<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Policy NAT Rule in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481779#M613397</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kusankar, everybody access to the server with the Public IP Address, the differenc is that Users from Internet access to port 80 and it is redirect to private-IP port 8080 and the rest users (remote users, remote branch and LAN) access to public IP address port 80 and we only need IP translatation to real IP in the DMZ server withouth port translation. When we don´t use port translation everything work fine. Remote users access to the DMZ accross outside (Internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology is as you say:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside LAN------(in)ASA(out)----Internet (remote users, branch office, internet users)&lt;/P&gt;&lt;P&gt;(inside users)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Web Server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying use policy nat rule in order to say that port redirection with NAT is use when the destination of the packet is for "any" IP in outside interface and only NAT(withouth port redirection) is used for known ip (vpn remote users and branch offices) but I don´t know how do it. When I configure it from ASDM, it say that there is an overlapping rule (one policy nat rule is with destination "any" and the other one if for known ip using the same external interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Aug 2010 18:11:43 GMT</pubDate>
    <dc:creator>carlosluqueportero</dc:creator>
    <dc:date>2010-08-26T18:11:43Z</dc:date>
    <item>
      <title>Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481776#M613394</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have a 5520 ASA and we need use NAT to a DMZ server. Users from outside should access to http port and DMZ server listen in 8080. For Corporative users (LAN, Remote branch office and VPN Remote-USers) server listen in port 80 (they attack&amp;nbsp; to public address port 80 too).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We think use Static Policy NAT Rule in order to translate &amp;lt;internal_server_Addres&amp;gt;:8080 port to &amp;lt;public_server_Addres&amp;gt;:80 for destination "any"&amp;nbsp; and other rule for &amp;lt;internal_server_Addres&amp;gt;:80 port to &amp;lt;public_server_Addres&amp;gt;:80 to the IP list of corporative users (LAN, Remote users...)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It doesn´t work configuring&amp;nbsp; DMZ51_nat_static_1 with deny rules for corporative users ("ERROR: access-list has deny statements" from CLI) nor create a static nat rule for specific destionation and other different rule for "any" destination (overlapping rule warning).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is the actual configuracion (all traffic &amp;lt;internal_server_Addres&amp;gt;:8080 port to &amp;lt;public_server_Addres&amp;gt;:80 without exceptions)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list DMZ51_nat_static_1 extended permit tcp host &amp;lt;PRIVATE IP ADDRESS&amp;gt; eq 8080 any&lt;BR /&gt;static (DMZ51,outside) tcp &amp;lt;PUBLIC IP ADDRESS&amp;gt; www access-list DMZ51_nat_static_1&lt;/P&gt;&lt;P&gt;Any idea how can I that we need?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481776#M613394</guid>
      <dc:creator>carlosluqueportero</dc:creator>
      <dc:date>2019-03-11T18:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481777#M613395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Carlos,&lt;/P&gt;&lt;P&gt;What you saw is expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. You cannot add deny lines in policy ACL.&lt;/P&gt;&lt;P&gt;2. You cannot add ports and protocols in a nat exemption ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I can understand the outside users accessing the DMZ server using the public address.&amp;nbsp; Do the LAN, VPN users and Remote branch also address the DMZ server with the public address? If so, this traffic will be seen on the outside of the ASA? How come?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you draw a little toplogy for us? Where are the Remote Branches?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside LAN------(in)ASA(out)----Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LAN users should access the DMZ servers using their inside address. So just this static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (D,O) tcp p.p.p.p 80 d.d.d.d 8080&lt;/P&gt;&lt;P&gt;where p.p.p.p - is the public address&lt;/P&gt;&lt;P&gt;d.d.d.d - is the dmz real address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Aug 2010 11:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481777#M613395</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-26T11:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481778#M613396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want specific user groups to access specific ports, you could use policy NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Corp permit tcp &lt;WEBSERVER actual="" ip=""&gt; eq 80 &lt;CORP ip="" range=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/CORP&gt;&lt;/WEBSERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Gen permit tcp &lt;WEBSERVER actual="" ip=""&gt; eq 8080 any&lt;/WEBSERVER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp &lt;WEBSERVERPUBLICIP&gt; 80 access-list Corp&lt;/WEBSERVERPUBLICIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp &lt;WEBSERVERPUBLICIP&gt; 80 access-list Gen&lt;/WEBSERVERPUBLICIP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Nagaraja Thanthry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Aug 2010 12:35:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481778#M613396</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-26T12:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481779#M613397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kusankar, everybody access to the server with the Public IP Address, the differenc is that Users from Internet access to port 80 and it is redirect to private-IP port 8080 and the rest users (remote users, remote branch and LAN) access to public IP address port 80 and we only need IP translatation to real IP in the DMZ server withouth port translation. When