<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX to ASA migration some services aren't working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-to-asa-migration-some-services-aren-t-working/m-p/2276281#M349569</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problems are probably due to NAT ordering. Specifically the first Dynamic NAT configurations are probably overiding some DMZ related NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important question I need to ask is that do you really want to do Dynamic PAT from the "inside" towards all the other local interfaces which are "rsa" and "dmz"? I personally always leave out all NAT configurations between local interfaces and let them communicate with eachother with their original IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though if this is a requirement for you then its no problem for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest the following NAT configurations in your case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remove some current NAT configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The purpose of removing the below configurations is to replace them with new NAT configurations that wont override any of the other NAT configurations. In a way we are rearranging the NAT configurations&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;no nat (inside,rsa) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;no nat (inside,dmz) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no object network rsa_subnet&lt;/P&gt;&lt;P&gt;no object network dmz_subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Add new NAT configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The purpose of the below configurations is to first create a Default Dynamic PAT configuration. What I mean by this is that every network, whatever their source interface, will have some Dynamic PAT rule towards the "outside" networks&lt;/LI&gt;&lt;LI&gt;The 2 "nat" configurations lines that use your "inside_subnet_all" object-group are something that you can either configure or NOT configure. This depends totally on the fact that I mentioned earlier in the reply. If you specifically need to PAT the traffic from "inside" to "rsa" or "dmz" then you use them. IF you dont want to NAT traffic between these interfaces then you can leave them out of your configurations.&lt;/LI&gt;&lt;LI&gt;The below configuration assumes that the single Static NAT for "dmz" server is left into the configuration also.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Source Network for Default Dynamic PAT&lt;/P&gt;&lt;P&gt; network-object 192.166.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.166.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.167.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.167.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.20.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 198.10.10.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 120.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 11.1.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,rsa) after-auto source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;nat (inside,dmz) after-auto source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you are going to try the above NAT configuration suggested, then be sure to backup your NAT configuration if you want to change back. Also naturally changing the NAT configuration will cause small outage to the connections to "outside" while you are doing the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please ask more if this didnt yet solve the problem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 May 2013 07:08:51 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-21T07:08:51Z</dc:date>
    <item>
      <title>PIX to ASA migration some services aren't working</title>
      <link>https://community.cisco.com/t5/network-security/pix-to-asa-migration-some-services-aren-t-working/m-p/2276280#M349568</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've recently migrated a PIX 525 to ASA 5520, but for some reason (through ASA) the users from OUTSIDE aren't able access services published in DMZ as well as some DMZ servers aren't able to communicate to some OUTSIDE services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INSIDE to DMZ is working fine. (through ASA)&lt;/P&gt;&lt;P&gt;INSIDE to OUTSIDE is working fine. (through ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the configuration from my PIX (where everything works just fine) as well as the one on the ASA (where there is a problem), can you please suggest what could be the cause?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the below case the DMZ hosts from 11.1.10.0 aren't able to access SMTP services (through ASA) and the OUTSIDE users aren't able to access DMZ web server (11.1.10.40) through ASA, this all just works fine with PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------&lt;BR /&gt;PIX 6.3(3)&lt;BR /&gt;----------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nameif ethernet0 outside security0&lt;BR /&gt;nameif ethernet1 inside security100&lt;BR /&gt;nameif ethernet2 rsa security5&lt;BR /&gt;nameif ethernet3 dmz security10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 10.1.10.20 255.255.255.0&lt;BR /&gt;ip address inside 192.168.1.20 255.255.255.0&lt;BR /&gt;ip address rsa 120.0.0.1 255.255.255.0&lt;BR /&gt;ip address dmz 11.1.10.20 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;global (rsa) 1 interface&lt;BR /&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.166.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 192.166.10.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 192.167.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 192.167.10.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 10.20.5.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 198.10.10.0 255.255.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (rsa) 1 120.0.0.0 255.255.255.0 0 0&lt;BR /&gt;nat (dmz) 1 11.1.10.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 10.1.10.40 11.1.10.40 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 10.1.10.40 eq www &lt;BR /&gt;access-list outside permit tcp any host 10.1.10.40 eq https &lt;/P&gt;&lt;P&gt;access-list dmz permit tcp 11.1.10.0 255.255.255.0 any eq smtp &lt;/P&gt;&lt;P&gt;access-list inside permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;BR /&gt;access-group inside in interface inside&lt;BR /&gt;access-group dmz in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.1.10.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.166.1.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.166.10.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.167.1.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.168.10.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 10.20.5.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 198.10.10.0 255.255.255.0 192.168.10.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------&lt;BR /&gt;ASA 8.4(5)&lt;BR /&gt;----------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.1.10.20 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.20 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif rsa&lt;BR /&gt;security-level 5&lt;BR /&gt;ip address 120.0.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 11.1.10.20 255.255.255.0&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_a&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 192.166.