<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic map a public ip to a private IP in DMZ in ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002729#M401743</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am now using ASA 5510 as a firewall device.I have configured 3 interfaces ethernet 0/0,ethernet 0/1,ethernet 0/2 as Wan interface, DMZ interface and Internal Lan interface. Internet is working fine from LAN as well as DMZ.The WAN interface use the Public Point 2 point IP(/30) Provided by the ISP and&amp;nbsp; another pool of Public Ip is also provided by the ISP (/28). Now I want to Map the /28 IP to some servers in DMZ . DMZ servers currently have 192.168.101.0/27 private IP . Now the problem is how to Map the Public IP to those Private IP in DMZ servers.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:33:34 GMT</pubDate>
    <dc:creator>1madhavkarki</dc:creator>
    <dc:date>2019-03-11T23:33:34Z</dc:date>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002729#M401743</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am now using ASA 5510 as a firewall device.I have configured 3 interfaces ethernet 0/0,ethernet 0/1,ethernet 0/2 as Wan interface, DMZ interface and Internal Lan interface. Internet is working fine from LAN as well as DMZ.The WAN interface use the Public Point 2 point IP(/30) Provided by the ISP and&amp;nbsp; another pool of Public Ip is also provided by the ISP (/28). Now I want to Map the /28 IP to some servers in DMZ . DMZ servers currently have 192.168.101.0/27 private IP . Now the problem is how to Map the Public IP to those Private IP in DMZ servers.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:33:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002729#M401743</guid>
      <dc:creator>1madhavkarki</dc:creator>
      <dc:date>2019-03-11T23:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002730#M401744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;For Version till 8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command to MAP private to public&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) public_ip 192.168.101.X netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Permission provided for access&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outsidein extended permit ip any host public_ip&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Access list applied on interface on which public pool lands&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outsidein in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here interface name is outside and access list name is outsidein.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 06:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002730#M401744</guid>
      <dc:creator>gouravbathla</dc:creator>
      <dc:date>2012-07-23T06:54:56Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002731#M401745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, I will try the Command , it may help me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 06:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002731#M401745</guid>
      <dc:creator>1madhavkarki</dc:creator>
      <dc:date>2012-07-23T06:58:04Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002732#M401746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using Cisco Adaptive Security Appliance Software Version 8.4(2). so the &lt;STRONG&gt;static (inside,outside) public_ip 192.168.101.X netmask 255.255.255.255 &lt;/STRONG&gt;command doesnot work, any appropriate command for the above version ?? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 07:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002732#M401746</guid>
      <dc:creator>1madhavkarki</dc:creator>
      <dc:date>2012-07-23T07:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002733#M401747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Post 8.2 version&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network MYSERVER&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;host 192.168.101.x&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) static public_ip&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Permission provided for access&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outsidein extended permit ip any object MYSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Access list applied on interface on which public pool lands&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group outsidein in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 07:06:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002733#M401747</guid>
      <dc:creator>gouravbathla</dc:creator>
      <dc:date>2012-07-23T07:06:11Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002734#M401748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I configured my ASA 5510 with the above commands but now the server is not being able to connect to internet and the mapped public ip is not being able to get ping from internet as well as from the Same network inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 05:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002734#M401748</guid>
      <dc:creator>1madhavkarki</dc:creator>
      <dc:date>2012-07-24T05:19:21Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002735#M401749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Please provide me your running config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command for same is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;show running-config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 06:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002735#M401749</guid>
      <dc:creator>gouravbathla</dc:creator>
