<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5505 V8.3  NAT config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217490#M348974</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that with &lt;STRONG&gt;"show ip add"&lt;/STRONG&gt; command you dont see any IP address in the listing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is, then check what the&lt;STRONG&gt; "show route"&lt;/STRONG&gt; command output shows. You should have a default route towards the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no real idea about the configuration type you are using for the "outside" connection as I have never had to use it myself. I would imagine the needed information would be provided by the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 May 2013 14:41:04 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-31T14:41:04Z</dc:date>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217478#M348962</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi,&lt;/P&gt;&lt;P&gt;Can anyone tell me what the new command is for NAT in version 8.3?&lt;/P&gt;&lt;P&gt;The config i have is from Version 7.2 and doesnt work on 8.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.123.74.128 255.255.255.128&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 86.35.156.**&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217478#M348962</guid>
      <dc:creator>smith606306</dc:creator>
      <dc:date>2019-03-12T01:51:08Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217479#M348963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the old NAT configuration already contains one useless line in it. It basically does Dynamic PAT and accepts any source address from the "inside" interface. If you want to follow that logic in the new software you can use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you wanted to define the source addresses for the Dynamic PAT then you could use this variation of the configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.30.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to have a look at some information about the new 8.3+ NAT format have a look at the document I wrote here on the CSC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-31116"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 09:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217479#M348963</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T09:52:48Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217480#M348964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want to achieve is this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BT line ----------------ADSL modem (bridge mode)---------------------ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config so far is below&lt;/P&gt;&lt;P&gt;Am i on the right track?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group PPPOE-GROUP&lt;BR /&gt; ip address pppoe setroute &lt;/P&gt;&lt;P&gt; &lt;BR /&gt;!&lt;BR /&gt;interface Vlan325&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.123.74.254 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description Outside interface to BT router&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description Inside interface to Core 2&lt;BR /&gt; switchport access vlan 325&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;vpdn group PPPOE-GROUP request dialout pppoe&lt;/P&gt;&lt;P&gt;vpdn group PPPOE-GROUP localname USERNAME&lt;/P&gt;&lt;P&gt;vpdn group PPPOE-GROUP ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn username USERNAME password PASSWORD store-local&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 208.67.222.222&lt;BR /&gt; name-server 208.67.220.220&lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq 8080&lt;BR /&gt;access-list inside_mpc extended permit tcp any any eq www&lt;BR /&gt;access-list dhcp-acl extended permit udp any any range bootps bootpc&lt;BR /&gt;mtu outside 1492&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 208.67.222.222 208.67.220.220&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.123.74.130-10.123.74.239 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ntp server 150.101.254.110 source outside prefer&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request method connect&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt; class BlockDomainsClass&lt;BR /&gt;&amp;nbsp; reset log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;policy-map inside-policy&lt;BR /&gt; class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_inspection_policy&lt;BR /&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 10:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217480#M348964</guid>
      <dc:creator>smith606306</dc:creator>
      <dc:date>2013-05-30T10:23:42Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217481#M348965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;object network outbound&lt;/P&gt;&lt;P&gt;subnet 10.123.74.128 255.255.255.128&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So every traffc hits the fw will get translated to outside interface and goes out for internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you add the above nat statement on to your firewall.... you will get internet access....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope you have missed the access-group to bind the ACL to your interface.... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 10:50:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217481#M348965</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2013-05-30T10:50:29Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217482#M348966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont see a problem with the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I have never had to configure the connection to Internet as you have done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your ASA should get the IP address from the ISP and also the default route from the looks of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configurations should be ok and work with the same logic as your previous Dynamic PAT configuration even though we made it simpler.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 10:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217482#M348966</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T10:53:00Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217483#M348967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"object network" cant contain 2 "subnet" statements. It can only hold one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore specifying a specific network when you are also specifying "any" has no real use. Its just simpler to accept all source addresses OR specify all the source networks separately if you really want to control which network should hit the translation rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 10:54:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217483#M348967</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T10:54:54Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217484#M348968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with you... i have just converted wat he was requested.... but still he can have PAT translations seperately for specifc subnet and others.