<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: static routes - PIX outside address in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153763#M580241</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks your responses, config enclosed&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 06:34:07.943 UTC Sat Sep 13 2003&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password ******* encrypted&lt;/P&gt;&lt;P&gt;passwd *******&lt;/P&gt;&lt;P&gt;hostname myFW&lt;/P&gt;&lt;P&gt;domain-name MyDomain&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.10.1 MyServer&lt;/P&gt;&lt;P&gt;name 192.168.2.254 ADSLRouter&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging host inside MyServer&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10full&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 0.0.0.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 0.0.0.0 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location MyServer 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location ADSLRouter 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) interface MyServer netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 ADSLRouter 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;snmp-server enable traps&lt;/P&gt;&lt;P&gt;tftp-server inside MyServer /&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet MyServer 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Sep 2003 10:08:18 GMT</pubDate>
    <dc:creator>alan.morris</dc:creator>
    <dc:date>2003-09-19T10:08:18Z</dc:date>
    <item>
      <title>static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153760#M580238</link>
      <description>&lt;P&gt;I have been trying to get a a configuration (PIX501) allowing inside clients access to the outside and also allowing outside access to an internal smtp mail server. From what I have tried it seems that I cannot use the outside IP address of the pix for the static (inside,outside) command. If I do so then other client access to the outside world is denied.&lt;/P&gt;&lt;P&gt;So far I haven't been able to find any documentation about this. Can anyone point me in the right direction plse?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153760#M580238</guid>
      <dc:creator>alan.morris</dc:creator>
      <dc:date>2020-02-21T06:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153761#M580239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Alan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your PIX config please (remember to change passwords/real IPs etc), makesure to include the PIX version as well (PIX IOS). Also the following document shows accessing mail server on the inside. &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think (without seeing the config) you'd need PAT running on your PIX for your situation (just a guess).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks - Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Sep 2003 09:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153761#M580239</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2003-09-18T09:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153762#M580240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;use the "global (outside) 1 interface" command.&lt;/P&gt;&lt;P&gt;Go here for more info...&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094ea2.shtml" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094ea2.shtml&lt;/A&gt;. Near the end of this document it explains the use of this variation of the global command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Sep 2003 09:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153762#M580240</guid>
      <dc:creator>j-barrett</dc:creator>
      <dc:date>2003-09-19T09:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153763#M580241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks your responses, config enclosed&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 06:34:07.943 UTC Sat Sep 13 2003&lt;/P&gt;&lt;P&gt;PIX Version 6.2(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password ******* encrypted&lt;/P&gt;&lt;P&gt;passwd *******&lt;/P&gt;&lt;P&gt;hostname myFW&lt;/P&gt;&lt;P&gt;domain-name MyDomain&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.10.1 MyServer&lt;/P&gt;&lt;P&gt;name 192.168.2.254 ADSLRouter&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any any eq smtp &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any unreachable &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit icmp any any time-exceeded &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging host inside MyServer&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10full&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;pdm location 0.0.0.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 0.0.0.0 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm location MyServer 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location ADSLRouter 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;pdm logging informational 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) interface MyServer netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 ADSLRouter 1&lt;/P&gt;&lt;P&gt;timeout xlate 0:05:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;snmp-server enable traps&lt;/P&gt;&lt;P&gt;tftp-server inside MyServer /&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet MyServer 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Sep 2003 10:08:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153763#M580241</guid>
      <dc:creator>alan.morris</dc:creator>
      <dc:date>2003-09-19T10:08:18Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153764#M580242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since, you use private IP address at outside, i assume you're NATting in front of PIX, you may replace the NAT/global statement simply by the "identity NAT": "NAT (inside) 0 192.168.10.0 255.255.255.0".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Sep 2003 11:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153764#M580242</guid>
      <dc:creator>bdube</dc:creator>
      <dc:date>2003-09-19T11:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153765#M580243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi morris,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don´t know what the other guys are talkin´about, but it seems to me they do not exactly understand your question, and thus providing you with the wrong information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I see it you want to translate all your inside source adresses to the outside interface adsress. This is correctly configured allready, as I saw at your config. These two commands are indeed correct:&lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is bothering you is that you want your mailserver to be reachable from the outside to the inside for SMTP. The command you tried is:&lt;/P&gt;&lt;P&gt;static (inside,outside) interface MyServer netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;And this does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command you need is this:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 25 MyServer 25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This static creates the translation for tcp-port 25 (smtp) outsides interface address to port 25 of your inside server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I advice you to change the line "access-list outside_access_in permit tcp any any eq smtp" into "access-list outside_access_in permit tcp any host 209.164.3.5 eq smtp"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Putting it all togeher, all changes you need to perform:&lt;/P&gt;&lt;P&gt;no static (inside,outside) interface MyServer netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 25 MyServer 25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;no access-list outside_access_in permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 209.164.3.5 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally perform a clear xlate and it will work.&lt;/P&gt;&lt;P&gt;Kind regards and good luck,&lt;/P&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Sep 2003 15:53:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153765#M580243</guid>
      <dc:creator>l.mourits</dc:creator>
      <dc:date>2003-09-19T15:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153766#M580244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leo,&lt;/P&gt;&lt;P&gt;Great - thanks this - has fixed it amd has demonstrated the cause of the problem - which I think is that the static rule was (using router IOS FWFS terminology) 'overloading' all ports rather than just 25. Hence any outbound connections built through NAT for other hosts on reply would be incorrectly routed back through the static - yes/no?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Sep 2003 13:04:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153766#M580244</guid>
      <dc:creator>alan.morris</dc:creator>
      <dc:date>2003-09-20T13:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: static routes - PIX outside address</title>
      <link>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153767#M580245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, they won´t, what the static command I gave you does is create a static port/address translation for packets destinated for your outside interface address on tcp port 25, and nothing else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, the nat and global command translate all traffic from inside traveling to the outside, using your outside interface address and creating random udp/tcp source ports for every new connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way the PIX keeps track of every session and the session will not interfere with eachother. All translations are kept within the same xlate table, and all entries within the table have to be unique.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, no worries, you´ll be fine this way.&lt;/P&gt;&lt;P&gt;Thanks for letting us know it works &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Sep 2003 19:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-routes-pix-outside-address/m-p/153767#M580245</guid>
      <dc:creator>l.mourits</dc:creator>
      <dc:date>2003-09-21T19:35:36Z</dc:date>
    </item>
  </channel>
</rss>

