<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 - No Internet Using Static NAT Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823398#M460502</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually just removed: "Translate the DNS replies that match the translation rule" from the NAT Options in the ASDM and that didn't make a difference. &lt;/P&gt;&lt;P&gt;I do have: &lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inbound extended permit tcp any host 69.xx.xx.63 eq www&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;(since my 192.168.123.100 NAT rule points to 69.xx.xx.63) &lt;/P&gt;&lt;P&gt;But I don't have: &lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inbound extended permit tcp any any eq domain&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;What is that one for? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I apologize again but I'm not savy with Cisco's configuration and commands, I was not the one who configured this environment, and since it's a production environment I don't want to change stuff if I don't full understand what is doing so I appreciate your patience. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Feb 2012 14:24:10 GMT</pubDate>
    <dc:creator>moises.ruiz</dc:creator>
    <dc:date>2012-02-06T14:24:10Z</dc:date>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823382#M460486</link>
      <description>&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;I'm trying to configure a second server on my network but whenever I add the static NAT rule, the internet stops working on that computer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;Here's my Cisco ASA configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname domain&lt;/P&gt;&lt;P&gt;domain-name domain.ca&lt;/P&gt;&lt;P&gt;enable password M6aAV/2UhVYeSYwL encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.123.126 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 69.xx.xx.60 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.226.226 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd M6aAV/2UhVYeSYwL encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name domain.ca&lt;/P&gt;&lt;P&gt;access-list crypto_acl_10 extended permit ip 192.168.123.0 255.255.255.0 192.168.205.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.123.0 255.255.255.0 192.168.205.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 192.168.123.0 255.255.255.0 192.168.99.0 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.61 eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.61 eq https &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.61 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.61 eq pop3 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit gre any host 69.xx.xx.61 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.61 eq pptp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.58 eq 8080 &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.61 eq ftp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.63 eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.63 eq https &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any host 69.xx.xx.63 eq smtp &lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any host 69.xx.xx.63 &lt;/P&gt;&lt;P&gt;access-list vpnclient_splitTunnelAcl standard permit 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list guest_access_in extended deny ip 192.168.226.0 255.255.255.0 192.168.123.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list guest_access_in extended permit ip 192.168.226.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list guest_access_in extended permit ip any any inactive &lt;/P&gt;&lt;P&gt;access-list guest_access_in extended permit tcp any host 192.168.226.4 &lt;/P&gt;&lt;P&gt;access-list guest_access_in extended permit tcp any eq smtp host 192.168.226.4 eq smtp &lt;/P&gt;&lt;P&gt;access-list guest_access_out extended permit ip host 192.168.226.2 host 69.70.178.122 &lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip host 69.xx.xx.63 host 69.70.178.122 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging buffered errors&lt;/P&gt;&lt;P&gt;logging asdm warnings&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;ip local pool remotevpn 192.168.99.10-192.168.99.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any guest&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-523.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (guest) 1 0.0.0.0 0.0.0.0 dns&lt;/P&gt;&lt;P&gt;static (inside,outside) 69.xx.xx.61 192.168.123.4 netmask 255.255.255.255 dns &lt;/P&gt;&lt;P&gt;static (inside,outside) 69.xx.xx.58 192.168.123.200 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 69.xx.xx.63 192.168.123.58 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;access-group guest_access_in in interface guest&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 69.xx.xx.57 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 64.254.232.224 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;http 69.70.4.112 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 10 match address crypto_acl_10&lt;/P&gt;&lt;P&gt;crypto map outside_map 10 set peer 64.254.232.248 &lt;/P&gt;&lt;P&gt;crypto map outside_map 10 set transform-set ESP-AES-MD5 ESP-AES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal&amp;nbsp; 20&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 64.254.232.224 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;ssh 69.70.4.112 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;ssh 69.70.178.122 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.226.4-192.168.226.100 guest&lt;/P&gt;&lt;P&gt;dhcpd dns 24.200.241.37 interface guest&lt;/P&gt;&lt;P&gt;dhcpd enable guest&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;ntp server 199.212.17.21 source outside&lt;/P&gt;&lt;P&gt;ntp server 199.212.17.22 source outside&lt;/P&gt;&lt;P&gt;ntp server 209.87.233.53 source outside&lt;/P&gt;&lt;P&gt;ntp server 132.246.168.148 source outside&lt;/P&gt;&lt;P&gt;group-policy vpnclient internal&lt;/P&gt;&lt;P&gt;group-policy vpnclient attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.123.4&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value vpnclient_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value