<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic static nat or static policy nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022897#M398227</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Hi again, there's something else i would like to clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But&amp;nbsp; if you would like static policy NAT to match first, then remove&amp;nbsp; your&amp;nbsp; existing static statement, then configure the static policy NAT and&amp;nbsp;&amp;nbsp; reconfigure the static NAT statement as follows:&lt;/P&gt;&lt;P&gt;no static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.26.1.1 access-list static-nat&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the static policy NAT will be on top of the static NAT, and the static policy NAT will take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If&amp;nbsp; 172.21.1.1 10.1.1.1 netmask 255.255.255.255 is placed after the static&amp;nbsp; policy nat, will the static&amp;nbsp; 172.21.1.1 10.1.1.1 netmask 255.255.255.255&amp;nbsp; rule still work?&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Oct 2012 09:10:16 GMT</pubDate>
    <dc:creator>Boon Peng Poh</dc:creator>
    <dc:date>2012-10-05T09:10:16Z</dc:date>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022889#M398210</link>
      <description>&lt;P&gt;Hi, I have a question regarding static natting and static policy natting. (asa5500)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a scenario here. In the existing nat rule table, there is an existing static 1:1 for this ip address(e.g. source address - 10.1.1.1 to 172.21.1.1) However, this source (10.1.1.1) needs to access to another server and I am required to nat the source ip into another range (172.26.x.x) in order for the source to access the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, if I add a static policy nat (source: 10.1.1.1 destination:server's ip, server interface:172.26.x.x) will it work while keeping my static 1:1 or do I have to delete the static 1:1 and configure another static policy nat for it?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022889#M398210</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2019-03-12T00:04:07Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022890#M398211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Static statements whether they are static NAT or static Policy NAT, they are matched in order of the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have:&lt;/P&gt;&lt;P&gt;access-list static-nat permit ip host 10.1.1.1 host &lt;DESTINATION-SERVER&gt;&lt;/DESTINATION-SERVER&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.26.1.1 access-list static-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then: "static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255" will be matched first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you would like static policy NAT to match first, then remove your existing static statement, then configure the static policy NAT and reconfigure the static NAT statement as follows:&lt;/P&gt;&lt;P&gt;no static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.26.1.1 access-list static-nat&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the static policy NAT will be on top of the static NAT, and the static policy NAT will take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that answers your question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022890#M398211</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022891#M398213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only had to do the configuration you mentioned once&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The situation was that the user already had a Static NAT for public IP address. Then we had to configure a L2L VPN where the partner wanted to NAT the users IP address to something else (even though its public address).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I did a Static Policy NAT also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do remember that we had a problem with this after I issued the Static Policy NAT command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I removed the Static NAT for the public IP address and issued the same command again. Might be that there was something with the order of the NAT commands on the ASA (running below 8.2 software then)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that change it has seemed to work fine so it I think it should be ok in your case too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Gah! Jennifer beat me to it &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022891#M398213</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-04T13:26:11Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022892#M398215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am new to cisco ASA actually, I am using the ASDM to configure the firewall. So that means, my newly added static nat rule won't take effect due to the existing static 1:1 rule unless I remove that rule and re-add in after the static policy nat rule. If I want the source to be able to access to both servers, I can also configure 2 static policy nat rules pointing to 2 different server ip and using 2 different natted ip.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:35:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022892#M398215</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2012-10-04T13:35:43Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022893#M398216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are absolutely correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:39:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022893#M398216</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:39:03Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022894#M398220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That cleared my doubts. Thanks a lot. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022894#M398220</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2012-10-04T13:45:14Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022895#M398223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Only by 4 minutes, Jouni &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Great answer too btw.