<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asymmetric NAT issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259361#M357828</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firstly, thank you, however I'm not sure that'll do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wish it was as simple as a public IP address reserver for each server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;x.x.x.66 must send one port to one server and another port to another server (both from one known external host)&lt;/P&gt;&lt;P&gt;x.x.x.70 must send 4 ports to one server, 5 ports to another, and 1 to yet another.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Apr 2013 13:36:46 GMT</pubDate>
    <dc:creator>Thomas-Nicholson</dc:creator>
    <dc:date>2013-04-30T13:36:46Z</dc:date>
    <item>
      <title>Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259359#M357826</link>
      <description>&lt;PRE&gt;Here we go,&lt;BR /&gt;&lt;BR /&gt;I have been asked by my company to replace an aging firewall, to allow VPN connections to teleworkers and &lt;BR /&gt;Azure. We have a small(ish) office and a handful of servers so we should only need the ASA5505. Our ISP gives&lt;BR /&gt;us an IP range ***.***.240.64 - ***.***.240.79. The ASA should pass certain packets coming to these certain &lt;BR /&gt;IPs to different servers.&lt;BR /&gt;&lt;BR /&gt;This is roughly what our network looks like:&lt;BR /&gt;ISP---internet router---ASA5505---switch---users and servers&lt;BR /&gt;&lt;BR /&gt;I have spent a week or so reading up on it and I thought I had a grasp on how to configure one. As I'm a &lt;BR /&gt;newcomer to the Cisco ASA I have been using the ASDM to configure the device, however I'm not affraid of a &lt;BR /&gt;console cable. After a few tests I can have been able to establish internet connects (initiated from inside) &lt;BR /&gt;and can toggle on and off ICMP in/out through ACL use. However trying to access the servers from outside the &lt;BR /&gt;network is blocked by the ASA. The logs say the connection is blocked because of Asymmetric NAT entry. Having &lt;BR /&gt;these servers accessible by, in one case a specific host and in the other casen any host, is a must. Once that&lt;BR /&gt;is configured then I can work on getting the VPN set up.&lt;BR /&gt;&lt;BR /&gt;I have included my VERY sloppy conf (due to trying to rectify issues on-the-fly during testing).&lt;BR /&gt;&lt;BR /&gt;Any and all help would be very much appreciated.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thomas &lt;BR /&gt;&lt;BR /&gt;------------------------------------------&lt;BR /&gt;&lt;BR /&gt;: Saved
:
ASA Version 8.4(4)1 
!
hostname ASA5505
domain-name **********
enable password ************ encrypted
passwd *********** encrypted
names
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 10.10.10.251 255.255.0.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address ***.***.***.69 255.255.255.0 
!
ftp mode passive
clock timezone GMT/BST 0
clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00
dns server-group DefaultDNS
 domain-name *************
same-security-traffic permit intra-interface
object network obj_any
 subnet 0.0.0.0 0.0.0.0
object network Enterprise
 host 10.10.10.4
object network odin
 host 10.10.10.105
 description Primary Domain Controller
object network gateway
 host 213.1.240.69
object service LyncAV
 service tcp source range 50000 59999 destination range 50000 59999 
object service LyncMobilePush
 service tcp source eq 5223 destination eq 5223 
object service NormalSQLServer
 service tcp source eq 1433 destination eq 1433 
object service RDESKTOP
 service tcp source eq 3389 destination eq 3389 
object service SQLEnterprise
 service tcp source eq 1440 destination eq 1440 
object service SQLServer
 service tcp source eq 1439 destination eq 1439 
object service STUN-TCP
 service tcp source eq https destination eq https 
object service STUN-UDP
 service udp source eq 3478 destination eq 3478 
object service SVN
 service tcp source eq 82 destination eq 82 
object service SourceOffsite
 service tcp source eq 8081 destination eq 8081 
object service WebServices
