<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Outside interface to connect to multiple machines inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765974#M494527</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What exactly are you trying to accomplish with this solution. I'm assuming your trying to load balance here. Please see the script below, as should solve your problem. Also below that you will find the 'sh xlate' output from my test unit. I only did 4 hosts, so you will have to do the rest, but let me know how this works out. Thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!---start&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!-below is the ACL bound to the outside 'public' interface&lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2180 &lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2181 &lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2182 &lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2183 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!-ACL that will be referenced by the static PAT statements&lt;/P&gt;&lt;P&gt;access-list pat-acl-1a extended permit tcp host 192.168.111.10 eq 21379 any &lt;/P&gt;&lt;P&gt;access-list pat-acl-1b extended permit tcp host 192.168.111.11 eq 21379 any &lt;/P&gt;&lt;P&gt;access-list pat-acl-1c extended permit tcp host 192.168.111.12 eq 21379 any &lt;/P&gt;&lt;P&gt;access-list pat-acl-1d extended permit tcp host 192.168.111.13 eq 21379 any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!-below are the static PAT statements referencing the above ACL&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2180 access-list pat-acl-1a &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2181 access-list pat-acl-1b &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2182 access-list pat-acl-1c &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2183 access-list pat-acl-1d &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!---end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!---output of translation table after applied (ie. show xlate)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh xlate&lt;/P&gt;&lt;P&gt;4 in use, 4 most used&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2180) Local 192.168.111.10(21379)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2181) Local 192.168.111.11(21379)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2182) Local 192.168.111.12(21379)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2183) Local 192.168.111.13(21379)&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Nov 2011 20:06:14 GMT</pubDate>
    <dc:creator>caseth0102</dc:creator>
    <dc:date>2011-11-01T20:06:14Z</dc:date>
    <item>
      <title>Using Outside interface to connect to multiple machines inside</title>
      <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765971#M494522</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;I have been working on a configuration for single IP address (on outside ) of ASA5505 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;I am trying to utilize the outside address 192.168.0.249 to PAT/NAPT to 10 inside machines&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2180 -&amp;gt;192.168.111.10:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2181 -&amp;gt;192.168.111.11:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2182 -&amp;gt;192.168.111.12:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2183 -&amp;gt;192.168.111.13:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2184 -&amp;gt;192.168.111.14:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2185 -&amp;gt;192.168.111.15:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2186 -&amp;gt;192.168.111.16:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2187 -&amp;gt;192.168.111.17:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2188 -&amp;gt;192.168.111.18:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2189 -&amp;gt;192.168.111.19:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;192.168.0.204:2190 -&amp;gt;192.168.111.20:21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;I have createdd acces-list &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.10 eq 21380&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.11 eq 21381&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.12 eq 21382&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.13 eq 21383&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.14 eq 21384&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.15 eq 21385&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.16 eq 21386&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.17 eq 21387&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;access-list outside_access_in extended permit tcp any host 192.168.111.18 eq 21388&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21380 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec11&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21381 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec12&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21382 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec13&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21383 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec14&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21384 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21385 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec16&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21386 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec17&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21387 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec18&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21388 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec19&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21389 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;object network ispec20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;nat (inside,outside) static interface service tcp 21390 21379&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;What I am not sure of (actually that could be considered all encompassing) is the mapped services/real services&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: book antiqua,palatino;"&gt;Any constructive comments assistance?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:43:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765971#M494522</guid>
      <dc:creator>tgnovak</dc:creator>
      <dc:date>2019-03-11T21:43:59Z</dc:date>
    </item>
    <item>