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022895#M398223</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:47:57Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022896#M398226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again, there's something else i would like to clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you would like static policy NAT to match first, then remove&amp;nbsp; your existing static statement, then configure the static policy NAT and&amp;nbsp; reconfigure the static NAT statement as follows:&lt;/P&gt;&lt;P&gt;no static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.26.1.1 access-list static-nat&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the static policy NAT will be on top of the static NAT, and the static policy NAT will take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 172.21.1.1 10.1.1.1 netmask 255.255.255.255 is placed after the static policy nat, will the static&amp;nbsp; 172.21.1.1 10.1.1.1 netmask 255.255.255.255 rule still work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 09:08:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022896#M398226</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2012-10-05T09:08:30Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022897#M398227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Hi again, there's something else i would like to clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But&amp;nbsp; if you would like static policy NAT to match first, then remove&amp;nbsp; your&amp;nbsp; existing static statement, then configure the static policy NAT and&amp;nbsp;&amp;nbsp; reconfigure the static NAT statement as follows:&lt;/P&gt;&lt;P&gt;no static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.26.1.1 access-list static-nat&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.21.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so the static policy NAT will be on top of the static NAT, and the static policy NAT will take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that answers your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If&amp;nbsp; 172.21.1.1 10.1.1.1 netmask 255.255.255.255 is placed after the static&amp;nbsp; policy nat, will the static&amp;nbsp; 172.21.1.1 10.1.1.1 netmask 255.255.255.255&amp;nbsp; rule still work?&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 09:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022897#M398227</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2012-10-05T09:10:16Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022898#M398230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the static NAT rule will still work.&lt;/P&gt;&lt;P&gt;If it doesn't match the static policy NAT which is on top of the static NAT, then it will go down the static NAT/policy NAT list and will match the second one in the list which is the static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 09:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022898#M398230</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-05T09:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022899#M398233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my understanding on how the NAT works for ASA software 8.2 and below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The order in which NAT configurations are applied are to my understanding the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;NAT0 / NAT excemption with access-list&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Example:&lt;/STRONG&gt; nat (inside) 0 access-list INSIDE-NAT0&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Static NAT/PAT with or without Policy configurations&amp;nbsp; &lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Static NAT:&lt;/STRONG&gt; static (inside,outside) 1.2.3.4 10.10.10.0 netmask 255.255.255.255&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Static PAT:&lt;/STRONG&gt; static (inside,outside) tcp 1.2.3.4 80 10.10.10.10 80 netmask 255.255.255.255&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Static Policy NAT:&lt;/STRONG&gt; static (inside,outside) 1.2.3.4 access-list STATIC-POLICY-NAT&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Dynamic Policy NAT/PAT&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;global (outside) 100 1.2.3.4&lt;/LI&gt;&lt;LI&gt;nat (inside) 100 access-list LAN-POLICY-NAT&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Dynamic NAT/PAT&lt;/STRONG&gt;&lt;UL&gt;&lt;LI&gt;global (outside) 1 1.2.3.4&lt;/LI&gt;&lt;LI&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the above is the order in which ASA goes through the NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as with your case, you are trying to determine the order in which the same type of NAT configurations are used. Meaning you are using Static NAT and Static Policy NAT and they are in a sense equal I guess so they have to be in order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly the old software doesnt have any number parameter for the order of your Static NAT (or other) so you have to manually delete the reapply the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case IF you have the normal Static NAT first in the configurations (when issuing the "show run static" command on the CLI of the ASA) and then have the Static Policy NAT, to my understanding the normal Static NAT will override the Static Policy NAT always as the normal applies to all traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Now when you remove the normal Static NAT and enter it again it naturally goes to the very bottom of the Static NAT configurations and therefore the ASA sees the Static Policy NAT first and rest of the traffic hits the Static NAT that you have re-entered to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Again &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;EDIT 2:&lt;/STRONG&gt; I have to mention though that I never use ASDM for NAT configuration (even with the new softwares) I only use CLI so I might miss alot of options you might have on the ASDM side. To my understanding for example even though the ASA doesnt have ordering for NAT configurations (with an order number parameters in the NAT configurations), you can still enter a Static NAT rule into certain spot in the configurations through ASDM. What this does to my understanding is that the ASDM will actually remove alot of Static NAT commands out of the way and insert your new Static NAT configuration in the right spot. After this it will add the Static NAT configurations it just removed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Be sure to change the setting in the ASDM side to preview the configurations ASDM sends to ASA and you will see what CLI commands the ASA actually does. Its a good way to see whats actually happening with the configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 09:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022899#M398233</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-10-05T09:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022900#M398236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So I see, if you want the policy nat rule to work, it has to be placed in priority before the static 1:1. If static 1:1 is in placed before the policy nat, it will overwrite the policy nat. Static 1:1 rule on the other hand will always work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 10:23:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022900#M398236</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2012-10-05T10:23:43Z</dc:date>
    </item>
    <item>
      <title>static nat or static policy nat</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022901#M398239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the examples, this forum is really helpful I must say &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Oct 2012 10:24:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-or-static-policy-nat/m-p/2022901#M398239</guid>
      <dc:creator>Boon Peng Poh</dc:creator>
      <dc:date>2012-10-05T10:24:42Z</dc:date>
    </item>
  </channel>
</rss>