domain.local&lt;/P&gt;&lt;P&gt; split-dns value domain.local &lt;/P&gt;&lt;P&gt;username mmintzberg password 8fAM98BTuTuY/jU2 encrypted&lt;/P&gt;&lt;P&gt;username fross password Ykti5THH7ftFZeWp encrypted&lt;/P&gt;&lt;P&gt;username jsilver password 0VSZ094cAtFEZuxW encrypted&lt;/P&gt;&lt;P&gt;username mgadmin password 3Nrrh9/fcmJrMiH2 encrypted privilege 15&lt;/P&gt;&lt;P&gt;username smintzberg password .RPWyyJt7YbCb94T encrypted&lt;/P&gt;&lt;P&gt;username smintzberg attributes&lt;/P&gt;&lt;P&gt; vpn-framed-ip-address 192.168.99.22 255.255.255.0&lt;/P&gt;&lt;P&gt;username mruiz password j8Scwuudo9vNlzVa encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 64.254.232.248 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 64.254.232.248 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group vpnclient type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group vpnclient general-attributes&lt;/P&gt;&lt;P&gt; address-pool remotevpn&lt;/P&gt;&lt;P&gt; default-group-policy vpnclient&lt;/P&gt;&lt;P&gt;tunnel-group vpnclient ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:ca6a95011ce78d4d850a5127af0d245c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Moises Ruiz
Updated ASA running configuration&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823382#M460486</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2019-03-11T22:20:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823383#M460487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the static nat you trying to add is the same public IP which is config on the outside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jan 2012 16:03:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823383#M460487</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-01-30T16:03:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823384#M460488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm sorry guys, I've been rushing with other stuff. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now I have a static NAT Rule set to 192.168.123.100 but there's no DHCP reservation for that IP, as soon as I set a DHCP reservation for the server in the Inside interface I will loose the internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've updated the running configuration in my original message.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 02:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823384#M460488</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-02T02:22:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823385#M460489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Iam not sure if this is normal behaviour, but you can try clearing the existing 'xlate' for this single ip (local or global) after setting up the reservation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 02:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823385#M460489</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-02-02T02:35:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823386#M460490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How will I do that? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 02:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823386#M460490</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-02T02:37:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823387#M460491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the syntax...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;A name="wp2048864"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To clear current translation and connection information, use the &lt;STRONG&gt;clear xlate &lt;/STRONG&gt;command in privileged EXEC mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp2048865"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;clear xlate&lt;/STRONG&gt; [&lt;STRONG&gt;global&lt;/STRONG&gt; &lt;EM&gt;ip1&lt;/EM&gt;[&lt;STRONG style="font-weight: bold;"&gt;-&lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;ip2&lt;/EM&gt;] [&lt;STRONG&gt;netmask&lt;/STRONG&gt; &lt;EM&gt;mask&lt;/EM&gt;]] [&lt;STRONG style="font-weight: bold;"&gt;local &lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;ip1&lt;/EM&gt;[&lt;STRONG style="font-weight: bold;"&gt;-&lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;ip2&lt;/EM&gt;] [&lt;STRONG&gt;netmask&lt;/STRONG&gt; &lt;EM&gt;mask&lt;/EM&gt;]] &lt;BR /&gt;[&lt;STRONG style="font-weight: bold;"&gt;gport &lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;port1&lt;/EM&gt;[&lt;STRONG style="font-weight: bold;"&gt;-&lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;port2&lt;/EM&gt;]] [&lt;STRONG&gt;lport&lt;/STRONG&gt; &lt;EM&gt;port1&lt;/EM&gt;[&lt;STRONG style="font-weight: bold;"&gt;-&lt;/STRONG&gt;&lt;EM style="font-weight: normal;"&gt;port2&lt;/EM&gt;]] [&lt;STRONG&gt;interface&lt;/STRONG&gt; &lt;EM&gt;if_name&lt;/EM&gt;] [&lt;STRONG&gt;state&lt;/STRONG&gt; &lt;EM&gt;state&lt;/EM&gt;]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your scenario, you can issue the command.. clear xlate local 192.168.123.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure the server still holds IP &amp;amp; DNS once you reserve the IP. From server end, you can release &amp;amp; renew IP config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 02:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823387#M460491</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-02-02T02:52:22Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823388#M460492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I forgot how to connect and run on the exec mode but on the ASDM I executed the command and nothing changed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm newbie to Cisco appliances. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 23:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823388#M460492</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-02T23:59:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823389#M460493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Moises,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is an issue with DHCP instead of NAT.&lt;/P&gt;&lt;P&gt;You said the issue starts when you reserve the IP.