<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Natting Web Server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587677#M564626</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Those captures are showing resets coming from the internal IP, that is the server. Somehow that server is resetting the connection. Were you able to add the inspect http on the policy map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you access that server coming from another host on the same subnet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Mar 2011 13:54:12 GMT</pubDate>
    <dc:creator>PAUL GILBERT ARIAS</dc:creator>
    <dc:date>2011-03-03T13:54:12Z</dc:date>
    <item>
      <title>Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587670#M564605</link>
      <description>&lt;P&gt;Hello Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied a static Nat for 1&amp;nbsp; of the server in DMZ interface , I have done proper static Nat and also given for port 80 traffic on outside access list,The strange thing is when i do capture on my outside interface for public IP i recieve the packets for my web server but the connection is not complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit any host &amp;lt;public IP&amp;gt;&lt;/P&gt;&lt;P&gt;capture test access-list test interface outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I m testing by&amp;nbsp; telnet &amp;lt;public IP&amp;gt; 80 from the internet (not by local corporate internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a AIP SSM module configured in promiscous mode and i have checked in show service policy for any drops but 0 drop count on outside and DMZ interface,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PUBLIC IP&amp;nbsp; what i m using for web server was on standby ip for outside interface of secondary ASA ,i removed the standby command from primary ASA and put only 1 IP , After removing the IP i did clear arp on ASA and also on DMZ switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface gig0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;ip add X.X.X.X 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The servers in DMZ are all in same subnet of DMZ interface so there is no issues of putting route in ASA as they are directly connected to DMZ interface of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints experts why Web Server is not accessible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587670#M564605</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2019-03-11T19:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587671#M564608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what do you mean about the connection is not complete? What do you see on the capture?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to capture the 3-way hanshake you will need to capture also the return traffic. You will need another ACL allowing that return traffic, for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit any host &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;access-list test permit host &lt;PUBLIC ip=""&gt; any &lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;capture test access-list test interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that you will be able to see the 3-way handshake and the rest of the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 16:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587671#M564608</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-02T16:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587672#M564611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the capture outputs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA(config)# sh capture test1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:59:40.207890 188.135.54.227.62625 &amp;gt; 85.154.250.91.80: S 2147037942:2147037942(0) win 8192 &lt;MSS 1420=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 22:59:40.787862 188.135.54.227.62625 &amp;gt; 85.154.250.91.80: S 2147037942:2147037942(0) win 8192 &lt;MSS 1420=""&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 22:59:41.367870 188.135.54.227.62625 &amp;gt; 85.154.250.91.80: S 2147037942:2147037942(0) win 8192 &lt;MSS 1420=""&gt;&lt;BR /&gt;3 packets shown&lt;BR /&gt;PrimaryASA(config)# sh capture test2&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 22:59:40.208332 192.168.100.66.80 &amp;gt; 188.135.54.227.62625: R 0:0(0) ack 3662606484 win 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 22:59:40.788121 192.168.100.66.80 &amp;gt; 188.135.54.227.62625: R 0:0(0) ack 3966402778 win 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 22:59:41.368129 192.168.100.66.80 &amp;gt; 188.135.54.227.62625: R 0:0(0) ack 3335440784 win 0&lt;BR /&gt;3 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test2 permit tcp host 192.168.100.66 any&lt;BR /&gt;PrimaryASA(config)# access-list test2 permit tcp host 192.168.100.66 any&lt;BR /&gt;PrimaryASA(config)# &lt;STRONG style="color: #ff0000; "&gt;capture test2 access-list test2 interface dmz&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA(config)# sh access-list test2&lt;BR /&gt;access-list test2; 1 elements; name hash: 0x2bb0eb81&lt;BR /&gt;&lt;STRONG style="color: #ff0000; "&gt;access-list test2 line 1 extended permit tcp host 192.168.100.66 any (hitcnt=3) 0xc2c1cc37&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Private IP of server is replying&lt;/STRONG&gt; see above the 3 hits counts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA(config)# sh access-list test1&lt;BR /&gt;access-list test1; 2 elements; name hash: 0x1d34f6f2&lt;BR /&gt;access-list test1 line 1 extended permit tcp any host 85.154.250.91 eq www (hitcnt=3) 0x7ae5a997&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list test1 line 2 extended permit tcp host 85.154.250.91 any eq www (hitcnt=0) 0xa8a33d1d&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA(config)# &lt;STRONG style="color: #ff0000; "&gt;capture test1 access-list test1 interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;There is no reply from Natted IP to the internet host&lt;/STRONG&gt; hit counts are 0 see above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 19:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587672#M564611</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-02T19:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587673#M564614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have logs enabled on the ASA? It seems that the ASA is stopping the response or it is being filtered by the AIP.&lt;/P&gt;&lt;P&gt;If you could share the config it would be great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 19:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587673#M564614</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-02T19:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587674#M564617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the config attached please open with notepad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 20:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587674#M564617</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-02T20:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587675#M564620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One more thing I just noticed about the ACLs you are using for the captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACLs for the outside capture are not correct since the reply packet has source port 80 and destination port will be random.