<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application through our ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352855#M723608</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the timely response. The students still aren't able to access the page.&amp;nbsp; I had one of them ping the address&amp;nbsp; nnn.nnn.nnn.4 and they don't get a reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "outside" interface nnn.nnn.nnn.151 is responding to pings though.&amp;nbsp; I wonder if I need to add a command so that the outside interface responds to requests for nnn.nnn.nnn.4?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Jan 2010 14:06:31 GMT</pubDate>
    <dc:creator>stephenarbour</dc:creator>
    <dc:date>2010-01-27T14:06:31Z</dc:date>
    <item>
      <title>Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352853#M723606</link>
      <description>&lt;P&gt;We have a Educational Application server within our LAN that students access via Web browser. We now want to make this internal Web site available to 15 students outside our network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal server website is 192.168.2.15 and the application uses ports 80 and 1209.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a dedicated public address that we can assign to this purpose nnn.nnn.nnn.004&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In spite of my (enough to be dangerous) knowledge, my access list entries and static entries have not worked to get this application traffic through our ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help me place the appropriate commands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostnameASA(config)# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(3)&lt;BR /&gt;!&lt;BR /&gt;hostname hostnameASA&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password xxxxxxxxx encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.2.4 serverApps02&lt;BR /&gt;name 192.168.2.5 serverApps03&lt;BR /&gt;name 192.168.2.3 serverdom01&lt;BR /&gt;name 192.168.42.4 server1&lt;BR /&gt;name 192.168.42.6 server2&lt;BR /&gt;name 192.168.42.49 serverdom01&lt;BR /&gt;name 192.168.42.41 serverdom02&lt;BR /&gt;name 192.168.42.9 serverApps01&lt;BR /&gt;name 192.168.2.1 serverRouter&lt;BR /&gt;name 192.168.42.1 serverRouter&lt;BR /&gt;name 192.168.42.15 serverMail&lt;BR /&gt;name 192.168.42.7 serverVPN&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address nnn.nnn.nnn.151 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.60.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;passwd xxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list outside extended permit tcp any host nnn.nnn.nnn.207 eq pptp&lt;BR /&gt;access-list outside extended permit tcp any host nnn.nnn.nnn.207 eq 47&lt;BR /&gt;access-list outside extended permit udp any host nnn.nnn.nnn.10 eq 1719&lt;BR /&gt;access-list outside extended permit udp any host nnn.nnn.nnn.10 range 2326 2373&lt;BR /&gt;access-list outside extended permit tcp any host nnn.nnn.nnn.10 range 5555 5565&lt;BR /&gt;access-list outside extended permit tcp any host nnn.nnn.nnn.206 eq https&lt;BR /&gt;access-list outside extended permit tcp any host nnn.nnn.nnn.206 eq www&lt;BR /&gt;access-list outside extended permit tcp any host nnn.nnn.nnn.220 eq www&lt;BR /&gt;access-list 101 extended permit ip 192.168.0.0 255.255.0.0 192.168.100.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging monitor debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging host inside 192.168.42.39&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;BR /&gt;asdm image disk0:/asdm-523.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.213 serverApps03 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.214 serverdom01 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.216 serverRT1 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.218 serverdom01 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.219 serverdom02 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.220 serverApps01 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.221 serverRouter netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.222 serverRouter netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.217 serverRT2 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) nnn.nnn.nnn.207 serverVPN netmask 255.255.255.255&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 nnn.nnn.nnn.152 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 192.168.30.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;url-server (inside) vendor websense host 192.168.42.17 timeout 30 protocol TCP v&lt;BR /&gt;ersion 1 connections 5&lt;BR /&gt;filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 15&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;console timeout 0&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp; inspect http&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;url-block url-mempool 1500&lt;BR /&gt;url-block url-size 4&lt;BR /&gt;url-block block 128&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;: end&lt;BR /&gt;hostnameASA#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352853#M723606</guid>
      <dc:creator>stephenarbour</dc:creator>
      <dc:date>2019-03-11T17:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352854#M723607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;stephenarbour wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a Educational Application server within our LAN that students access via Web browser. We now want to make this internal Web site available to 15 students outside our network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal server website is 192.168.2.15 and the application uses ports 80 and 1209.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a dedicated public address that we can assign to this purpose nnn.nnn.nnn.004&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In spite of my (enough to be dangerous) knowledge, my access list entries and static entries have not worked to get this application traffic through our ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help me place the appropriate commands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostnameASA#&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) xxx.xxx.xxx.4 192.168.2.15 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host xxx.xxx.xxx.4 eq 80&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host xxx.xxx.xxx.4 eq 1209&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;note i have used "any" in the access-list but if you know the 15 IPs of the external students it would be better to use them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jan 2010 17:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352854#M723607</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-01-26T17:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352855#M723608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the timely response. The students still aren't able to access the page.