<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re:Nat/Firewalling in ver 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034091#M438460</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vlan 20 is goin to use the ASA as the gateway. I wanted to use the same physical interface on which the n5k recieves the def-route from the ASA (vlan 10 in my case) and all the other vlans have their respective sub-intf as gateway on the ASA. Could have achieved this by 2 seperate phy links, one as a layer3 link for ospf adjacency to recieve a def-route on the sw and other just a pure layer2 trunk-link to carry all the vlans tagged to the ASA's sub-intfes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Sep 2012 21:58:56 GMT</pubDate>
    <dc:creator>sandevsingh</dc:creator>
    <dc:date>2012-09-17T21:58:56Z</dc:date>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034078#M438437</link>
      <description>&lt;P&gt;Hi, i have a use-case in which we need to firewall some of the security-sensitive-vlans to the ASA. In other words, there are few vlans that have their SVIs on the N5k (Layer-3 enabled) which talk to each other and there are some which have the layer-3 on the ASA. The ASA has sub-interfaces for those vlans. The N5k-sw and the ASA are interconnected on the same 1 physical link with a sub-interface on both ( /30) and the ASA is injecting default route to it in OSPF. They are advertising all of their networks in OSPF. I see all the routes in them. (Attached pic) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My issue is: I am unable to ping the other sub-interface on the ASA from the N5k. (If you check the attached diagram, i cannot ping 20.1.1.1 from the N5k, although i can reach my next-hop 10.1.1.2) I have made the security-level to 100 for the subinterfaces and the physical interface on the ASA, also have allowed ip,icmps in the ACLs on the sub-interfaces of vlan 10 and 20 in both directions , BUT still no luck.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF I REPLICATE THIS SAME SETUP BY REPLACING THE ASA WITH ANOTHER L-3 ROUTER, IT ALL WORKS FOR ME.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;So i am suspecting something NAT rule on the ASA, as i know a lot has changed in ver 8.4 for natting. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034078#M438437</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2019-03-11T23:53:28Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034079#M438439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sandevsingh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before getting into the configuration file just for you to know the ASA was built in order to deny traffic to a far end ( distant) interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is a far end interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are on the inside you will be able to ping the inside interface, you will be able to access outside users but you will NOT be able to ping, ssh, telnet,etc,etc,etc the outside interface Ip address of the ASA...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in your case if you are on a specific vlan and try to ping the ASA sub-interface IP on another vlan you will be denied no matter what.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other question.. Let me know.. Just remember to rate all of my answers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Sep 2012 21:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034079#M438439</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-12T21:04:13Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034080#M438441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Complitely agree with Julio, this is not possible on an ASA firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See the &lt;SPAN style="background-color: #ffffff; color: #336666; font-family: Arial, Helvetica, sans-serif; font-size: 13px;"&gt;Pinging Security Appliance Interfaces document&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html#wp1059645"&gt;http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.html#wp1059645&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Sep 2012 17:43:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034080#M438441</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-09-13T17:43:35Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034081#M438443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your replies guys, agreed the far-end interface will never ping. &lt;/P&gt;&lt;P&gt;BUT i cannot reach the GW on vlan 20 if i attach a laptop to the n5k-sw in same vlan. (Ps refer my previous visio). &lt;/P&gt;&lt;P&gt;Here is my firewall relevant config - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover# sh run interface | begin 0/9&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9&lt;/P&gt;&lt;P&gt; description Nexus-Lab2&lt;/P&gt;&lt;P&gt; nameif lab1&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.10&lt;/P&gt;&lt;P&gt; vlan 10&lt;/P&gt;&lt;P&gt; nameif lab2&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.1.1.2 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface TenGigabitEthernet0/9.20&lt;/P&gt;&lt;P&gt; vlan 20&lt;/P&gt;&lt;P&gt; nameif lab3&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 20.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover(config)# sh run access-list&lt;/P&gt;&lt;P&gt;access-list lab2-in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list lab2-in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list lab3-in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list lab3-in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list lab2-out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list lab2-out extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list lab3-out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list lab3-out extended permit icmp any any&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover(config)#&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover(config)# sh run access-gro&lt;/P&gt;&lt;P&gt;access-group lab2-in in interface lab2&lt;/P&gt;&lt;P&gt;access-group lab2-out out interface lab2&lt;/P&gt;&lt;P&gt;access-group lab3-in in interface lab3&lt;/P&gt;&lt;P&gt;access-group lab3-out out interface lab3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any clues or i am being nuts !! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 20:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034081#M438443</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2012-09-14T20:03:11Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034082#M438446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the following&lt;/P&gt;&lt;P&gt;cap capin interface lab3 match icmp client_ip host&amp;nbsp; 20.1.1.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to ping the 20.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provide me the following information&lt;/P&gt;&lt;P&gt;-show cap capin&lt;/P&gt;&lt;P&gt;-show cap asp | include 20.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any other question.. Let me know.. Just remember to rate all of my answers.