&lt;/P&gt;&lt;P&gt;Just to confirm the ASA is not the DCHP server for the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you clear the arp table (after you reserve the IP of the server) and then try to access the internet, do you see arp entries on the ASA? Or can you still ping the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 00:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823389#M460493</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-02-03T00:37:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823390#M460494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the update Moises. But when you reserve the IP, have you checked if the server still holds IP &amp;amp; DNS ?&lt;/P&gt;&lt;P&gt;I beiieve you need to release &amp;amp; renew IP config on the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 03:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823390#M460494</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-02-03T03:36:08Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823391#M460495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside,outside) 69.xx.xx.63 192.168.123.100 netmask 255.255.255.255 &lt;STRONG&gt;dns &lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like wrong NAT config if you want to browse net.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;static (inside,outside) 172.20.1.10 192.168.100.10 netmask 255.255.255.255 &lt;STRONG&gt;dns&lt;/STRONG&gt;
&lt;EM&gt;
&lt;SPAN style="color: #0000ff;"&gt;!--- The "dns" keyword is added to instruct the security appliance to modify 
!--- DNS records related to this entry.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml&lt;/A&gt;&lt;/P&gt;&lt;EM&gt;&lt;SPAN style="color: #0000ff;"&gt; &lt;/SPAN&gt; &lt;/EM&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 10:42:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823391#M460495</guid>
      <dc:creator>jyothydas</dc:creator>
      <dc:date>2012-02-03T10:42:08Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823392#M460496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The issue starts when I add the NAT rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, there's a different DHCP server on the inside network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cleared the ARP table, I can still ping the router and the ASA and I do see entries in the ARP table. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 22:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823392#M460496</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-03T22:31:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823393#M460497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The server still has the same IP &amp;amp; DNS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 22:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823393#M460497</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-03T22:32:12Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823394#M460498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not sure what I need to do lyothydas? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I want is to be able to assign an static IP 9inside and outside) so that I can setup services that go to the outside world. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 22:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823394#M460498</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-03T22:38:30Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823395#M460499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Can you try the NAT without the dns keywork. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 23:37:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823395#M460499</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2012-02-03T23:37:28Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823396#M460500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried removing the DNS in the NAT rule but didn't change anything. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Feb 2012 21:40:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823396#M460500</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-04T21:40:55Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823397#M460501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean your command was &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside)&amp;nbsp; 69.70.71.72 192.168.123.100 netmask 255.255.255.255 and it did not work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you should have similar ACL which should allow http/dns commn. (Or did I miss to see it in your config)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list inbound extended permit tcp any any eq domain &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Feb 2012 09:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823397#M460501</guid>
      <dc:creator>jyothydas</dc:creator>
      <dc:date>2012-02-06T09:40:03Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 - No Internet Using Static NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823398#M460502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually just removed: "Translate the DNS replies that match the translation rule" from the NAT Options in the ASDM and that didn't make a difference. &lt;/P&gt;&lt;P&gt;I do have: &lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inbound extended permit tcp any host 69.xx.xx.63 eq www&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;(since my 192.168.123.100 NAT rule points to 69.xx.xx.63) &lt;/P&gt;&lt;P&gt;But I don't have: &lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inbound extended permit tcp any any eq domain&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;What is that one for? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I apologize again but I'm not savy with Cisco's configuration and commands, I was not the one who configured this environment, and since it's a production environment I don't want to change stuff if I don't full understand what is doing so I appreciate your patience. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Feb 2012 14:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-no-internet-using-static-nat-rules/m-p/1823398#M460502</guid>
      <dc:creator>moises.ruiz</dc:creator>
      <dc:date>2012-02-06T14:24:10Z</dc:date>
    </item>
  </channel>
</rss>

