<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mapping servers behind an ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122145#M395673</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should have an ACL applied to the outside interface-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;show run | i access-group&lt;/SPAN&gt; will show you the name of the ACL and the interface it is attached to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there add an ACE to the ACL aaplied to the outside interface.&amp;nbsp; Something like the following-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list outside_access permit tcp any [outside ip] eq 10006&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tcp &lt;/SPAN&gt;is the protocol to allow, the &lt;SPAN style="font-family: 'courier new', courier;"&gt;any &lt;/SPAN&gt;is the source IP, the next IP is the destination which is your public IP and then 10006 is the port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update: Your new NAT's are correct BTW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Nov 2012 18:16:37 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2012-11-13T18:16:37Z</dc:date>
    <item>
      <title>Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122141#M395669</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following configuration: An ASA5505 with Security bundle license sits at the perimeter with a single public IP address assigned to VLAN2 (outside) out of a /29 block. I have two servers with static IP addresses of 10.70.21.6 and 10.70.21.7 connected to the inside ports with default gateway of 10.70.21.1 (which is the IP address for the VLAN1 inside). I have already configured a default static route and NATing (PAT) so we have internet connection for the PCs.&lt;/P&gt;&lt;P&gt;Now I need to configure the ASA to allow remote desktop connection to the servers (with static IP addresses above). Can I use a spare public IP address for each server and if so, whats the syntax? or is there another method? I have used this before but I had a Cisco 2811 router on the perimeter so the syntax was at then:&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.30.1.248 81.85.199.44&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122141#M395669</guid>
      <dc:creator>Talal Abbas</dc:creator>
      <dc:date>2019-03-12T00:22:42Z</dc:date>
    </item>
    <item>
      <title>Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122142#M395670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way, the ASA has 8.2(5) software.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 16:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122142#M395670</guid>
      <dc:creator>Talal Abbas</dc:creator>
      <dc:date>2012-11-13T16:04:15Z</dc:date>
    </item>
    <item>
      <title>Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122143#M395671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,outside) [outside ip] [inside ip] netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Example-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 69.222.73.41 10.70.21.6 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 69.222.73.42 10.70.21.7 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You'll also have to add the ports you want to allow in your ACL. Let me know if you have any questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 16:47:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122143#M395671</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2012-11-13T16:47:08Z</dc:date>
    </item>
    <item>
      <title>Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122144#M395672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many Thanks Collin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the new scenario, the good&amp;nbsp; guys at work added 5 more servers. I do not have enough public IP addresses. SO I plan to use the single public IP address assigned to VLAN2 (outside) and map using different ports say port 10006 for server with IP address 10.70.21.6 and port 10010 for server with IP address 10.70.21.10.&lt;/P&gt;&lt;P&gt;I will use Remote Desktop Connection with x.x.x.x:1000y where x.x.x.x is the VLAN2 IP address and y is the last IP digit (6, etc).&lt;/P&gt;&lt;P&gt;I used the following syntax:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10006 10.70.21.6 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3389 is the tcp port for rdp.&lt;/P&gt;&lt;P&gt;I still can't access the server. what is the ACL you are talking about? access lists are not exactly my strong point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 16:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122144#M395672</guid>
      <dc:creator>Talal Abbas</dc:creator>
      <dc:date>2012-11-13T16:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122145#M395673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should have an ACL applied to the outside interface-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;show run | i access-group&lt;/SPAN&gt; will show you the name of the ACL and the interface it is attached to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there add an ACE to the ACL aaplied to the outside interface.&amp;nbsp; Something like the following-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list outside_access permit tcp any [outside ip] eq 10006&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;tcp &lt;/SPAN&gt;is the protocol to allow, the &lt;SPAN style="font-family: 'courier new', courier;"&gt;any &lt;/SPAN&gt;is the source IP, the next IP is the destination which is your public IP and then 10006 is the port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Update: Your new NAT's are correct BTW&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 18:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122145#M395673</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2012-11-13T18:16:37Z</dc:date>
    </item>
    <item>
      <title>Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122146#M395674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so far nothing has worked for me. This is my configuration, so if someone could help pinpoint where did I go wrong:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname &lt;/P&gt;&lt;P&gt;domain-name .com&lt;/P&gt;&lt;P&gt;enable password /V encrypted&lt;/P&gt;&lt;P&gt;passwd /V encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.70.21.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 176.28.79.210 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner login $ Welcome to&amp;nbsp; ASA1 for&amp;nbsp; $&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name .com&lt;/P&gt;&lt;P&gt;access-list Server6 extended permit tcp any host 176.28.79.211 eq 10006&lt;/P&gt;&lt;P&gt;access-list Server6 extended permit tcp any host 176.28.79.211 eq 10007&lt;/P&gt;&lt;P&gt;access-list Server6 extended permit tcp any host 176.28.79.211 eq 10003&lt;/P&gt;&lt;P&gt;access-list Server6 extended permit tcp any host 176.28.79.211 eq 10004&lt;/P&gt;&lt;P&gt;access-list Server6 extended permit tcp any host 176.28.79.211 eq 10005&lt;/P&gt;&lt;P&gt;access-list Server6 extended permit tcp any host 176.28.79.211 eq 10010&lt;/P&gt;&lt;P&gt;access-list Server6 extended deny ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.70.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10006 10.70.21.6 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10007 10.70.21.7 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10003 10.70.21.3 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10004 10.70.21.4 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10005 10.70.21.5 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 10010 10.70.21.10 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group Server6 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 176.28.79.209 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 15&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username Cisco password .Cjopxf encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything works fine except for the remote RDP, I have PAT, local telnet, and remote ssh all working perfectly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2012 08:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122146#M395674</guid>
      <dc:creator>Talal Abbas</dc:creator>
      <dc:date>2012-11-14T08:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Mapping servers behind an ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122147#M395675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;static (inside,outside) tcp interface 10006 10.70.21.6 3389 netmask 255.255.255.255&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT translates the outside interface (.210) to the inside server, however your ACL is only allowing to host .211.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either change your NAT's to match your ACL-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;static (inside,outside) tcp 176.28.79.211 10006 10.70.21.6 3389 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;static (inside,outside) tcp 176.28.79.211 10007 10.70.21.7 3389 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;static (inside,outside) tcp 176.28.79.211 10003 10.70.21.3 3389 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;static (inside,outside) tcp 176.28.79.211 10004 10.70.21.4 3389 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;static (inside,outside) tcp 176.28.79.211 10005 10.70.21.5 3389 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;static (inside,outside) tcp 176.28.79.211 10010 10.70.21.10 3389 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or change your ACL to match your NAT's-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list Server6 extended permit tcp any host 176.28.79.210 eq 10006&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list Server6 extended permit tcp any host 176.28.79.210 eq 10007&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list Server6 extended permit tcp any host 176.28.79.210 eq 10003&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list Server6 extended permit tcp any host 176.28.79.210 eq 10004&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list Server6 extended permit tcp any host 176.28.79.210 eq 10005&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;access-list Server6 extended permit tcp any host 176.28.79.210 eq 10010&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2012 15:49:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mapping-servers-behind-an-asa5505/m-p/2122147#M395675</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2012-11-14T15:49:40Z</dc:date>
    </item>
  </channel>
</rss>

