lt;/P&gt;&lt;P&gt;port-object eq 49157&lt;/P&gt;&lt;P&gt;port-object eq 49158&lt;/P&gt;&lt;P&gt;port-object eq 49160&lt;/P&gt;&lt;P&gt;port-object eq 49161&lt;/P&gt;&lt;P&gt;port-object eq 49162&lt;/P&gt;&lt;P&gt;port-object eq 49163&lt;/P&gt;&lt;P&gt;port-object eq 49164&lt;/P&gt;&lt;P&gt;port-object eq 49165&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt;port-object eq 135&lt;/P&gt;&lt;P&gt;port-object eq 1433&lt;/P&gt;&lt;P&gt;port-object eq 3389&lt;/P&gt;&lt;P&gt;port-object eq 445&lt;/P&gt;&lt;P&gt;port-object eq 49152&lt;/P&gt;&lt;P&gt;port-object eq 49153&lt;/P&gt;&lt;P&gt;port-object eq 49154&lt;/P&gt;&lt;P&gt;port-object eq 49155&lt;/P&gt;&lt;P&gt;port-object eq 49156&lt;/P&gt;&lt;P&gt;port-object eq 49157&lt;/P&gt;&lt;P&gt;port-object eq 49158&lt;/P&gt;&lt;P&gt;port-object eq 49159&lt;/P&gt;&lt;P&gt;port-object eq 49160&lt;/P&gt;&lt;P&gt;port-object eq 49161&lt;/P&gt;&lt;P&gt;port-object eq 49162&lt;/P&gt;&lt;P&gt;port-object eq 5357&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_3 tcp&lt;/P&gt;&lt;P&gt;port-object eq 135&lt;/P&gt;&lt;P&gt;port-object eq 3389&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq lpd&lt;/P&gt;&lt;P&gt;port-object eq netbios-ssn&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_4 tcp&lt;/P&gt;&lt;P&gt;port-object eq 135&lt;/P&gt;&lt;P&gt;port-object eq 1433&lt;/P&gt;&lt;P&gt;port-object eq 445&lt;/P&gt;&lt;P&gt;port-object eq 49152&lt;/P&gt;&lt;P&gt;port-object eq 49153&lt;/P&gt;&lt;P&gt;port-object eq 49154&lt;/P&gt;&lt;P&gt;port-object eq 49155&lt;/P&gt;&lt;P&gt;port-object eq 49156&lt;/P&gt;&lt;P&gt;port-object eq 49157&lt;/P&gt;&lt;P&gt;port-object eq 49158&lt;/P&gt;&lt;P&gt;port-object eq 49159&lt;/P&gt;&lt;P&gt;port-object eq 49160&lt;/P&gt;&lt;P&gt;port-object eq 49161&lt;/P&gt;&lt;P&gt;port-object eq 49162&lt;/P&gt;&lt;P&gt;port-object eq 5357&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_5 tcp&lt;/P&gt;&lt;P&gt;port-object eq www&lt;/P&gt;&lt;P&gt;port-object eq lpd&lt;/P&gt;&lt;P&gt;port-object eq netbios-ssn&lt;/P&gt;&lt;P&gt;object-group service OPC tcp&lt;/P&gt;&lt;P&gt;port-object eq 445&lt;/P&gt;&lt;P&gt;object-group service OPCM tcp&lt;/P&gt;&lt;P&gt;port-object eq 1433&lt;/P&gt;&lt;P&gt;object-group service OPCMS tcp&lt;/P&gt;&lt;P&gt;port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group service OPCTCP tcp&lt;/P&gt;&lt;P&gt;port-object eq 135&lt;/P&gt;&lt;P&gt;object-group service OPCTCPU tcp&lt;/P&gt;&lt;P&gt;port-object eq 5357&lt;/P&gt;&lt;P&gt;object-group service TEST tcp&lt;/P&gt;&lt;P&gt;port-object eq 49152&lt;/P&gt;&lt;P&gt;port-object eq 49153&lt;/P&gt;&lt;P&gt;port-object eq 49154&lt;/P&gt;&lt;P&gt;port-object eq 49155&lt;/P&gt;&lt;P&gt;port-object eq 49156&lt;/P&gt;&lt;P&gt;port-object eq 49157&lt;/P&gt;&lt;P&gt;port-object eq 49158&lt;/P&gt;&lt;P&gt;port-object eq 49159&lt;/P&gt;&lt;P&gt;port-object eq 49160&lt;/P&gt;&lt;P&gt;port-object eq 49161&lt;/P&gt;&lt;P&gt;port-object eq 49162&lt;/P&gt;&lt;P&gt;port-object eq 49163&lt;/P&gt;&lt;P&gt;port-object eq 49164&lt;/P&gt;&lt;P&gt;port-object eq 49165&lt;/P&gt;&lt;P&gt;port-object eq 49166&lt;/P&gt;&lt;P&gt;port-object eq 49167&lt;/P&gt;&lt;P&gt;port-object eq 49168&lt;/P&gt;&lt;P&gt;port-object eq 49169&lt;/P&gt;&lt;P&gt;port-object eq 49170&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 135 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq netbios-ssn &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip object OPCIP object OPCIP &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 445 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq lpd &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 1433 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 3389 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 5357 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any eq 49152 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list inside_access_out remark IP21 Server to PTD DeltaV OPC Inside&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit tcp object IP21_Server range 1 65535 object Tank_OPC_Server eq 10042 &lt;/P&gt;&lt;P&gt;access-list inside_access_out remark Test PC to Tank OPC Server&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit tcp object CIMIO_TestPC range 1 65535 object Tank_OPC_Server eq 10042 &lt;/P&gt;&lt;P&gt;access-list inside_access_out remark Any Intranet to TFMS Web Server&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit tcp any object Tank_OPC_Server eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_out remark Report Access&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit udp any eq netbios-ns object Tank_OPC_Server eq netbios-ns &lt;/P&gt;&lt;P&gt;access-list inside_access_out remark Report Access&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit tcp any eq netbios-ssn object Tank_OPC_Server eq netbios-ssn &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp object IP21_Server range 1 65535 object Firewall_Outside eq 10042 