<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Configuration 1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238260#M348439</link>
    <description>&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;i need the NAT Configuration from DMZ to Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;My IP,s are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;DMZ Interface 10.1.1.1/24&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Webserver in DMZ 10.1.1.254&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Inside interface 192.168.11.249&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:54:50 GMT</pubDate>
    <dc:creator>Navaz Wattoo</dc:creator>
    <dc:date>2019-03-12T01:54:50Z</dc:date>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238260#M348439</link>
      <description>&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;i need the NAT Configuration from DMZ to Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;My IP,s are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;DMZ Interface 10.1.1.1/24&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Webserver in DMZ 10.1.1.254&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Inside interface 192.168.11.249&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238260#M348439</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2019-03-12T01:54:50Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238261#M348440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to be more clearer with the request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do you want to NAT from DMZ to inside? Do&amp;nbsp; you want to configure NAT0 so that the addresses wont be NATed at all? Or do you want to NAT some DMZ address to another specific address towards inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Jun 2013 14:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238261#M348440</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-08T14:44:23Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238262#M348441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot for reply&lt;/P&gt;&lt;P&gt;now ping time is more and i want to ping time of DB server (192.168.11.10 and 192.168.11.18) to Webserver (10.1.1.254) in DMZ decrease&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jun 2013 10:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238262#M348441</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-06-09T10:14:12Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238263#M348442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You still didnt quite answer my question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of NAT configuration do you want? Do you want to remove any NAT between the &lt;STRONG&gt;"DMZ" &lt;/STRONG&gt;and &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interfaces?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also share the configuration so we can take into account any existing configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jun 2013 13:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238263#M348442</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-09T13:54:37Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238264#M348443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACTIVE# sh running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ACTIVE&lt;/P&gt;&lt;P&gt;domain-name dhalahore.org&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;names&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Inside to the Core Switches&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description public Server - DMZ&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.255.255.0 standby 10.1.1.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description outside to the internet via router&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 125.209.70.90 255.255.255.248 standby 125.209.70.91&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Redundant1&lt;/P&gt;&lt;P&gt; member-interface Ethernet0/0&lt;/P&gt;&lt;P&gt; member-interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.11.249 255.255.255.0 standby 192.168.11.250&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST 5&lt;/P&gt;&lt;P&gt;dns domain-lookup DMZ&lt;/P&gt;&lt;P&gt;dns domain-lookup Outside&lt;/P&gt;&lt;P&gt;dns server-group DEFAULT-DNS&lt;/P&gt;&lt;P&gt; name-server 202.142.160.2&lt;/P&gt;&lt;P&gt; name-server 202.141.224.34&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name dhalahore.org&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network DMZ-BLOCKED-LAN-NETWORKS&lt;/P&gt;&lt;P&gt;network-object 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 172.16.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 172.16.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 172.16.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list 102 extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any any eq www&lt;/P&gt;&lt;P&gt;access-list 102 extended permit tcp any host 125.209.70.90 eq www&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.20.0 255.255.255.0 10.1.1.0 255.255&lt;/P&gt;&lt;P&gt;.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.30.0 255.255.255.0 10.1.1.0 255.255&lt;/P&gt;&lt;P&gt;.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.40.0 255.255.255.0 10.1.1.0 255.255&lt;/P&gt;&lt;P&gt;.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.16.10.0 255.255.255.0 10.1.1.0 255.255&lt;/P&gt;&lt;P&gt;.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.10.0 255.255.255.0 10.1.1.0 255.25&lt;/P&gt;&lt;P&gt;5.255.0&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 10.1.1.0 255.255.255.0 125.209.70.88 255.2&lt;/P&gt;&lt;P&gt;55.255.248&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 10.1.1.0 255.25&lt;/P&gt;&lt;P&gt;5.255.0&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow ICMP from DMZ server to INSIDE server&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.18 echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.10 echo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Block connections from DMZ to INSIDE networks&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended deny ip any object-group DMZ-BLOCKED-LAN-NETWORKS&lt;/P&gt;&lt;P&gt;access-list DMZ-IN remark Allow all other traffic&lt;/P&gt;&lt;P&gt;access-list DMZ-IN extended permit ip 10.1.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list ICMP extended permit icmp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu Outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface FAILOVER Management0/0&lt;/P&gt;&lt;P&gt;failover polltime unit 1 holdtime 3&lt;/P&gt;&lt;P&gt;failover polltime interface 3 holdtime 15&lt;/P&gt;&lt;P&gt;failover key *****&lt;/P&gt;&lt;P&gt;failover link FAILOVER Management0/0&lt;/P&gt;&lt;P&gt;failover interface ip FAILOVER 172.16.254.254 255.255.255.0 standby 172.16.254.2&lt;/P&gt;&lt;P&gt;50&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) tcp interface www 10.1.1.254 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) tcp interface https 10.1.1.254 https netmask 255.255.255.25&lt;/P&gt;&lt;P&gt;5&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.1.1.0 192.168.11.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group DMZ-IN in interface DMZ&lt;/P&gt;&lt;P&gt;access-group 102 in interface Outside&lt;/P&gt;&lt;P&gt;access-group no-nat in interface inside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 125.209.70.89 1&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.11.254 2&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.10.254 2&lt;/P&gt;&lt;P&gt;route inside 172.16.10.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.10.0 255.255.255.0 192.168.10.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.20.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.20.0 255.255.255.0 192.168.10.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.30.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.30.0 255.255.255.0 192.168.10.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.40.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;route inside 172.16.40.0 255.255.255.0 192.168.10.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.1.1.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;http 192.168.11.249 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;http 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.11.254 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.10.254 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;username admin password f3UhLvUj1QsXsuK7 encrypted privilege 15&lt;/P&gt;&lt;P&gt;username cisco123 password ffIRPGpDSOJh9YLq encrypted&lt;/P&gt;&lt;P&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map ICMP-CMAP&lt;/P&gt;&lt;P&gt; match access-list ICMP&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt; class ICMP-CMAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:2ae5436abbb0241872fb7fe948e8cb57&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ACTIVE#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jun 2013 04:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238264#M348443</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-06-10T04:28:49Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238265#M348444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to already have NAT0 configuration between &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt;. You also have ICMP Inspection enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not quite sure what the problem currently is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; server isnt replying to the ICMP Echo I would suggest confirming that no local firewall on the server isnt blocking the ICMP. You could also test ICMP directly from the ASA to the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also confirm routing if you havent already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jun 2013 06:16:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238265#M348444</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-10T06:16:36Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238266#M348445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i ping DMZ server (10.1.1.254) and DB Server (192.168.11.18) it is perfect&amp;nbsp; response time. But when i ping 10.1.1.254(Web server) from DB Server(192.168.11.254) It gives delay.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jun 2013 07:03:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238266#M348445</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-06-10T07:03:30Z</dc:date>
    </item>
    <item>
      <title>NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238267#M348446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would start looking through the path that the DB server 192.168.11.254 uses on the network towards the Web server. I would imagine though that there is not many places to check because the source hosts are both in the directly connected network with ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could check some switch ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant see why the ASA or any NAT configuration would be related to RTT from 2 different hosts. I mean if other works just fine and the other doesnt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the ICMP output to share with us? You dont mention any values.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jun 2013 07:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238267#M348446</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-10T07:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Configuration 1</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238268#M348447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i am sending&amp;nbsp; you the diagram of my network and also mention the DB serve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Navaz Wattoo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jun 2013 07:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-1/m-p/2238268#M348447</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-06-10T07:26:54Z</dc:date>
    </item>
  </channel>
</rss>

