<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Issues?? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579133#M608354</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great! Glad to know that Perry. And thanks for posting the config. Should be helpful for others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Oct 2010 00:15:12 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-10-26T00:15:12Z</dc:date>
    <item>
      <title>New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579124#M608345</link>
      <description>&lt;P&gt;I have the outside network&lt;/P&gt;&lt;P&gt;24.222.224.220&lt;/P&gt;&lt;P&gt;I have the inside network I am on now,&lt;/P&gt;&lt;P&gt;192.168.1.0 network&lt;/P&gt;&lt;P&gt;I have another network with servers on it&lt;/P&gt;&lt;P&gt;192.168.5.0 network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can his the servers on 192.168.5.0 network from anywhere but the inside network 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have given the servers with 24.222.224.220 outside ip works from anywhere else but the inside network I am on and I am trying to hit it by IP for now DNS later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can hit any poutside internet service from either internaletwork.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any Ideas I will post config if needed.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579124#M608345</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2019-03-11T18:59:23Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579125#M608346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am assuming that your topology is something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.0/24----------------(inside)ASA(outside)----------INTERNET&lt;/P&gt;&lt;P&gt;192.168.5.0/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have static translations for servers (in specofic for 192.168.5.1) on the outside in the format below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 24.222.224.221 192.158.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when you try and access the 192.168.5.1 server using the public IP of 24.222.224.221, you are not able to do that. To enable this you will need 3 things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) static (inside,inside) 24.222.224.221 192.158.5.1 norandomseq nailed&lt;/P&gt;&lt;P&gt;2) failover timeout -1&lt;/P&gt;&lt;P&gt;3) same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should let you access the servers using the public IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above case, both the inside LAN and the SERVER network are reachable through the "inside" interface on the firewall and the 192.168.5.0/24 is reachabe through an intermediate hop(router). Let me know if this indeed is the case or if it's different?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 00:30:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579125#M608346</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-24T00:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579126#M608347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We cannot assume that the servers are on the inside, depending on the scenario and the DNS server is we can apply some workarounds like the already mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can take a look at the following document for reference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#solution2"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml#solution2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 01:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579126#M608347</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-24T01:23:25Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579127#M608348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the networks;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run nat&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt;nat (inside,outside) dynamic interface dns&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt;nat (test,outside) dynamic interface dns&lt;BR /&gt;object network obj-192.168.5.100-www&lt;BR /&gt;nat (test,outside) static 24.222.224.220 service tcp www www&lt;BR /&gt;object network obj-192.168.5.100-ftp&lt;BR /&gt;nat (test,outside) static 24.222.224.220 service tcp ftp ftp&lt;BR /&gt;object network obj-192.168.5.101-8080&lt;BR /&gt;nat (test,outside) static 24.222.224.220 service tcp 8080 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run object&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.5.100-www&lt;BR /&gt;host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.100-ftp&lt;BR /&gt;host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.101-8080&lt;BR /&gt;host 192.168.5.101&lt;BR /&gt;object service tcp-8080&lt;BR /&gt;service tcp source eq 8080 destination eq 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-list&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.5.100 eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.5.100 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.5.101 eq 8080&lt;BR /&gt;access-list outsidein standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list outsidein standard permit 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe this gives a better idea of how its setup now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) static (inside,inside) 24.222.224.221 192.158.5.1 norandomseq nailed (Could you explain this line a bit)&lt;/P&gt;&lt;P&gt;2) failover timeout -1 (I have no Failover device is this required?)&lt;/P&gt;&lt;P&gt;3) same-security-traffic permit intra-interface (ok I have seen this before)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any more help you could give.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 02:16:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579127#M608348</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-24T02:16:13Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579128#M608349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats the point I wanted to make, those lines posted are not going to work because you are in 8.3 and NAT is handled different, please let me know the following information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the security level for the inside host?&lt;/P&gt;&lt;P&gt;In which interface are the servers located?&lt;/P&gt;&lt;P&gt;What is the security level for that interface?