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Test PC to TFMS OPC Server&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp object CIMIO_TestPC range 1 65535 object Firewall_Outside eq 10042 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Any-Intranet to TFMS Web Server&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object Firewall_Outside eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Report Access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp any eq netbios-ns object Firewall_Outside eq netbios-ns &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Report Access&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any eq netbios-ssn object Firewall_Outside eq netbios-ssn &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any object-group DM_INLINE_TCP_2 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any any object-group DM_INLINE_TCP_3 &lt;/P&gt;&lt;P&gt;access-list global_access extended permit ip object OPCIP object OPCIP &lt;/P&gt;&lt;P&gt;access-list global_access extended permit tcp any any object-group DM_INLINE_TCP_4 &lt;/P&gt;&lt;P&gt;access-list global_access extended permit tcp any any object-group DM_INLINE_TCP_5 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Tank_OPC_Server&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 10042 10042 &lt;/P&gt;&lt;P&gt;object network Firewall_Outside&lt;/P&gt;&lt;P&gt;nat (outside,inside) static Tank_OPC_Server service tcp 10042 10042 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group global_access global&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.127.225.1 1&lt;/P&gt;&lt;P&gt;route outside 10.127.226.0 255.255.255.0 10.127.229.1 1&lt;/P&gt;&lt;P&gt;route outside 10.127.230.0 255.255.255.0 10.127.229.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http authentication-certificate outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username krish password ZDpDPiLx3Glgwqc. encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum client auto&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:83aa589d0b77930b72fb3d2faffb127b&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; color: #000000; font-size: 8pt; mso-ansi-language: EN-US; font-family: Arial; mso-fareast-font-family: 'MS Mincho'; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; color: #000000; font-size: 8pt; mso-ansi-language: EN-US; font-family: Arial; mso-fareast-font-family: 'MS Mincho'; "&gt;You are correct that Server is inside the network and it is initiating the connection to outside network.&amp;nbsp; This firewall is located inside the LAN network. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; color: #000000; font-size: 8pt; mso-ansi-language: EN-US; font-family: Arial; mso-fareast-font-family: 'MS Mincho'; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 12:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206621#M347593</guid>
      <dc:creator>darshan288shah</dc:creator>
      <dc:date>2013-06-24T12:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with NAT in ASA5505 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206622#M347594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest simplifying the configuration a bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I would suggest that you only configure &lt;STRONG&gt;ACLs / access-list&lt;/STRONG&gt; in the &lt;STRONG&gt;"in"&lt;/STRONG&gt; direction to the &lt;STRONG&gt;"inside&lt;/STRONG&gt;" or &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interfaces. You dont generally need to use the &lt;STRONG&gt;"out"&lt;/STRONG&gt; direction with typical firewall scenarios.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would remove the following first (I presume that this is just in implementation phase and wont cause any problems with anything in production.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group inside_access_out out interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group outside_access_in in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-group global_access global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should then use the &lt;STRONG&gt;"inside_access_in"&lt;/STRONG&gt; ACL to allow the traffic you need from the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; server to the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add this configuration line to that ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in permit tcp host 192.168.1.3 host 10.127.226.21 eq 10042&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you could &lt;STRONG&gt;REMOVE&lt;/STRONG&gt; the NAT configuration you have currently (shown below)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Tank_OPC_Server &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; description Tank_OPC_Server&amp;nbsp;&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 10042 10042 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Firewall_Outside &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.127.225.