we don´t use port translation everything work fine. Remote users access to the DMZ accross outside (Internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topology is as you say:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside LAN------(in)ASA(out)----Internet (remote users, branch office, internet users)&lt;/P&gt;&lt;P&gt;(inside users)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Web Server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying use policy nat rule in order to say that port redirection with NAT is use when the destination of the packet is for "any" IP in outside interface and only NAT(withouth port redirection) is used for known ip (vpn remote users and branch offices) but I don´t know how do it. When I configure it from ASDM, it say that there is an overlapping rule (one policy nat rule is with destination "any" and the other one if for known ip using the same external interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Aug 2010 18:11:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481779#M613397</guid>
      <dc:creator>carlosluqueportero</dc:creator>
      <dc:date>2010-08-26T18:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481780#M613398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&amp;nbsp; thank you but I cannot configure it from CLI. I receive the following error:"ERROR: mapped-address conflict with existing static"&lt;/P&gt;&lt;P&gt;I am using version&amp;nbsp; 8.0(4). Any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carlos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 08:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481780#M613398</guid>
      <dc:creator>carlosluqueportero</dc:creator>
      <dc:date>2010-08-27T08:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481781#M613399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error you are saying is expected because we are using the same public IP and port configuration in both the statics (P.P.P.P:80).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still a bit confused with the requirement. The web server that you have assuming the public IP is going to be P.P.P.P, you want remote users, corporate network, etc to access it using regular url &lt;STRONG&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://P.P.P.P"&gt;http://P.P.P.P&lt;/A&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/STRONG&gt; but for internet users, they should be accessing it using the url &lt;STRONG&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://P.P.P.P:8080"&gt;http://P.P.P.P:8080&lt;/A&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if the above is your requirement or if i am wrong in my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 11:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481781#M613399</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-08-27T11:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481782#M613400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;all users access to (&lt;80&gt;). For general users (unknow IPs) the NAT should do a PAT and translate:&lt;/80&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;80&gt; to &lt;8080&gt;&lt;/8080&gt;&lt;/80&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for known ip ranges (inside, remote branch..) the ASA only shoul translate the IP keeping the same port&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;80&gt; to &lt;80&gt;&lt;/80&gt;&lt;/80&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don´t understand why using policy nat rule i cannot do it. I understood policy nat rules were employed when you need different NAT behaviour based on the destination of the packet and It is that we are doing in this case... For some known IP only Static NAT and for the rest of IP (Any) NAT+PAT with the same public address in both cases and the same interfaces (DMZ-outside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help and time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 11:54:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481782#M613400</guid>
      <dc:creator>carlosluqueportero</dc:creator>
      <dc:date>2010-08-27T11:54:14Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481783#M613401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately this will not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need unique port numbers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cannot do&lt;/P&gt;&lt;P&gt;80 to 80&lt;/P&gt;&lt;P&gt;80 to 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You probably need to ask one batch of users to use &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://x.x.x.x:8080"&gt;http://x.x.x.x:8080&lt;/A&gt;&lt;SPAN&gt; when they try to access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 12:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481783#M613401</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-27T12:25:01Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481784#M613402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The mains purpose of policy NAT is to translate a set of inside users to &lt;STRONG&gt;different&lt;/STRONG&gt; public IPs and/or ports when accessing different locations. Now in our case, the translated IP:port combination is going to be the same while the inside IP:port combination is going to be different. I am afraid the ASA will not accept 2 statics with the same translated IP:port combination.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 12:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481784#M613402</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-08-27T12:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule in ASA</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481785#M613403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I understand it is not possible using policy nat rule with the same public-ip:port. Have somebody any other idea to do that we need: Using one public IP and port, it will be translate to different internal port depending the IP address who do the request?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 12:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-in-asa/m-p/1481785#M613403</guid>
      <dc:creator>carlosluqueportero</dc:creator>
      <dc:date>2010-08-27T12:42:48Z</dc:date>
    </item>
  </channel>
</rss>