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 20:43:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034082#M438446</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-14T20:43:32Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034083#M438449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you able to ping the ASA from the switch?&lt;/P&gt;&lt;P&gt;If you try to ping the PC from the ASA do you see an arp entry?&lt;/P&gt;&lt;P&gt;Can you share the configuration on the switch interface that connects to TenGigabitEthernet0/9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 20:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034083#M438449</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-09-14T20:47:32Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034084#M438451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, will post all this info on moday as these poc subnets are not enabled over the vpn. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Sep 2012 21:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034084#M438451</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2012-09-14T21:57:53Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034085#M438453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Folks, here is the int config on the n5k swich - &lt;/P&gt;&lt;P&gt;poc-sw#&lt;/P&gt;&lt;P&gt;interface Ethernet1/17&lt;/P&gt;&lt;P&gt;&amp;nbsp; no switchport&lt;/P&gt;&lt;P&gt;&amp;nbsp; speed 1000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet1/17.10&lt;/P&gt;&lt;P&gt;&amp;nbsp; encapsulation dot1q 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.1.1.1/30&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip router ospf 100 area 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet1/17.20&lt;/P&gt;&lt;P&gt;&amp;nbsp; encapsulation dot1q 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot ping the laptop (20.1.1.100) from the ASA, no arp entry. There are no results in the capture filters and the above acls do not show any hit-counts. -&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover# show cap&lt;/P&gt;&lt;P&gt;capture capin type raw-data interface lab3 [Capturing - 0 bytes]&lt;/P&gt;&lt;P&gt;&amp;nbsp; match icmp host 20.1.1.100 any&lt;/P&gt;&lt;P&gt;capture asp type asp-drop all circular-buffer [Capturing - 6956 bytes]&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover#&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover# show cap asp | in&lt;/P&gt;&lt;P&gt;poc-asa1/actNoFailover# show cap asp | include 20.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like the traffic is not reaching the ASA sub-interface when exiting out of the switch`s sub-intf, so ...WTH??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 14:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034085#M438453</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2012-09-17T14:42:34Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034086#M438455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you are trying to use a L3 switch as L2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On interface E1/17.10 you configured an IP address with mask /30 &lt;/P&gt;&lt;P&gt;On interface E1/17.20 you also need an IP address and this switch will do routing from the LAN network to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 18:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034086#M438455</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-09-17T18:18:18Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034087#M438456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did that, no luck..... Can ping b/w the ASA and the N5k-sw now..BUT the laptop still does not ping either of them... I am stumped !!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 20:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034087#M438456</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2012-09-17T20:01:43Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034088#M438457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Post the configuration of the Nexus port connecting to the Laptop!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 20:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034088#M438457</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-17T20:17:20Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034089#M438458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;interface Ethernet1/9&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 20&lt;/P&gt;&lt;P&gt;&amp;nbsp; speed 1000&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 20:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034089#M438458</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2012-09-17T20:29:13Z</dc:date>
    </item>
    <item>
      <title>Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034090#M438459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sandevsingh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I understood at the description of the problem you will use the ASA as the default gateway for vlan 20. So on the nexus side this interface ( the one connecting to the ASA) Should stay as a layer 2 trunk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now my question is witch interfaces are going to use the ASA as the default gateway? Can I have the vlans that will do that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 20:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034090#M438459</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-17T20:55:35Z</dc:date>
    </item>
    <item>
      <title>Re:Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034091#M438460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vlan 20 is goin to use the ASA as the gateway. I wanted to use the same physical interface on which the n5k recieves the def-route from the ASA (vlan 10 in my case) and all the other vlans have their respective sub-intf as gateway on the ASA. Could have achieved this by 2 seperate phy links, one as a layer3 link for ospf adjacency to recieve a def-route on the sw and other just a pure layer2 trunk-link to carry all the vlans tagged to the ASA's sub-intfes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 21:58:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034091#M438460</guid>
      <dc:creator>sandevsingh</dc:creator>
      <dc:date>2012-09-17T21:58:56Z</dc:date>
    </item>
    <item>
      <title>Re:Nat/Firewalling in ver 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034092#M438461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Indeed that is what needs to be done!&lt;/P&gt;&lt;P&gt;You must use one port as a dedicated layer 2 trunk.&lt;/P&gt;&lt;P&gt;You should create the vlan on the nexus switch&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt;name test&lt;/P&gt;&lt;P&gt;Then just use x port to the asa&lt;/P&gt;&lt;P&gt;interface giga x/x&lt;/P&gt;&lt;P&gt;switchport mode trunk&lt;/P&gt;&lt;P&gt;switchport trunk allow vlan 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2012 22:06:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-firewalling-in-ver-8-4/m-p/2034092#M438461</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-09-17T22:06:00Z</dc:date>
    </item>
  </channel>
</rss>