 service tcp source range 1 65335 destination eq 8080 
object network AVserver
 host 10.10.10.6
object network VIP1
 host ***.***.240.66
object network VIP2
 host ***.***.240.70
object service MAIL
 service tcp source eq smtp destination eq smtp 
object network Megabert
 host 10.10.10.197
object network SBS
 host 10.10.10.1
object service Http
 service tcp source eq www destination eq www 
object network Webserver
 host ***.***.36.106
object service SQL
 service tcp source eq 1433 destination eq 1433 
object-group service DM_INLINE_SERVICE_1
 service-object object LyncAV 
 service-object object LyncMobilePush 
 service-object object NormalSQLServer 
 service-object object SQLEnterprise 
 service-object object SQLServer 
 service-object object STUN-TCP 
 service-object object SVN 
 service-object object SourceOffsite 
 service-object object WebServices 
 service-object object RDESKTOP 
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
object-group network MOCOGROUP-vn1
 network-object 10.11.0.0 255.255.0.0
object-group network mocogroup
 network-object 10.10.0.0 255.255.0.0
object-group network DM_INLINE_NETWORK_1
 network-object object VIP2
 network-object object Webserver
object-group service DM_INLINE_SERVICE_2
 service-object object Http 
 service-object object SQL 
object-group network DM_INLINE_NETWORK_2
 network-object object VIP2
 network-object object Webserver
object-group service DM_INLINE_SERVICE_3
 service-object object Http 
 service-object object SQL 
object-group service DM_INLINE_SERVICE_4
 service-object object LyncAV 
 service-object object LyncMobilePush 
access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_2 object-group DM_INLINE_NETWORK_1 object Enterprise 
access-list outside_access_in extended permit object SQLServer any object Megabert 
access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 interface outside any 
access-list outside_access_in extended permit object STUN-UDP interface outside any 
access-list outside_access_in extended permit icmp any any 
access-list global_access extended permit object-group DM_INLINE_SERVICE_3 object-group DM_INLINE_NETWORK_2 object Enterprise 
access-list global_access extended permit ip interface outside object Megabert 
access-list global_access extended permit ip object Megabert any 
access-list global_access extended permit ip object VIP2 any 
access-list global_access extended permit object SQLServer any object Megabert 
access-list global_access extended permit ip 10.10.0.0 255.255.0.0 any 
access-list global_access extended permit icmp 10.10.0.0 255.255.0.0 any 
access-list global_access extended permit object-group DM_INLINE_SERVICE_4 any any 
access-list global_access extended permit ip any object VIP2 
access-list AZURE extended permit ip object-group mocogroup object-group MOCOGROUP-vn1 
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (outside,any) source static any any destination static VIP2 Megabert service SQLServer SQLServer
nat (any,outside) source dynamic Webserver Webserver destination static VIP2 Enterprise service Http Http
nat (any,any) source dynamic Webserver Webserver destination static VIP2 Enterprise service SQL SQL
nat (any,any) source dynamic Webserver Webserver destination static VIP2 Enterprise
nat (any,outside) source dynamic any VIP1 destination static VIP1 SBS service MAIL MAIL
nat (any,outside) source dynamic any VIP1 destination static VIP1 AVserver service RDESKTOP RDESKTOP
nat (any,outside) source dynamic any VIP2 destination static VIP2 SBS service STUN-TCP STUN-TCP
nat (any,outside) source dynamic any VIP2 destination static VIP2 Enterprise service RDESKTOP RDESKTOP
nat (any,outside) source dynamic any VIP2 destination static VIP2 Megabert service SQLServer SQLServer
nat (any,outside) source dynamic any VIP2 destination static VIP2 Megabert service SVN SVN
nat (any,outside) source dynamic any VIP2 destination static VIP2 Megabert service SourceOffsite SourceOffsite
nat (any,any) source dynamic any VIP2 destination static VIP2 Enterprise service SQLEnterprise SQLEnterprise
nat (inside,outside) source static mocogroup mocogroup destination static MOCOGROUP-vn1 MOCOGROUP-vn1
!
