<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Clear XLATE break all current connections using NAT on the ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895838#M5822</link>
    <description>&lt;P&gt;Clear XLATE break all current connections using NAT on the ASA?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:19:55 GMT</pubDate>
    <dc:creator>CiscoBrownBelt</dc:creator>
    <dc:date>2020-02-21T17:19:55Z</dc:date>
    <item>
      <title>Clear XLATE break all current connections using NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895838#M5822</link>
      <description>&lt;P&gt;Clear XLATE break all current connections using NAT on the ASA?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:19:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895838#M5822</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T17:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Clear XLATE break all current connections using NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895863#M5823</link>
      <description>Hi,&lt;BR /&gt;Well it clears the nat sessions on the device and therefore the current connections, TCP applications should detect packet loss and re-transmit and a new nat session will be established.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 23 Jul 2019 16:36:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895863#M5823</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-23T16:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Clear XLATE break all current connections using NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895866#M5825</link>
      <description>Awesome great!&lt;BR /&gt;&lt;BR /&gt;In regards to a IPSEC VPN on ASA, can you simply add a new host or create a new object-group and add all the source hosts in the IPSEC profile on ASA without breaking anything assuming remote end has allowed the new host?</description>
      <pubDate>Tue, 23 Jul 2019 16:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895866#M5825</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-07-23T16:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: Clear XLATE break all current connections using NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895875#M5892</link>
      <description>Yes, you can add the new network/host to the ACL or to the object group that is referenced in the ACL in use by the crypto map. Nothing should break, as long as both ends of the VPN tunnel have been configured with the same host/network with the correct mask.</description>
      <pubDate>Tue, 23 Jul 2019 16:51:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/clear-xlate-break-all-current-connections-using-nat-on-the-asa/m-p/3895875#M5892</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-23T16:51:59Z</dc:date>
    </item>
  </channel>
</rss>