      <dc:date>2012-07-24T06:03:39Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002736#M401751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi , here is the running config :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password zzzzzzzz encrypted&lt;/P&gt;&lt;P&gt;passwd zzzzzzzzzzz encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif wan1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.xxx 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.101.1 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif INTERNAL-LAN&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.200.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;regex domainlist1 "login.live.com"&lt;/P&gt;&lt;P&gt;regex domainlist2 "login.live.com"&lt;/P&gt;&lt;P&gt;regex domainlist3 "yahoo.com"&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;time-range always&lt;/P&gt;&lt;P&gt; periodic daily 0:00 to 23:59&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;time-range off_hour&lt;/P&gt;&lt;P&gt; periodic daily 17:30 to 23:59&lt;/P&gt;&lt;P&gt; periodic daily 0:00 to 10:00&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;time-range office_hour&lt;/P&gt;&lt;P&gt; periodic daily 10:00 to 17:30&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa842-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone NPT 5 45&lt;/P&gt;&lt;P&gt;dns domain-lookup INTERNAL-LAN&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt; name-server xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.101.0&lt;/P&gt;&lt;P&gt; subnet 192.168.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network full_access_grp&lt;/P&gt;&lt;P&gt; host 192.168.40.92&lt;/P&gt;&lt;P&gt;object service Net_bios_port&lt;/P&gt;&lt;P&gt; service tcp source range 0 65535 destination range 445 445&lt;/P&gt;&lt;P&gt;object network VLAN-40&lt;/P&gt;&lt;P&gt; subnet 192.168.40.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Test&lt;/P&gt;&lt;P&gt; host 192.168.40.25&lt;/P&gt;&lt;P&gt;object network testserver&lt;/P&gt;&lt;P&gt; host 192.168.101.3&lt;/P&gt;&lt;P&gt;object network mappedserver&lt;/P&gt;&lt;P&gt; host 192.168.40.92&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network Full_access_grp&lt;/P&gt;&lt;P&gt; network-object host 192.168.40.92&lt;/P&gt;&lt;P&gt; network-object host 192.168.40.14&lt;/P&gt;&lt;P&gt;object-group network Top_levels&lt;/P&gt;&lt;P&gt; network-object host 192.168.40.30&lt;/P&gt;&lt;P&gt;object-group network FB_allowed_grp&lt;/P&gt;&lt;P&gt; network-object host 192.168.33.50&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;access-list mappedip extended permit ip any object testserver&lt;/P&gt;&lt;P&gt;access-list mappedip extended permit ip any object mappedserver&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu wan1 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu INTERNAL-LAN 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645-204.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (INTERNAL-LAN,wan1) dynamic interface&lt;/P&gt;&lt;P&gt;object network testserver&lt;/P&gt;&lt;P&gt; nat (DMZ,wan1) static xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;object network mappedserver&lt;/P&gt;&lt;P&gt; nat (INTERNAL-LAN,wan1) static xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;access-group mappedip in interface wan1&lt;/P&gt;&lt;P&gt;route wan1 0.0.0.0 0.0.0.0 yyy.yyy.yyy.yyy 1&lt;/P&gt;&lt;P&gt;route INTERNAL-LAN 10.10.1.0 255.255.255.0 192.168.200.1 3&lt;/P&gt;&lt;P&gt;route INTERNAL-LAN 10.10.2.0 255.255.255.0 192.168.200.1 3&lt;/P&gt;&lt;P&gt;route INTERNAL-LAN 10.10.3.0 255.255.255.0 192.168.200.1 3&lt;/P&gt;&lt;P&gt;route INTERNAL-LAN 192.168.32.0 255.255.224.0 192.168.200.1 50&lt;/P&gt;&lt;P&gt;route INTERNAL-LAN 192.168.99.0 255.255.255.248 192.168.200.1 3&lt;/P&gt;&lt;P&gt;route DMZ 192.168.101.0 255.255.255.0 192.168.101.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 INTERNAL-LAN&lt;/P&gt;&lt;P&gt;http 192.168.101.0 255.255.255.0 DMZ&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no service password-recovery&lt;/P&gt;&lt;P&gt;telnet 192.168.200.0 255.255.255.252 INTERNAL-LAN&lt;/P&gt;&lt;P&gt;telnet 192.168.40.92 255.255.255.255 INTERNAL-LAN&lt;/P&gt;&lt;P&gt;telnet 192.168.40.0 255.255.255.0 INTERNAL-LAN&lt;/P&gt;&lt;P&gt;telnet 192.168.32.0 255.255.224.0 INTERNAL-LAN&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type regex match-any DomainBlockList&lt;/P&gt;&lt;P&gt; match regex domainlist1&lt;/P&gt;&lt;P&gt; match regex domainlist2&lt;/P&gt;&lt;P&gt; match regex domainlist3&lt;/P&gt;&lt;P&gt;class-map type regex match-any Blocklist&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all BlockDomainsClass&lt;/P&gt;&lt;P&gt; match request header host regex class DomainBlockList&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; class BlockDomainsClass&lt;/P&gt;&lt;P&gt;&amp;nbsp; reset log&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http http_inspection_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; user-statistics accounting&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;Cryptochecksum:daf6cc93137b486a20a15b926adc22c0&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 07:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002736#M401751</guid>
      <dc:creator>1madhavkarki</dc:creator>
      <dc:date>2012-07-24T07:23:44Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002737#M401752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Please change the security level it should be like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;security-level 50&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip address 192.168.101.1 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;nameif INTERNAL-LAN&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip address 192.168.200.2 255.255.255.252&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 08:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002737#M401752</guid>
      <dc:creator>gouravbathla</dc:creator>
      <dc:date>2012-07-24T08:54:58Z</dc:date>
    </item>
    <item>
      <title>map a public ip to a private IP in DMZ in ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002738#M401756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Gourav,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Command Worked. All the problem with the server not getting pinged was the Routing Problem for the Public_IP From the ISP to our gateway P2P IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2012 10:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/map-a-public-ip-to-a-private-ip-in-dmz-in-asa-5510/m-p/2002738#M401756</guid>
      <dc:creator>1madhavkarki</dc:creator>
      <dc:date>2012-07-25T10:33:43Z</dc:date>
    </item>
  </channel>
</rss>

