<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 - Routing between Interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195190#M359369</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is connected to the "outside" interface of the ASA? If its some host directly and trying to ping it does it has its default gateway set to be the "outside" interface IP address of the ASA? If not the ICMP or any other connection to it wont work since it doesnt have a return route for the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also notice that you cant PING an ASA interface IP address behind another interface. You can only ping the ASA interface behind that same interface. Hosts behind "inside" can PING "inside" and hosts behind "outside" can ping "outside" and so on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont really need this configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no static (outside,inside) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of this ASA? Are you simply trying to lab something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also just incase, you could also add the &lt;STRONG&gt;"fixup protocol icmp"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Mar 2013 14:37:11 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-03-27T14:37:11Z</dc:date>
    <item>
      <title>ASA 5510 - Routing between Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195189#M359367</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; font-size: 14px; line-height: 18px;"&gt;I have a WAN interface and 2 LAN interface. I need both the LAN be able to access a server outside the network via the WAN (outside) interface. I am using a ASA 5510 firewall instead of a router, because I don't have a router.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;It looks simple enough but it does not work. I ping from the a PC (172.16.22.8) connected to LAN (inside) Network to 10.10.10.1 which is the WAN local interface also did not work.&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;But from the ASA Firewall, I could ping my LAN (inside) PC. I followed a config i get from this forum. However, it did not work. Below my config. Please help.&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;interface Ethernet0/0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;nameif outside&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;security-level 0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;ip address 10.10.10.1 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;!&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;interface Ethernet0/1&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;nameif inside&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;security-level 100&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;ip address 172.16.22.254 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;!&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;interface Ethernet0/2&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;nameif inside2&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;security-level 50&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;ip address 172.16.21.254 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;!&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;access-list outside-inside extended permit ip any any&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;access-list outside-inside extended permit icmp any any&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;static (inside,outside) 172.16.22.0 172.16.22.0 netmask 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;static (outside,inside) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0px 0px 1em; font-size: 14px; vertical-align: baseline; background-color: #ffffff; clear: both; word-wrap: break-word; color: #000000; font-family: Arial, 'Liberation Sans', 'DejaVu Sans', sans-serif; line-height: 18px;"&gt;access-group outside-inside in interface outside&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195189#M359367</guid>
      <dc:creator>suryashiva</dc:creator>
      <dc:date>2019-03-12T01:20:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 - Routing between Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195190#M359369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is connected to the "outside" interface of the ASA? If its some host directly and trying to ping it does it has its default gateway set to be the "outside" interface IP address of the ASA? If not the ICMP or any other connection to it wont work since it doesnt have a return route for the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also notice that you cant PING an ASA interface IP address behind another interface. You can only ping the ASA interface behind that same interface. Hosts behind "inside" can PING "inside" and hosts behind "outside" can ping "outside" and so on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont really need this configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no static (outside,inside) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of this ASA? Are you simply trying to lab something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also just incase, you could also add the &lt;STRONG&gt;"fixup protocol icmp"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 14:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195190#M359369</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-27T14:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Routing between Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195191#M359371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for replying. It is a live network, I am trying to connect. I attached the diagram. The cloud is a wireless network.&lt;/P&gt;&lt;P&gt;The connectivity looks simple. I am trying to connect 2 servers together using a firewall instead of a router. The left side of the cloud is customer's. That part I have no access to. They are using some other brand firewall. The right side is the Cisco ASA 5510. That is the ASA, I am trying to configure.&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/5/9/132957-Problem%20Network%20Diagram.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.10.10.3 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.22.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;nameif inside2&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.21.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside-inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list outside-inside extended permit icmp any any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.22.0 172.16.22.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group outside-inside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Surya Shiva&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 15:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195191#M359371</guid>
      <dc:creator>suryashiva</dc:creator>
      <dc:date>2013-03-27T15:14:21Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 - Routing between Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195192#M359374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some questions still as we cant see the whole configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is the idea to get both server networks connect to eachtother with their original IP addresses? In other words I assume that there is no need for actual NAT?&lt;/LI&gt;&lt;LI&gt;Have you made sure that both your firewall has a route for the network 172.16.106.0/24 towards the other firewall and that the other firewall has a route for network 172.16.22.0/24 towards your firewall?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I may suggest, you could try to remove those NAT configurations and go with the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 remark NO NAT Configurations&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 172.16.22.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 172.16.22.0 255.255.255.0 172.16.106.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also make sure that you either have the default route or specific route towards the other firewall so that routing from your part will work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 10.10.10.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 172.16.106.0 255.255.255.0 10.10.10.4&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesnt help I think we would need to see the whole firewall configuration. Also possibly will need to make sure that the other firewall is configured correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 16:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195192#M359374</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-27T16:09:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Routing between Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195193#M359377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Is the idea to get both server networks connect to eachtother with their original IP addresses? In other words I assume that there is no need for actual NAT?&lt;/LI&gt;&lt;LI&gt;Answer : Yes, with the original IP address&lt;/LI&gt;&lt;LI&gt;Have you made sure that both your firewall has a route for the network 172.16.106.0/24 towards the other firewall and that the other firewall has a route for network 172.16.22.0/24 towards your firewall?&lt;/LI&gt;&lt;LI&gt;Answer : Yes, the other firewall can Ping my Firewall interface. Mine however, cannot ping the other firewall interface.&lt;/LI&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is the other firewall is not Cisco. I think it is Juniper. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try the config tomorrow and update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 0px; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 16:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195193#M359377</guid>
      <dc:creator>suryashiva</dc:creator>
      <dc:date>2013-03-27T16:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - Routing between Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195194#M359380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if you can ping the other firewall from your firewall doesnt mean that the end to end routing is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewalls are directly connected by the same network 10.10.10.0/24 so provided the actual connectivity is fine they should be able to ping eachtother. You not being able to ping their firewall might simply be due to their firewall prventing it or simply not replying to your ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said, if this doesnt work would really need to see some more configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that you can also simulate traffic going through the ASA to see how the ASA would handle it. The command is "packet-tracer" and for you to simulate a HTTP connection coming from your server to the other could be tested with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 172.16.22.8 12345 172.16.106.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The output of this command should tell what rules the traffic hits. It doesnt actually create that traffic but simulates how the ASA would handle this type of connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: For some reason when I check this discussion the page is all bent out of shape. I dont know if anyone else is seeing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Mar 2013 16:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-routing-between-interface/m-p/2195194#M359380</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-27T16:29:35Z</dc:date>
    </item>
  </channel>
</rss>