object network obj_any
 nat (any,outside) static interface
access-group outside_access_in in interface outside
access-group global_access global
route outside 0.0.0.0 0.0.0.0 213.1.240.65 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
http server enable
http 10.10.0.0 255.255.0.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
sysopt connection tcpmss 1350
crypto ipsec ikev1 transform-set AZURE_IPSecTransformSet esp-aes-256 esp-sha-hmac 
crypto ipsec security-association lifetime seconds 3600
crypto ipsec security-association lifetime kilobytes 102400000
crypto map AZURE_IPSecCryptoMap 10 match address AZURE
crypto map AZURE_IPSecCryptoMap 10 set peer ***.***.195.143 
crypto map AZURE_IPSecCryptoMap 10 set ikev1 transform-set AZURE_IPSecTransformSet
crypto map AZURE_IPSecCryptoMap interface outside
crypto ikev1 enable outside
crypto ikev1 policy 10
 authentication pre-share
 encryption aes-256
 hash sha
 group 2
 lifetime 28800
telnet timeout 5
ssh 10.10.0.0 255.255.0.0 inside
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
username admin password: ************* encrypted privilege 15
tunnel-group ***.***.195.143 type ipsec-l2l
tunnel-group ***.***.195.143 ipsec-attributes
 ikev1 pre-shared-key *****
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
&amp;nbsp; message-length maximum client auto
&amp;nbsp; message-length maximum 512
policy-map global_policy
 class inspection_default
&amp;nbsp; inspect dns preset_dns_map 
&amp;nbsp; inspect ftp 
&amp;nbsp; inspect h323 h225 
&amp;nbsp; inspect h323 ras 
&amp;nbsp; inspect rsh 
&amp;nbsp; inspect rtsp 
&amp;nbsp; inspect esmtp 
&amp;nbsp; inspect sqlnet 
&amp;nbsp; inspect skinny&amp;nbsp; 
&amp;nbsp; inspect sunrpc 
&amp;nbsp; inspect xdmcp 
&amp;nbsp; inspect sip&amp;nbsp; 
&amp;nbsp; inspect netbios 
&amp;nbsp; inspect tftp 
&amp;nbsp; inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:********************
: end&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259359#M357826</guid>
      <dc:creator>Thomas-Nicholson</dc:creator>
      <dc:date>2019-03-12T01:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259360#M357827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configurations do seem pretty messed up &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are simply configuring Static NAT for different servers and a Default PAT rule then I would suggest the following configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Default PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will let you configure the source networks for the Default PAT under the "object-group". For example if in the future you configured VPN Client and the Internet traffic of the VPN Clients would go through the ASA, you would need to only add the VPN Pool to the "object-group". Might need some other configurations too naturally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.10.0.0 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a public IP address reserver for each server then you simply configure a single Static NAT configuration for that server and open all the services/ports you need on the ACL attached to the "outside" interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example to configure a Static NAT and open TCP/80 from anywhere to that server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;LOCAL ip=""&gt;&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit tcp any object STATIC eq 80 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Where&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;STATIC = Is the name of the object we created. Both the source address for the NAT and the actual NAT configuration are contained under this object we create. We can also use it on the ACLs&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;local IP = Is the LAN IP address of the server behind the ASA&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;public IP = Is the public NAT IP address for the server&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check out this document I made for examples of the new configuration format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-31116" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 13:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259360#M357827</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-30T13:15:01Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259361#M357828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Firstly, thank you, however I'm not sure that'll do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wish it was as simple as a public IP address reserver for each server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;x.x.x.66 must send one port to one server and another port to another server (both from one known external host)&lt;/P&gt;&lt;P&gt;x.x.x.70 must send 4 ports to one server, 5 ports to another, and 1 to yet another.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 13:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259361#M357828</guid>
      <dc:creator>Thomas-Nicholson</dc:creator>
      <dc:date>2013-04-30T13:36:46Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259362#M357829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok, so you are using Static PAT (Port Forward) rather than Static NAT (1:1 NAT between IP addresses)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration format for that is not that different from the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network &lt;/STRONG&gt;&lt;OBJECT name=""&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;LOCAL ip=""&gt;&lt;/LOCAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static &lt;PUBLIC ip=""&gt; service tcp &lt;LOCAL port=""&gt; &lt;MAPPED port=""&gt;&lt;/MAPPED&gt;&lt;/LOCAL&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-TCP80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.10.10.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 1.1.1.2 service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in permit tcp any object STATIC-TCP80 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will have to make several "object" configuratins along with the required host/nat configurations to accomplish all that you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 14:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259362#M357829</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-30T14:18:29Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259363#M357830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have my device configured. I will try tomorrow and let you know how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 16:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259363#M357830</guid>
      <dc:creator>Thomas-Nicholson</dc:creator>
      <dc:date>2013-04-30T16:36:18Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259364#M357831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Works like a dream!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 17:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259364#M357831</guid>
      <dc:creator>Thomas-Nicholson</dc:creator>
      <dc:date>2013-05-01T17:19:38Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259365#M357832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear its working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 17:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-issue/m-p/2259365#M357832</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-01T17:23:43Z</dc:date>
    </item>
  </channel>
</rss>