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please modfy the ACLS. You can use the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test1 line 1 extended permit tcp any host 85.154.250.91 eq www&lt;BR /&gt;&lt;SPAN&gt;&lt;STRONG&gt;access-list test1 line 2 extended permit tcp host 85.154.250.91 &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;STRONG&gt;eq www&amp;nbsp; &lt;/STRONG&gt;&lt;STRONG&gt;any &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Apply that capture to the outside interface and test again.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additionally I was not able to see any inspection for HTTP traffic. That might also help you.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Mar 2011 20:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587675#M564620</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-02T20:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587676#M564622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per u suggest the access-list i changed&amp;nbsp; i see the replies being sent by the firewall below, but connection is not established.see the attachment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA(config)# sh capture test1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 10:14:16.385844 188.135.99.148.54315 &amp;gt; 85.154.250.91.80: S 3224297895:3224297895(0) win 8192 &lt;MSS 1420=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 10:14:16.386347 85.154.250.91.80 &amp;gt; 188.135.99.148.54315: R 1338370117:1338370117(0) ack 3224297896 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 10:14:17.044858 188.135.99.148.54315 &amp;gt; 85.154.250.91.80: S 3224297895:3224297895(0) win 8192 &lt;MSS 1420=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 10:14:17.045178 85.154.250.91.80 &amp;gt; 188.135.99.148.54315: R 1600904395:1600904395(0) ack 3224297896 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 10:14:17.650799 188.135.99.148.54315 &amp;gt; 85.154.250.91.80: S 3224297895:3224297895(0) win 8192 &lt;MSS 1420=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 10:14:17.651104 85.154.250.91.80 &amp;gt; 188.135.99.148.54315: R 366574247:366574247(0) ack 3224297896 win 0 &lt;BR /&gt;6 packets shown&lt;BR /&gt;PrimaryASA(config)# sh access&lt;BR /&gt;PrimaryASA(config)# sh access-list test1&lt;BR /&gt;access-list test1; 2 elements; name hash: 0x1d34f6f2&lt;BR /&gt;access-list test1 line 1 extended permit tcp any host 85.154.250.91 eq www (hitcnt=29) 0x7ae5a997 &lt;BR /&gt;access-list test1 line 2 extended permit tcp host 85.154.250.91 eq www any (hitcnt=3) 0x9fde51c7&lt;/MSS&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PrimaryASA(config)# sh capture test2&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 10:14:16.386271 192.168.100.66.80 &amp;gt; 188.135.99.148.54315: R 0:0(0) ack 3788472932 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 10:14:17.045133 192.168.100.66.80 &amp;gt; 188.135.99.148.54315: R 0:0(0) ack 781581634 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 10:14:17.651043 192.168.100.66.80 &amp;gt; 188.135.99.148.54315: R 0:0(0) ack 3820632334 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 10:18:09.272523 192.168.100.66.80 &amp;gt; 188.135.99.148.54404: R 0:0(0) ack 2060129704 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 10:18:09.877121 192.168.100.66.80 &amp;gt; 188.135.99.148.54404: R 0:0(0) ack 1993094406 win 0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 10:18:10.492406 192.168.100.66.80 &amp;gt; 188.135.99.148.54404: R 0:0(0) ack 2510069396 win 0 &lt;BR /&gt;6 packets shown&lt;BR /&gt;PrimaryASA(config)# sh access-list test2&lt;BR /&gt;access-list test2; 1 elements; name hash: 0x2bb0eb81&lt;BR /&gt;access-list test2 line 1 extended permit tcp host 192.168.100.66 any (hitcnt=849) 0xc2c1cc37&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 06:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587676#M564622</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-03T06:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587677#M564626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Those captures are showing resets coming from the internal IP, that is the server. Somehow that server is resetting the connection. Were you able to add the inspect http on the policy map?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you access that server coming from another host on the same subnet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 13:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587677#M564626</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-03T13:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587678#M564629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have added the inspect HTTP in the&amp;nbsp; policy map also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you access that server coming from another host on the same subnet?&lt;/P&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By which logs it is seen tha the server is resetting, i m able to ping the server from internet but i m not able to do telnet on port 80,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 20:18:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587678#M564629</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-03T20:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587679#M564631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I suspect the issue is with the server's http service blocking this connections. Can you set a sniffer on the server capturing this traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Mar 2011 21:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587679#M564631</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-03T21:41:19Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587680#M564632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should use wireshark for this?? I can get the result for the above, I have 1 doubt if server is droppig the packets then what are the replies seen from Natted IP to public Internet IP on the outside interface capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 21:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587680#M564632</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-04T21:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587681#M564633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can use wireshark. On the inside and outside interface you are getting a Reset coming from the server on the inside. I was suggesting the sniffer so that you can get mode details about that reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is why I suspect the issue is on the server. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Mar 2011 21:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587681#M564633</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-03-04T21:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting Web Server</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587682#M564634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks Paul the issue was with the server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Mar 2011 13:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-web-server/m-p/1587682#M564634</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2011-03-06T13:16:58Z</dc:date>
    </item>
  </channel>
</rss>