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (outside,inside) static Tank_OPC_Server service tcp 10042 10042 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead you could configure basic Dynamic PAT which should enable the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; server to connect to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INSIDE-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What we have to notice with the above Dynamic PAT configuration is that this only enables the hosts and server behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to connect to hosts/server behind &lt;STRONG&gt;"outside"&lt;/STRONG&gt;. If the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; server needs to open/initiate connections towards the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; server &lt;STRONG&gt;THEN&lt;/STRONG&gt; we need a Static NAT configuration. Let me know if this is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also it seems that these &lt;STRONG&gt;"route"&lt;/STRONG&gt; commands are incorrect. Remove them and leave the default route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route outside 10.127.226.0 255.255.255.0 10.127.229.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no route outside 10.127.230.0 255.255.255.0 10.127.229.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface Vlan2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nameif outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ip address 10.127.225.10 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is because the gateway IP address of 10.127.229.1 IS NOT part of the&lt;STRONG&gt; "outside"&lt;/STRONG&gt; interfaces connected network of 10.127.225.0/24 so the routes cannot be correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you have made the required configuration changes, test the firewall rules with the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use this command on the CLI of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.1.3 12345 10.127.226.21 10042&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will print an output what would happen to this connection your are attempting. Share the output with us here on the forums so we can have a look at what is causing the problems (if any after this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jun 2013 12:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206622#M347594</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-24T12:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with NAT in ASA5505 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206623#M347595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have not connected any host at outside network and tried the below command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.1.3 12345 10.127.226.21 10042"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then we have connected host with ip address as 10.127.225.21/24 and run the below commands,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "packet-tracer input inside tcp 192.168.1.3 12345 10.127.225.21 10042"&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_access_in permit tcp host 192.168.1.3 host 10.127.225.21 eq 10042&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.127.225.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: mgmt-deny-all&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; mso-bidi-font-family: 'Times New Roman'; color: #000000; font-size: 11pt; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-font-family;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; mso-bidi-font-family: 'Times New Roman'; color: #000000; font-size: 11pt; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-font-family;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; mso-bidi-font-family: 'Times New Roman'; color: #000000; font-size: 11pt; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-font-family;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="mso-fareast-language: JA; mso-bidi-language: AR-SA; mso-bidi-font-family: 'Times New Roman'; color: #000000; font-size: 11pt; mso-ansi-language: EN-US; font-family: &amp;quot; mso-fareast-font-family;"&gt;Please suggest forward path.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jul 2013 03:08:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206623#M347595</guid>
      <dc:creator>darshan288shah</dc:creator>
      <dc:date>2013-07-01T03:08:26Z</dc:date>
    </item>
    <item>
      <title>Problem with NAT in ASA5505 8.3(2)</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206624#M347596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the current configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jul 2013 07:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-nat-in-asa5505-8-3-2/m-p/2206624#M347596</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-01T07:30:21Z</dc:date>
    </item>
  </channel>
</rss>