      <title>Using Outside interface to connect to multiple machines inside</title>
      <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765972#M494523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your configuration is close, but you should swap the real and mapped ports. For example: &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;object network ispec10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) static interface service tcp 21379 21380 &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;You can confirm this with the packet-tracer output: &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;packet-tracer in outside tcp 1.2.3.4 12345 192.168.0.204 21380&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;When you run that command, you should see that the IP of the server is untranslated from 192.168.0.204:21380 to 192.168.111.10:21379&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Nov 2011 14:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765972#M494523</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-11-01T14:40:12Z</dc:date>
    </item>
    <item>
      <title>Using Outside interface to connect to multiple machines inside</title>
      <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765973#M494525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for the response. That reaffirms my later findings&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made those changes and tested with packet-trace.&amp;nbsp; It was just late to repost to supportforum&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for my lack of followup&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Once again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Nov 2011 15:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765973#M494525</guid>
      <dc:creator>tgnovak</dc:creator>
      <dc:date>2011-11-01T15:01:52Z</dc:date>
    </item>
    <item>
      <title>Using Outside interface to connect to multiple machines inside</title>
      <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765974#M494527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What exactly are you trying to accomplish with this solution. I'm assuming your trying to load balance here. Please see the script below, as should solve your problem. Also below that you will find the 'sh xlate' output from my test unit. I only did 4 hosts, so you will have to do the rest, but let me know how this works out. Thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!---start&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!-below is the ACL bound to the outside 'public' interface&lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2180 &lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2181 &lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2182 &lt;/P&gt;&lt;P&gt;access-list outside-to-inside extended permit tcp any host 192.168.0.204 eq 2183 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!-ACL that will be referenced by the static PAT statements&lt;/P&gt;&lt;P&gt;access-list pat-acl-1a extended permit tcp host 192.168.111.10 eq 21379 any &lt;/P&gt;&lt;P&gt;access-list pat-acl-1b extended permit tcp host 192.168.111.11 eq 21379 any &lt;/P&gt;&lt;P&gt;access-list pat-acl-1c extended permit tcp host 192.168.111.12 eq 21379 any &lt;/P&gt;&lt;P&gt;access-list pat-acl-1d extended permit tcp host 192.168.111.13 eq 21379 any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!-below are the static PAT statements referencing the above ACL&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2180 access-list pat-acl-1a &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2181 access-list pat-acl-1b &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2182 access-list pat-acl-1c &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 2183 access-list pat-acl-1d &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!---end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!---output of translation table after applied (ie. show xlate)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh xlate&lt;/P&gt;&lt;P&gt;4 in use, 4 most used&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2180) Local 192.168.111.10(21379)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2181) Local 192.168.111.11(21379)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2182) Local 192.168.111.12(21379)&lt;/P&gt;&lt;P&gt;PAT Global 192.168.0.204(2183) Local 192.168.111.13(21379)&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Nov 2011 20:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765974#M494527</guid>
      <dc:creator>caseth0102</dc:creator>
      <dc:date>2011-11-01T20:06:14Z</dc:date>
    </item>
    <item>
      <title>Using Outside interface to connect to multiple machines inside</title>
      <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765975#M494528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jean&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was not load balancing. &lt;/P&gt;&lt;P&gt;Customer has 11 internal machine that they collect data from and restricts me to one external address. &lt;/P&gt;&lt;P&gt;They use the OPC standard (DCOM) for communication. &lt;/P&gt;&lt;P&gt;There is a OPC tunnel deployed to transit the firewall (uses port 21379 on internal machines) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The requirement is to use only one external IP address (outside interface) to inside machines . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Thomas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 09:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765975#M494528</guid>
      <dc:creator>tgnovak</dc:creator>
      <dc:date>2011-11-02T09:11:18Z</dc:date>
    </item>
    <item>
      <title>Using Outside interface to connect to multiple machines inside</title>
      <link>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765976#M494529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tgnovak-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure why your reply states as such. The script above will work. I built out an environment (which is now production), which is exactly what your asking. If you look at the 'sh xlate' output above, it clearly show PAT from a single outside IP to 4 internal IP's. What I posted is indeed your solution. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 14:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-outside-interface-to-connect-to-multiple-machines-inside/m-p/1765976#M494529</guid>
      <dc:creator>caseth0102</dc:creator>
      <dc:date>2011-11-02T14:14:37Z</dc:date>
    </item>
  </channel>
</rss>