&lt;/P&gt;&lt;P&gt;Where is the DNS server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this information I will be able to suggest an example of how you will need to set this access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 02:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579128#M608349</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-24T02:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579129#M608350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inside network sec level 100&lt;/P&gt;&lt;P&gt;test network sec level 100, servers on this network outside ip 24.222.224.220&lt;/P&gt;&lt;P&gt;outside sec level 0 24.222.224.222&lt;/P&gt;&lt;P&gt;DNS is outside the system 24.222.0.96 and 97&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;want to be able to talk to test network through from inside out through outside and back into test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AT this time cannot even do it by the test outside ip which is 24.222.224.220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the outside ip 24.222.224.222&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 10:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579129#M608350</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-24T10:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579130#M608351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your inside hosts are using those external DNS servers, please put the keyword "dns" at the end of the translations for the server, that will allow the ASA to do DNS rewrite&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Oct 2010 21:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579130#M608351</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-10-24T21:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579131#M608352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what do the DNS responses contain? I am assuming that they respons with the public IP address of the server which is 24.222.224.220.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in such a case, add the below commands and then you should have communication as you need:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-192.168.5.100-www-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (test,inside) static 24.222.224.220 service tcp www www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;object&amp;nbsp; network obj-192.168.5.100-ftp-1&lt;BR /&gt;nat (test,inside) static&amp;nbsp; 24.222.224.220 service tcp ftp ftp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;object network&amp;nbsp; obj-192.168.5.101-8080-1&lt;BR /&gt;nat (test,inside) static 24.222.224.220&amp;nbsp; service tcp 8080 8080&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, basically we are creating static for the "inside" interface now. Now from the "inside", users should be able to access the server using their public IP address 24.222.224.220.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, another command you will need because both "inside" and "test" are of the same security level is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if you have an access-list on the "inside" interface, please add the necessary entries to allow communication to the "test" servers using the public IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Oct 2010 07:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579131#M608352</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-25T07:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579132#M608353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems this configuration works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 24.222.224.222 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif test&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.5.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan22&lt;BR /&gt; nameif LGS&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; switchport access vlan 22&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone AST -4&lt;BR /&gt;clock summer-time ADT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 24.222.0.96&lt;BR /&gt; name-server 24.222.0.97&lt;BR /&gt; domain-name AVC&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt; subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.5.100-www1&lt;BR /&gt; host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.100-ftp1&lt;BR /&gt; host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.101-80801&lt;BR /&gt; host 192.168.5.101&lt;BR /&gt;object service tcp-8080&lt;BR /&gt; service tcp source eq 8080 destination eq 8080&lt;BR /&gt;object network A_24.222.224.221&lt;BR /&gt; host 24.222.224.221&lt;BR /&gt;object network obj-192.168.5.100-www-1&lt;BR /&gt;object network obj-192.168.5.100-www&lt;BR /&gt;object network obj-192.168.5.100-wwwout&lt;BR /&gt; host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.100ftpout&lt;BR /&gt; host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.1018080out&lt;BR /&gt; host 192.168.5.101&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt; protocol-object ip&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.5.100 eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.5.100 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.5.101 eq 8080&lt;BR /&gt;access-list outsidein standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list outsidein standard permit 192.168.5.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu test 1500&lt;BR /&gt;mtu LGS 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt; nat (test,outside) dynamic interface&lt;BR /&gt;object network obj-192.168.5.100-www1&lt;BR /&gt; nat (test,inside) static 24.222.224.220 service tcp www www&lt;BR /&gt;object network obj-192.168.5.100-ftp1&lt;BR /&gt; nat (test,inside) static 24.222.224.220 service tcp ftp ftp&lt;BR /&gt;object network obj-192.168.5.101-80801&lt;BR /&gt; nat (test,inside) static 24.222.224.220 service tcp 8080 8080&lt;BR /&gt;object network obj-192.168.5.100-wwwout&lt;BR /&gt; nat (test,outside) static 24.222.224.220 service tcp www www&lt;BR /&gt;object network obj-192.168.5.100ftpout&lt;BR /&gt; nat (test,outside) static 24.222.224.220 service tcp ftp ftp&lt;BR /&gt;object network obj-192.168.5.1018080out&lt;BR /&gt; nat (test,outside) static 24.222.224.220 service tcp 8080 8080&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks maybe this will help others.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Oct 2010 16:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579132#M608353</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-25T16:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: New Issues??</title>
      <link>https://community.cisco.com/t5/network-security/new-issues/m-p/1579133#M608354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great! Glad to know that Perry. And thanks for posting the config. Should be helpful for others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Oct 2010 00:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-issues/m-p/1579133#M608354</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-26T00:15:12Z</dc:date>
    </item>
  </channel>
</rss>

