<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 NAT issue?? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507512#M613110</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you clear up some questions Mike. I see the boot is set to ASA 8.3.1, but you have pre 8.3.1 NAT configurations. What image are you currently running? Are you trying to ping from an inside host to the internet or from the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Aug 2010 23:17:42 GMT</pubDate>
    <dc:creator>Edward Dutra</dc:creator>
    <dc:date>2010-08-30T23:17:42Z</dc:date>
    <item>
      <title>ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507509#M613102</link>
      <description>&lt;P&gt;I am trying to upgrade from a Pix501 to a new ASA 5510. I ran the&lt;/P&gt;&lt;P&gt;pixtoasa tool and now have the following&lt;/P&gt;&lt;P&gt;configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(2)&lt;BR /&gt;boot system disk0:/asa831-k8.bin&lt;BR /&gt;:::: Interface mapping - {'ethernet1': 'Ethernet0/1', 'ethernet0': 'Ethernet0/0'}&lt;BR /&gt;:::: Original Interface id ethernet0&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp; ip address 216.x.x.x 255.255.255.252&lt;BR /&gt;&amp;nbsp; nameif outside&lt;BR /&gt;&amp;nbsp; security-level 0&lt;BR /&gt;&amp;nbsp; speed auto&lt;BR /&gt;&amp;nbsp; duplex auto&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;:::: Original Interface id ethernet1&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp; ip address 192.168.1.2 255.255.255.0&lt;BR /&gt;&amp;nbsp; nameif inside&lt;BR /&gt;&amp;nbsp; security-level 100&lt;BR /&gt;&amp;nbsp; speed 100&lt;BR /&gt;&amp;nbsp; duplex full&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;enable password ******************* encrypted&lt;BR /&gt;passwd ******************* encrypted&lt;BR /&gt;hostname JMSBCFW&lt;BR /&gt;domain-name JMS&lt;BR /&gt;names&lt;BR /&gt;access-list outside_in permit icmp any any time-exceeded&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 3389&lt;BR /&gt;access-list outside_in permit icmp any any echo-reply&lt;BR /&gt;access-list outside_in permit icmp any any unreachable&lt;BR /&gt;access-list outside_in permit icmp any any source-quench&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1000&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1001&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1002&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1003&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1004&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1005&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1006&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1007&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1008&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1009&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1010&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1011&lt;BR /&gt;access-list outside_in permit tcp any interface outside eq 1012&lt;BR /&gt;access-list outbound permit tcp any any&lt;BR /&gt;access-list outbound permit ip any any&lt;BR /&gt;access-list HCA_cryptomap permit ip 10.129.64.0 255.255.255.252 170.x.x.x 255.255.255.128&lt;BR /&gt;access-list HCA permit ip 192.168.1.0 255.255.255.0 170.x.x.x 255.255.255.128&lt;BR /&gt;pager lines 24&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip audit info action alarm&lt;BR /&gt;ip audit attack action alarm&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 10.129.64.1&lt;BR /&gt;nat (inside) 2 10.129.64.0 255.255.255.252 0 0&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.55 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1000 192.168.1.4 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1001 192.168.1.67 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1002 192.168.1.85 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1003 192.168.1.29 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1004 192.168.1.12 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1005 192.168.1.64 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1006 192.168.1.62 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1007 192.168.1.18 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1008 192.168.1.70 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1009 192.168.1.68 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1010 192.168.1.44 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1011 192.168.1.37 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;static (inside,outside) tcp interface 1012 192.168.1.73 3389 netmask 255.255.255.255 0 0&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;access-group outbound in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 216.x.x.x 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;BR /&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;BR /&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ max-failed-attempts 3&lt;BR /&gt;aaa-server TACACS+ deadtime 10&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS max-failed-attempts 3&lt;BR /&gt;aaa-server RADIUS deadtime 10&lt;BR /&gt;aaa-server LOCAL protocol local&lt;BR /&gt;ntp server 192.168.1.4 source inside&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.3 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server community public&lt;BR /&gt;no snmp-server enable traps&lt;BR /&gt;:::: Not supported - floodguard enable&lt;BR /&gt;:::: sysopt renamed from 'sysopt connection permit-ipsec' to 'sysopt connection permit-vpn'&lt;BR /&gt;sysopt connection permit-vpn&lt;BR /&gt;crypto ipsec transform-set myset esp-3des esp-sha-hmac&lt;BR /&gt;crypto map hca 10 ipsec-isakmp&lt;BR /&gt;crypto map hca 10 match address HCA_cryptomap&lt;BR /&gt;crypto map hca 10 set peer 199.x.x.x&lt;BR /&gt;crypto map hca 10 set transform-set myset&lt;BR /&gt;crypto map hca interface outside&lt;BR /&gt;isakmp enable outside&lt;BR /&gt;:::: Your key is set to all STARS(*) Please fix!'isakmp key ******** address 199.x.x.x netmask 255.255.255.255'&lt;BR /&gt;isakmp key ******** address 199.x.x.x netmask 255.255.255.255&lt;BR /&gt;isakmp identity address&lt;BR /&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;isakmp policy 10 encryption 3des&lt;BR /&gt;isakmp policy 10 hash sha&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;isakmp policy 10 lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;username admin password ******************** encrypted privilege 2&lt;BR /&gt;terminal width 90&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested the ASA5510 and was only able to get out (ping or otherwise) from the internal IP of 192.168.1.4. This was also the first box I tried to get out on, all others would not ping or anything. Is this a NAT issue? Is there something I neglected to do in the conversion? Forgive my crude configuration of individual user access to their desktops (RDP sessions) but I have been having to use the console port in PIX to set those up for the past year.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated. Thank You!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507509#M613102</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2019-03-11T18:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507510#M613105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add ICMP inspection to be able to PING from the internal network to the internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All your internal LAN should be able to have Internet because of these commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 18:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507510#M613105</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-08-30T18:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507511#M613108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply Federico. So there is nothing special I need to do for the NAT commands between the PIX and ASA? Is there a special order for NAT1, NAT2 and so on... I will add the command you suggested and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 18:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507511#M613108</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-08-30T18:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507512#M613110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you clear up some questions Mike. I see the boot is set to ASA 8.3.1, but you have pre 8.3.1 NAT configurations. What image are you currently running? Are you trying to ping from an inside host to the internet or from the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Aug 2010 23:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507512#M613110</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2010-08-30T23:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507513#M613111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Edward, I did nothing to the configuration as it was in the PIX, other than run the PIXTOASA.exe conversion utility. Is there something I else I should do for the NAT configuration in the ASA? I don't have it handy, but I am pretty sure it is running the 831 image. Please pardon my ignorance on the subject, I am by no means proficient in firewall setup. Yes, I was trying to ping from inside to internet. I was able to ping and get to internet only from 192.168.1.4, which happens to be the server and the first machine I tried to use. Any other LAN machine was unable to ping out (used 4.2.2.2). I would appreciate any light you can shed on the subject.