&amp;nbsp; I had one of them ping the address&amp;nbsp; nnn.nnn.nnn.4 and they don't get a reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "outside" interface nnn.nnn.nnn.151 is responding to pings though.&amp;nbsp; I wonder if I need to add a command so that the outside interface responds to requests for nnn.nnn.nnn.4?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 14:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352855#M723608</guid>
      <dc:creator>stephenarbour</dc:creator>
      <dc:date>2010-01-27T14:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352856#M723609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit icmp any host xxx.xxx.xxx.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in order to be able to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;They are unable to load the page? What do you see in the logs when it fails? Do you see the acl hit count increment? The server is not responding? Is the server working internally? Meaning when an inside computer in the 192.168.2.0/24 network opens a browser and goes to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://192.168.2.15"&gt;http://192.168.2.15&lt;/A&gt;&lt;SPAN&gt; does it load the page?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 14:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352856#M723609</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-27T14:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352857#M723610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The error is "Opps! This link appears to be broken. Page not found - connection failure."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Opening a browser and going to &lt;A href="http://192.168.2.15"&gt;http://192.168.2.15&lt;/A&gt; does yes open the page and the server responds perfectly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The logging entries that you see are left over and inactive as the PC that was hosting is not anymore. I need to set this up again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 15:41:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352857#M723610</guid>
      <dc:creator>stephenarbour</dc:creator>
      <dc:date>2010-01-27T15:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352858#M723611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the web server check the gateway and make sure it is 192.168.30.2 and check the router 192.168.30.2 and make sure its default gateway is pointing to this firewall.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is this server able to go to the internet through this firewall? If so, when you go to &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://ipchicken"&gt;http://ipchicken&lt;/A&gt;&lt;SPAN&gt; from this webserver does it show the ip address x.x.x.4 that it is supposed to look like when it goes to the internet?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 16:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352858#M723611</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-27T16:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352859#M723612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The address shown by ipchicken is nnn.nnn.nnn.151&amp;nbsp; and not the correct address:&amp;nbsp; nnn.nnn.nnn.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The gateway for the server is the local 192.168.2.1&lt;/P&gt;&lt;P&gt;The router gateway is the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 17:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352859#M723612</guid>
      <dc:creator>stephenarbour</dc:creator>
      <dc:date>2010-01-27T17:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352860#M723613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;stephenarbour wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The address shown by ipchicken is nnn.nnn.nnn.151&amp;nbsp; and not the correct address:&amp;nbsp; nnn.nnn.nnn.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The gateway for the server is the local 192.168.2.1&lt;/P&gt;&lt;P&gt;The router gateway is the firewall.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;When you added the config i posted did you clear the xlate table ? If not the ASA might still have the old entry although it should have timed out by now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note you should clear the individual entry for 192.168.2.15 and not the entire table as that will destroy all current connections on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 18:54:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352860#M723613</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-01-27T18:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352861#M723614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm...that is the problem. Do what Jon says "clear local 192.168.2.15" then have the server go to the internet and issue "sh xlate debug | i 192.168.2.15" and make sure it is going out as x.x.x.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once done you should be able to load the page from the otuside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jan 2010 19:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352861#M723614</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-27T19:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Application through our ASA</title>
      <link>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352862#M723615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It worked!&amp;nbsp;&amp;nbsp; Thanks very much Jon and Kusankar.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jan 2010 20:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/application-through-our-asa/m-p/1352862#M723615</guid>
      <dc:creator>stephenarbour</dc:creator>
      <dc:date>2010-01-28T20:38:40Z</dc:date>
    </item>
  </channel>
</rss>

