<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT solution in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747526#M532580</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santosh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rally happy it worked for you &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;, I also enjoyed wporking on it and finding the solution for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Aug 2011 13:23:49 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-08-26T13:23:49Z</dc:date>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747508#M532554</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a server in DMZ network with IP 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client VLANs(Local LAN users) are provided access to the 10.1.1.20&lt;/P&gt;&lt;P&gt;This server is also need to access via internet so created a NAT entry - Natted to public IP 192.168.1.20 (Just for understanding)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now client VLAN users are able to access the server on port 80 using IP 10.1.1.20,but unabe to access to 192.168.1.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any solution to have a access to public IP 192.168.1.20 on port 80 from Client VLAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/San&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747508#M532554</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2019-03-11T21:16:54Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747509#M532557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santosh, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes there is a way to make it working, now you would need to do u-turning on the firewall. But for that can you provide me the configuration that you have for the outside access?? This would be required, and then we can plan how to configure iot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 10:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747509#M532557</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T10:52:23Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747510#M532559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need the follwoing configuration for your inside users:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 192.168.1.20 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 5 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (DMZ) 5 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this should work for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. - This is if you assume, local LAN users are on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also tell me the nat statement that you have for the inside users to access the server on private ip??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 11:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747510#M532559</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T11:06:32Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747511#M532560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the solution... very soon i will share you the ACL's .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/San&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 11:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747511#M532560</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T11:51:56Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747512#M532562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No Problem Santosh, I would wait for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 11:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747512#M532562</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T11:55:55Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747513#M532563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the below ACLs and NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl-in extended permit tcp 10.1.3.0 255.255.255.192 host 10.1.1.20 eq www&lt;BR /&gt;access-list acl-in extended permit tcp 10.1.4.0 255.255.254.0 host 10.1.1.2o eq www&lt;BR /&gt;access-list acl-in extended permit tcp 10.1.1.0 255.255.254.0 host 10.1.1.20 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL is applied on inside interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;static (General_Services,Internet) tcp 192.168.1.20 www 10.1.1.20 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;General-Services is DMZ interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have general question - Is the solution is a standard and works as a normal... I feel that this is very strange requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more requirements I can share you...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/San&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 12:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747513#M532563</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T12:48:47Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747514#M532564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santosh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what your client needs it, they shoudl be able to access the server in DMZ, with both public and private ip right???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so , why do they need it to be??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 13:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747514#M532564</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T13:08:17Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747515#M532565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes your are correct they need access to public and private IP address from LAN.&lt;/P&gt;&lt;P&gt;This is due to some project requirements itseems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its not client.. its a local requirement....:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-San&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 13:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747515#M532565</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T13:47:22Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747516#M532567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santosh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a possible workaround for it because with normal natting we cannot do this otherwise it would say conflicting nat statements, the workaround is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list abc permit ip host 10.1.1.20 any&lt;/P&gt;&lt;P&gt;access-list xyz permit ip host 10.1.1.20 any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 192.168.1.20 access-list abc&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 10.1.1.20 access-list xyz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this works for you, can you also tell me the ASA version that you are using??? Because it has a software limitation when it was tested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 14:14:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747516#M532567</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T14:14:05Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747517#M532569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun, At present using this &lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Santhosh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 14:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747517#M532569</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T14:18:56Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747518#M532571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should definitely work then &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 14:22:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747518#M532571</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T14:22:47Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747519#M532573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both ABC and XYZ are having the same host, so is it not possible to use a single ACL, like below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list abc permit ip host 10.1.1.20 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 192.168.1.20 access-list abc&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 10.1.1.20 access-list abc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Santhosh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 14:32:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747519#M532573</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T14:32:31Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747520#M532574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No No, thats the catch, you would need to use different acl's &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 14:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747520#M532574</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T14:33:50Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747521#M532575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the ACL's and Statics as you given but no luck:(&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when i run packet tracer shows its allowed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Santhosh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 15:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747521#M532575</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T15:00:43Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747522#M532576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you just clear the xlate for the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear local-host 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and try again.If it does not work, can you take the output of "show xlate | in 10.1.1.20"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 15:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747522#M532576</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T15:15:15Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747523#M532577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At any time I'm only able to apply any one static NAT, below is the error messge while config 2nd static&lt;/P&gt;&lt;P&gt;ERROR: mapped-address conflict with existing static&lt;/P&gt;&lt;P&gt;&amp;nbsp; General_Services:10.1.1.20 to inside:192.168.1.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with this single static, below is the xlate output, after clearing the local xlate&lt;/P&gt;&lt;P&gt;Global 192.168.1.20 Local 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even when i configure this....I see from Local LAN unable to access 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-San&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 17:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747523#M532577</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-25T17:00:18Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747524#M532578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santosh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i had tried the config first before suggesting it to you, and it worked:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to first remove the configuration for that you have for the inside users, mainly this static:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (General_Services,Internet) tcp 192.168.1.20 www 10.1.1.20 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then apply the one that was provided earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Aug 2011 17:27:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747524#M532578</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-25T17:27:26Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747525#M532579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot for your support. It worked, &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Santhosh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Aug 2011 11:44:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747525#M532579</guid>
      <dc:creator>s-santhosh</dc:creator>
      <dc:date>2011-08-26T11:44:42Z</dc:date>
    </item>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747526#M532580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Santosh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rally happy it worked for you &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;, I also enjoyed wporking on it and finding the solution for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Aug 2011 13:23:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/1747526#M532580</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-26T13:23:49Z</dc:date>
    </item>
  </channel>
</rss>