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Townsend&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 15:07:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507513#M613111</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-08-31T15:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507514#M613112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with Edward, you configuration set up pre 8.3(1) , so you have two choises :-&lt;/P&gt;&lt;P&gt;1&amp;gt; run code version that is pre 8.3.&lt;/P&gt;&lt;P&gt;2&amp;gt; change the nat set up to post 8.3(1) using following link :-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_objects.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_objects.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 15:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507514#M613112</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-08-31T15:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507515#M613113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kay...just focusing on the NAT, I see the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 10.129.64.1&lt;BR /&gt;nat (inside) 2 10.129.64.0 255.255.255.252 0 0&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0 0 0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I see configured just based on the nat configurations I see, I would not expect a NAT issue if you are pinging from another machine on the 192.168.1.0 network. Are the other machines you pinging from on the 192.168.1.0 network? Do you have any logs from the ASA showing that the issue is NAT? Collect the logs from the ASA and verify the issue is NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 17:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507515#M613113</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2010-08-31T17:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507516#M613114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi !&lt;/P&gt;&lt;P&gt;I donot see command "nat-control" in the configuration, so please enable "nat-control" , this will enable nat/pat for devices accessing the internet from inside network.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 17:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507516#M613114</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-08-31T17:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507517#M613115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;Assuming my LAN is 192.168.1.1 through 255 and there may be 100 users connected to the outside at any given time, would either of these configurations work:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# object network my-outside-ips&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# range 10.1.1.1 10.1.1.101&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# object network my-inside-net&lt;BR /&gt;# subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# nat (inside,outside) dynamic my-outside-ips&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;My understanding of this example is that there would be a pool of addresses 10.1.1.1 through 101, which each would be assigned individually to inside&amp;gt;out traffic. Would port 80 and 25 be separate connections per inside IP?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;OR&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# object network my-inside-net&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;# nat (inside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;My understanding of this example is that it translates any inside&amp;gt;out traffic to use the public IP (interface) address?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;OR&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt;If I flashed back to say 8.2 would I be able to use the converted PIX configuration I currently have?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Times New Roman;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 18:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507517#M613115</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-08-31T18:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507518#M613116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike ! I would say you should try running a pre 8.3 code as it is very new code and not only does it changes the nat configuration it also changes the acl configuration. I would say change the code , issue command nat-control and we will troubleshoot it from there.&lt;/P&gt;&lt;P&gt;I am not familiar with 8.3 as of right now , try to set it up in test set up right now myself &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; .&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 18:33:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507518#M613116</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-08-31T18:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507519#M613117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am going to try the nat-control command and then the ping process from inside IPs. I will post the results. It may be Monday before I am able to do so, as I have to do request the temporary outage on the company network. Thanks to all who are following this thread and supporting my effort to upgrade from the PIX to ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Townsend&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 18:41:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507519#M613117</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-08-31T18:41:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507520#M613118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh yeah, and I will take it back to say ASA 8.0 ???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 18:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507520#M613118</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-08-31T18:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507521#M613119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Any code is fine Mike. Was curious if you collected those logs? &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 18:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507521#M613119</guid>
      <dc:creator>Edward Dutra</dc:creator>
      <dc:date>2010-08-31T18:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT issue??</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507522#M613120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! No, unfortunately I only provide onsite service to that office every Friday. I was planning on configuring the 5510 before I went to save time and test it early Friday before the office opens. I should have known better than to try the bleeding edge version of ASA. Reading up on 8.0 right now.... Thanks for your help. If there are problems I will post logs when I return with results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks guys!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike T&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 18:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-issue/m-p/1507522#M613120</guid>
      <dc:creator>mikentosh</dc:creator>
      <dc:date>2010-08-31T18:59:30Z</dc:date>
    </item>
  </channel>
</rss>

