<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Internal mail-threat-detection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154806#M357091</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could someone please throw some light on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Feb 2013 14:54:34 GMT</pubDate>
    <dc:creator>Shibu1978</dc:creator>
    <dc:date>2013-02-05T14:54:34Z</dc:date>
    <item>
      <title>Internal mail-threat-detection</title>
      <link>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154805#M357090</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had one strange issue which was resolved by configuring&amp;nbsp; "&lt;SPAN style="font-size: 10pt;"&gt;no threat-detection statistics tcp-intercept" from &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Issue&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;===&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN&gt;We were not able to access our mail server internally( Zone created in local DNS-(10.10.2.10))&amp;nbsp; when external nat &amp;amp; access-list configured on the same IP. ( &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://mail.company.net" target="_blank"&gt;https://mail.company.net&lt;/A&gt;&lt;SPAN&gt;).&amp;nbsp;&amp;nbsp; When we remove the external static nat and access-list we can access mail server internally.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 10.10.2.23 CASServer2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 94.*.*.170 eq https&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) 94.*.*.170 CASServer2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;We have Cisco ASA 5520 8.2(5).&amp;nbsp; Could someone please get me an idea how did resolve by disabling the command above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks for your inputs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154805#M357090</guid>
      <dc:creator>Shibu1978</dc:creator>
      <dc:date>2019-03-12T00:56:28Z</dc:date>
    </item>
    <item>
      <title>Internal mail-threat-detection</title>
      <link>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154806#M357091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could someone please throw some light on this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 14:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154806#M357091</guid>
      <dc:creator>Shibu1978</dc:creator>
      <dc:date>2013-02-05T14:54:34Z</dc:date>
    </item>
    <item>
      <title>Internal mail-threat-detection</title>
      <link>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154807#M357092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure if I understand your question.&amp;nbsp; My own experience is that if I want both internal and external NAT access to a particular server, I have to give it two different IP addresses.&amp;nbsp; I haven't run packet-tracer to see what the underlying issue is yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Feb 2013 16:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/internal-mail-threat-detection/m-p/2154807#M357092</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2013-02-05T16:22:53Z</dc:date>
    </item>
  </channel>
</rss>

