<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help me in Natting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671955#M536111</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun for the post,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured as u said for all&amp;nbsp; IP address, but whenever i'll try to ping 2.2.2.5 its not ping from internet.please suggets, please give me sample config for my senario for one ip IP 2.2.2.5 only, i will manage other, please help me ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jul 2011 11:09:45 GMT</pubDate>
    <dc:creator>pawanharlecisco</dc:creator>
    <dc:date>2011-07-13T11:09:45Z</dc:date>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671952#M536105</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Please see the daigram attached .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Internet leased line which is connected&amp;nbsp; to "Outside "Interface of ASA 5510.I address are mentioned in Daigram.&lt;/P&gt;&lt;P&gt;I have Few Public IP address given by ISP. I want to do static&amp;nbsp; NAT in ASA for accessing my server from Internet, i am fresher in configuring&amp;nbsp; ASA ,please guide me .I have also want 192.168.5.10;&amp;nbsp; 192.168.5.11; 192.168.5.12;&amp;nbsp; 192.168.5.13 this IP ca use Internet also, for OS updates&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public ip 2.2.2.5&amp;nbsp; mapped to 192.168.5.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public ip 2.2.2.6&amp;nbsp; mapped to 192.168.5.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public ip 2.2.2.7&amp;nbsp; mapped to 192.168.5.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public ip 2.2.2.8&amp;nbsp; mapped to 192.168.5.13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please guide me.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:58:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671952#M536105</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2019-03-11T20:58:27Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671953#M536108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config that you would need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.5 192.168.5.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;exactly the same needs to be done for teh othere servers as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have any queries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 10:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671953#M536108</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T10:45:06Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671954#M536110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is configuration guide for NAT on ASA:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 10:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671954#M536110</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T10:50:15Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671955#M536111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Varun for the post,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured as u said for all&amp;nbsp; IP address, but whenever i'll try to ping 2.2.2.5 its not ping from internet.please suggets, please give me sample config for my senario for one ip IP 2.2.2.5 only, i will manage other, please help me ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 11:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671955#M536111</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-13T11:09:45Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671956#M536112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok lets take the case of ping on the firewall for ip 2.2.2.5:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you would need an access-list on the outside interface,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the nat command:&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.5 192.168.5.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first make sure you are able to ping the ip 192.168.5.10 from the firewall, by doing "ping inside 192.168.5.10" and then test it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 11:21:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671956#M536112</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T11:21:23Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671957#M536113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Varun Sir Thanks for the support,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have configured as u suggested. Now i am able to ping 2.2.2.5; 2.2.2.6; 2.2.2.7. but not able to access this Ip, i want to permit all services from Public side.Below is&amp;nbsp; sh run for the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please kindly help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 2.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 192.168.5.10&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.5 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.6 192.168.5.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.7 192.168.5.12 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:b3e81ffd949d793e351873ae46369086&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 12:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671957#M536113</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-13T12:08:08Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671958#M536114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just add the acl's:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any host 2.2.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do it simialrly for other servers as well, and it would work after that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 12:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671958#M536114</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T12:40:05Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671959#M536115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Varun Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i have applied this acl "access-list outside_access_in permit ip any host 2.2.2.5" for all ip address but stil its not done. I m not able to access Internel servers. Please suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pawan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 06:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671959#M536115</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T06:11:00Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671960#M536116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide me the running config from the ASA after adding all the changes that I had suggested you, it shoudl work, I'll have a look at it and let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 06:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671960#M536116</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-14T06:22:53Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671961#M536118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Actually i&amp;nbsp; have done a mistake while appling acces-list.&amp;nbsp; After corecting it, now m able to access the servers from outside. Thanks Sir for the your support.below is sh run of asa .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 2.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 2.2.2.5&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 2.2.2.6&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 2.2.2.7&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.5 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.6 192.168.5.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.7 192.168.5.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:d791dcca076fc2bbf6662f149c8377bd&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pawan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 06:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671961#M536118</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T06:33:08Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671962#M536119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey thats good..... &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Let me know if you afce any other issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 06:35:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671962#M536119</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-14T06:35:32Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671963#M536121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure sir.