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network inside_subnet_b&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 192.166.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_c&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 192.167.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_d&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 192.167.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_e&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_f&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_g&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 10.20.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside_subnet_h&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 198.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network rsa_subnet&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 120.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network dmz_subnet&lt;BR /&gt;&amp;nbsp;&amp;nbsp; subnet 11.1.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network host-11.1.10.40&lt;BR /&gt;&amp;nbsp;&amp;nbsp; host 11.1.10.40 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service WWW-HTTPS tcp&lt;BR /&gt;&amp;nbsp;&amp;nbsp; port-object eq www&lt;BR /&gt;&amp;nbsp;&amp;nbsp; port-object eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service SMTP&lt;BR /&gt;&amp;nbsp;&amp;nbsp; service tcp destination eq smtp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network inside_subnet_all&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_a&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_b&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_c&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_d&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_e&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_f&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_g&lt;BR /&gt;&amp;nbsp;&amp;nbsp; network-object object inside_subnet_h&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE extended permit tcp any object host-11.1.10.40 object-group WWW-HTTPS &lt;BR /&gt;access-list DMZ extended permit object SMTP object dmz_subnet any &lt;BR /&gt;access-list INSIDE extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,rsa) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network rsa_subnet&lt;BR /&gt;&amp;nbsp;&amp;nbsp; nat (rsa,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network dmz_subnet&lt;BR /&gt;&amp;nbsp;&amp;nbsp; nat (dmz,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network host-11.1.10.40&lt;BR /&gt;&amp;nbsp;&amp;nbsp; nat (dmz,outside) static 10.1.10.40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;access-group INSIDE in interface inside&lt;BR /&gt;access-group DMZ in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.1.10.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.166.1.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.166.10.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.167.1.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.168.1.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 192.168.10.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 10.20.5.0 255.255.255.0 192.168.10.1 1&lt;BR /&gt;route inside 198.10.10.0 255.255.255.0 192.168.10.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-to-asa-migration-some-services-aren-t-working/m-p/2276280#M349568</guid>
      <dc:creator>aacefeqbal</dc:creator>
      <dc:date>2019-03-12T01:46:32Z</dc:date>
    </item>
    <item>
      <title>PIX to ASA migration some services aren't working</title>
      <link>https://community.cisco.com/t5/network-security/pix-to-asa-migration-some-services-aren-t-working/m-p/2276281#M349569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problems are probably due to NAT ordering. Specifically the first Dynamic NAT configurations are probably overiding some DMZ related NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One important question I need to ask is that do you really want to do Dynamic PAT from the "inside" towards all the other local interfaces which are "rsa" and "dmz"? I personally always leave out all NAT configurations between local interfaces and let them communicate with eachother with their original IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though if this is a requirement for you then its no problem for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest the following NAT configurations in your case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remove some current NAT configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The purpose of removing the below configurations is to replace them with new NAT configurations that wont override any of the other NAT configurations. In a way we are rearranging the NAT configurations&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;no nat (inside,rsa) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;no nat (inside,dmz) source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no object network rsa_subnet&lt;/P&gt;&lt;P&gt;no object network dmz_subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Add new NAT configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The purpose of the below configurations is to first create a Default Dynamic PAT configuration. What I mean by this is that every network, whatever their source interface, will have some Dynamic PAT rule towards the "outside" networks&lt;/LI&gt;&lt;LI&gt;The 2 "nat" configurations lines that use your "inside_subnet_all" object-group are something that you can either configure or NOT configure. This depends totally on the fact that I mentioned earlier in the reply. If you specifically need to PAT the traffic from "inside" to "rsa" or "dmz" then you use them. IF you dont want to NAT traffic between these interfaces then you can leave them out of your configurations.&lt;/LI&gt;&lt;LI&gt;The below configuration assumes that the single Static NAT for "dmz" server is left into the configuration also.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Source Network for Default Dynamic PAT&lt;/P&gt;&lt;P&gt; network-object 192.166.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.166.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.167.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.167.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.20.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 198.10.10.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 120.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 11.1.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,rsa) after-auto source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;nat (inside,dmz) after-auto source dynamic inside_subnet_all interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if you are going to try the above NAT configuration suggested, then be sure to backup your NAT configuration if you want to change back. Also naturally changing the NAT configuration will cause small outage to the connections to "outside" while you are doing the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please ask more if this didnt yet solve the problem &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 May 2013 07:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-to-asa-migration-some-services-aren-t-working/m-p/2276281#M349569</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-21T07:08:51Z</dc:date>
    </item>
  </channel>
</rss>

