<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 8.3+ Static Many-to-One NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212402#M349010</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One-to-Many applies for one real IP to multiple mapped IP addresses. I think the link below will clarify this for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1107407"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1107407&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 May 2013 20:56:50 GMT</pubDate>
    <dc:creator>julomban</dc:creator>
    <dc:date>2013-05-29T20:56:50Z</dc:date>
    <item>
      <title>ASA 8.3+ Static Many-to-One NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212399#M349007</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with the advent of 8.3 NAT and the ability to do a Many to One Static NAT, which was otherwise impossible (sort of), I had a few questions about the specifics of how it works.&amp;nbsp; First, here is the configuration I am using to test:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;object network ONE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; host 1.1.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;object-group network MANY&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; network-object host 10.10.10.11&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; network-object host 10.10.10.12&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; network-object host 10.10.10.13&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; network-object host 10.10.10.14&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt; network-object host 10.10.10.15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: 'courier new', courier;"&gt; nat (inside,outside) source static MANY ONE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All my inside hosts (10.10.10.11 - .15) are being Staticly NAT'ed to the outside IP of 1.1.1.1 (via an object named ONE).&amp;nbsp; I have a few specific questions to how exactly this works.&amp;nbsp; And how it ends up being different from a simple Dynamic NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are some tests I've run with Packet-Tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;asa84# packet-tracer input inside tcp 10.10.10.11 11111 9.9.9.9 80 detail&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;lt;-~-~-~- SNIP -~-~-~- &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;nat (inside,outside) source static MANY ONE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Static translate 10.10.10.11/11111 to 1.1.1.1/11111&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt; in&amp;nbsp; id=0xc83aabe0, priority=6, domain=nat, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xc85fb328, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.10.10.11, mask=255.255.255.255, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;lt;-~-~-~- SNIP -~-~-~- &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: 'courier new', courier;"&gt;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;asa84# packet-tracer input inside tcp 10.10.10.12 11111 9.9.9.9 80 detail&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;lt;-~-~-~- SNIP -~-~-~- &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;nat (inside,outside) source static MANY ONE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Static translate 10.10.10.12/11111 to 1.1.1.1/11111&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt; Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt; in&amp;nbsp; id=0xcb40e0a8, priority=6, domain=nat, deny=false&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xc85fb328, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.10.10.12, mask=255.255.255.255, port=0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;lt;-~-~-~- SNIP -~-~-~- &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the inside host 10.10.10.11 speaks to an outside hosts, it gets translated to 1.1.1.1 and the source port remains the same.&lt;/P&gt;&lt;P&gt;When the inside host 10.10.10.12 speaks to an outside hosts, it gets translated to 1.1.1.1 and the source port remains the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But what happens if both of these inside hosts happen to pick the same source port number?&amp;nbsp; If the port stays the same, how would the Firewall distinguish the return traffic between the two "real" source IPs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore...&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;asa84# packet-tracer input outside tcp 8.8.8.8 8888 1.1.1.1 80 detail&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;lt;-~-~-~- SNIP -~-~-~- &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Subtype: static&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;nat (inside,outside) source static MANY ONE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;NAT divert to egress interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Untranslate 1.1.1.1/80 to 10.10.10.11/80&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;&amp;lt;-~-~-~- SNIP -~-~-~- &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;asa84# packet-tracer input outside tcp 9.9.9.9 80 1.1.1.1 1111 detail&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Subtype: static&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;nat (inside,outside) source static MANY ONE&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;NAT divert to egress interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier; font-size: 8pt;"&gt;Untranslate 1.1.1.1/1111 to 10.10.10.11/1111&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When an outside host sends a packet to the shared Mapped address, it seems to always translate it to the first IP address in the "MANY" object-group (10.10.10.11).&amp;nbsp; Is that always going to be the behavior?&amp;nbsp; Will the Firewall ever "un-nat" the incoming traffic to one of the other IP addresses in the "MANY" object-group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any additional information you think would be helpful, I'm all ears.&amp;nbsp; Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212399#M349007</guid>
      <dc:creator>eddie.harmoush</dc:creator>
      <dc:date>2019-03-12T01:50:56Z</dc:date>
    </item>
    <item>
      <title>ASA 8.3+ Static Many-to-One NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212400#M349008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See it from the ASA perspective, how the ASA knows when to send data to 10.10.10.11,12,13,14 or 15 when coming from the outside? Unless you specify the port there is no way to accomplish what you are looking for. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you set port forwarding and specify the port it works fine since the ASA knows that when is SSH will go to 10.10.10.11 and telnet to 10.10.10.12. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT rule you share is going to work for outobund connections however for inbound access you may need to specify the port. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 19:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212400#M349008</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-05-29T19:13:05Z</dc:date>
    </item>
    <item>
      <title>ASA 8.3+ Static Many-to-One NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212401#M349009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julomban,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I understand how it traditionally would only work unidirectional.&amp;nbsp; But one of the new features of 8.3+ is specifically a Static Many to One NAT (which implies bidirectional).&amp;nbsp; The purpose of this post was simply to get more information as to the innerworkings of how the ASA process packets through a "Many to One" Static NAT as configured above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;-Eddie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 20:44:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212401#M349009</guid>
      <dc:creator>eddie.harmoush</dc:creator>
      <dc:date>2013-05-29T20:44:45Z</dc:date>
    </item>
    <item>
      <title>ASA 8.3+ Static Many-to-One NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212402#M349010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eddie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One-to-Many applies for one real IP to multiple mapped IP addresses. I think the link below will clarify this for you:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1107407"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1107407&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 May 2013 20:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-many-to-one-nat/m-p/2212402#M349010</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-05-29T20:56:50Z</dc:date>
    </item>
  </channel>
</rss>