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 06:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671963#M536121</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T06:55:43Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671964#M536122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In the same topoploy , i have now pluged one bsnl modem in the interface e0,to give internet access to 192.168.5.0 network. for this i have configured below configuration but&amp;nbsp; m not able to access internet using bsnl modem. but from 2.2.2.0 network m able to access the server as we configured recently. kindly suggets me.how can it be&amp;nbsp; possile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTIN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.5.2 interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (bsnl) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;........&lt;/P&gt;&lt;P&gt;pawan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 07:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671964#M536122</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T07:05:35Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671965#M536123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you paste the running config again??? and can you tell me what changes you've done??? You have removed the 2.2.2.1 router and are now uising a bsnl modem instead???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 07:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671965#M536123</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-14T07:10:16Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671966#M536124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No i have not removed 2.2.2.1 router. I have pluged bsnl in E0 inteface.below is sh run, after making changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif bsnl&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.100.200 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 2.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 2.2.2.5&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 2.2.2.6&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any host 2.2.2.7&lt;/P&gt;&lt;P&gt;access-list OUTIN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.5.2 interface outside&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu bsnl 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (bsnl) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.5 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.6 192.168.5.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.7 192.168.5.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 2&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:d791dcca076fc2bbf6662f149c8377bd&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 07:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671966#M536124</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T07:19:54Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671967#M536126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We cannot have two default routes on the ASA, the packet would always take the route defined by lower mettric which is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure why you are implementing such a thing, you have two interfaces configured through which the same internal network would access internet, so that would get complicated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are just testing the bsnl modem link, remove the first route and then add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and moreover on interface e0, you have a private IP address, and we woudl need a public IP like 2.2.2.2 to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also these access-list are not needed:&lt;/P&gt;&lt;P&gt;access-list OUTIN extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp any any&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp host 192.168.5.2 interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 07:35:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671967#M536126</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-14T07:35:55Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671968#M536127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i want use bsnl as my default route. and give static route for servers because there are only some specific ip add which will acess the server thats y no need give default route towards 2.2.2.1.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Now my purpose the that,&lt;/P&gt;&lt;P&gt;1: the network 192.168.5.0 will use internet using bsnl line&lt;/P&gt;&lt;P&gt;2:and is some specific ip add want to access the server then they have to use 2.2.2.0 newtork which we was statically natted earlier.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 10:10:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671968#M536127</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T10:10:14Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671969#M536129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as per your requirement here is the config that you can try:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.5 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.6 192.168.5.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 2.2.2.7 192.168.5.12 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host 2.2.2.5&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host 2.2.2.6&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host 2.2.2.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 10 access-list 101 outside&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration would allow only traffic from your 2.2.2.1 router for you internal servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the routes should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (bsnl) 1 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it and let me know if it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 11:06:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671969#M536129</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-14T11:06:51Z</dc:date>
    </item>
    <item>
      <title>Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671970#M536131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you sir,it done sucessfully .&lt;/P&gt;&lt;P&gt;please c below config. If still need any change tell me.From below config if there is any useless command i configured,please guide&amp;nbsp; me so that i can remove it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.100.200 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif rbi&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 2.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any host 2.2.2.5&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any host 2.2.2.6&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any host 2.2.2.7&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu rbi 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;nat (outside) 10 access-list 101 outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,rbi) 2.2.2.5 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,rbi) 2.2.2.6 192.168.5.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,rbi) 2.2.2.7 192.168.5.12 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;P&gt;access-group 101 in interface rbi&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 100&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:00000000000000000000000000000000&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 16:08:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671970#M536131</guid>
      <dc:creator>pawanharlecisco</dc:creator>
      <dc:date>2011-07-14T16:08:29Z</dc:date>
    </item>
    <item>
      <title>Re: Help me in Natting</title>
      <link>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671971#M536132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Pawan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything looks good to me except these lines below, intsead of them you need to add these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;global (outside) 1 interface&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;nat (rbi) 10 access-list 101 outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;/P&gt;&lt;P&gt;route rbi 0.0.0.0 0.0.0.0 2.2.2.1 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and remove this statement:&lt;/P&gt;&lt;PRE&gt;access-group 101 in interface rbi&lt;/PRE&gt;
we don't need it, the access-list 101 was created just to be used in the nat statement.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;BR /&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; nameif rbi&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 2.2.2.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (inside) 10 interface&lt;/P&gt;&lt;P&gt;nat (outside) 10 access-list 101 outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;access-group 101 in interface rbi&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.100.1 1&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.1 100&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this works,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jul 2011 17:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-me-in-natting/m-p/1671971#M536132</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-14T17:55:52Z</dc:date>
    </item>
  </channel>
</rss>