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;he just need to add the object-group instead of object....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or to make simple...&lt;/P&gt;&lt;P&gt;object network outbound&lt;/P&gt;&lt;P&gt;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for notifying the mistake...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 11:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217484#M348968</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2013-05-30T11:02:44Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217485#M348969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks.&lt;/P&gt;&lt;P&gt;are you talking about the ACL access-list inside_mpc ?&lt;/P&gt;&lt;P&gt;If so i havent assigned it to an interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 11:18:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217485#M348969</guid>
      <dc:creator>smith606306</dc:creator>
      <dc:date>2013-05-30T11:18:17Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217486#M348970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You dont need interface ACLs at this point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When your interfaces dont have ACLs attached to them with the &lt;STRONG&gt;"access-group"&lt;/STRONG&gt; command then the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; value of the interface determines which traffic is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default rule is that hosts behind the higher value interface can access anything behind a lower security level interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; is &lt;STRONG&gt;100&lt;/STRONG&gt; and the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; is&lt;STRONG&gt; 0&lt;/STRONG&gt;. So hosts behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; can connect anywhere on the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; without configuring any ACL on the interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to restrict some traffic from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to&lt;STRONG&gt; "outside"&lt;/STRONG&gt; then you will need to confiure an interface ACL. Also if you were to allow traffic from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to some server on the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; you would both need to configure Static PAT and allow the traffic on an ACL attached to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But at the moment you dont need to configure any ACLs to have Internet working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 May 2013 11:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217486#M348970</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-30T11:39:58Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217487#M348971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i placed the BT router in bridge mode connected to the ASA but does not work.&lt;/P&gt;&lt;P&gt;I get the following message&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Failed to locate egress interface for UDP from inside:&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 14:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217487#M348971</guid>
      <dc:creator>smith606306</dc:creator>
      <dc:date>2013-05-31T14:18:56Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217488#M348972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sounds to me that the "outside" interface either doesnt have an IP address or there is just a routing problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the command "show ip add" to view the IP addresses currently on the interfaces of the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 14:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217488#M348972</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-31T14:22:18Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217489#M348973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; no it hasn/t got an ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group PPPOE-GROUP&lt;BR /&gt; ip address pppoe setroute &lt;/P&gt;&lt;P&gt; &lt;BR /&gt;!&lt;BR /&gt;interface Vlan325&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.123.74.254 255.255.255.128&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description Outside interface to BT router&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description Inside interface to Core 2&lt;BR /&gt; switchport access vlan 325&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpdn group PPPOE-GROUP request dialout pppoe&lt;/P&gt;&lt;P&gt;vpdn group PPPOE-GROUP localname &lt;A href="mailto:C701390@hgbtclick.com"&gt;C****0@hgbtclick.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;vpdn group PPPOE-GROUP ppp authentication pap&lt;/P&gt;&lt;P&gt;vpdn username &lt;A href="mailto:C701390@hgbtclick.com"&gt;C****@hgbtclick.com&lt;/A&gt; password hanover1 store-local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should i change the ppp authentication to mschap?&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 14:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217489#M348973</guid>
      <dc:creator>smith606306</dc:creator>
      <dc:date>2013-05-31T14:37:45Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5505 V8.3  NAT config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217490#M348974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that with &lt;STRONG&gt;"show ip add"&lt;/STRONG&gt; command you dont see any IP address in the listing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is, then check what the&lt;STRONG&gt; "show route"&lt;/STRONG&gt; command output shows. You should have a default route towards the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have no real idea about the configuration type you are using for the "outside" connection as I have never had to use it myself. I would imagine the needed information would be provided by the ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 May 2013 14:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-v8-3-nat-config/m-p/2217490#M348974</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-31T14:41:04Z</dc:date>
    </item>
  </channel>
</rss>

