<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need help with PAT and NAT w/single public IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348781#M743172</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If 72.9.###.### ip is the same as the vlan 2 interface IP address then you need to change the static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 72.9.###.### smtp 192.168.###.### smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.###.### smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change it to the keyword interface instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 23 Feb 2010 19:13:01 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-02-23T19:13:01Z</dc:date>
    <item>
      <title>Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348774#M743161</link>
      <description>&lt;P&gt;Hello all, need some help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't the below config work for SMTP access to the internal server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a show xlate, I see the Global PAT xlate on for both ext and int IP addresses on port 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a show access-list I never see any hits on the outside_access_in access list entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ASA 5505, version 7.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.###.### 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 72.9.###.### 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 72.9.###.### eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 72.9.###.### smtp 192.168.###.### smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_out in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348774#M743161</guid>
      <dc:creator>jaystanley66</dc:creator>
      <dc:date>2019-03-11T17:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348775#M743162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, I forgot to add.&amp;nbsp; When I look at the log, I see the attempt at the connection on port 25, from the public IP, but it always gets discarded.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2010 02:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348775#M743162</guid>
      <dc:creator>jaystanley66</dc:creator>
      <dc:date>2010-02-22T02:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348776#M743163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've added my complete config.&amp;nbsp; I still cannot get outside public hosts to access the internal IP address on port 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions would be appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sho run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(2)&lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password ###################### encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.###.### 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 72.9.###.### 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;no forward interface Vlan1&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.###.### 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;passwd ################ encrypted&lt;BR /&gt;banner login ALL UNAUTHORIZED ACCESS IS PROHIBITED BY LAW&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 72.9.###.### eq smtp&lt;BR /&gt;access-list inside_access_out extended permit ip any any&lt;BR /&gt;access-list asa-vpn_splitTunnelAcl standard permit 192.168.###.### 255.255.255.0&lt;BR /&gt;access-list dmz_access_out extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool vpn-pool 192.168.###.###-192.168.###.### mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-522.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp 72.9.###.### smtp 192.168.###.### smtp netmask 255.255.255.255&lt;BR /&gt;access-group inside_access_out in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 72.9.###.### 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;group-policy asa-vpn internal&lt;BR /&gt;group-policy asa-vpn attributes&lt;BR /&gt;dns-server value ###.###.###.###&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value asa-vpn_splitTunnelAcl&lt;BR /&gt;vpn-group-policy asa-vpn&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 192.168.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 20&lt;BR /&gt;tunnel-group asa-vpn type ipsec-ra&lt;BR /&gt;tunnel-group asa-vpn general-attributes&lt;BR /&gt;address-pool vpn-pool&lt;BR /&gt;default-group-policy asa-vpn&lt;BR /&gt;tunnel-group asa-vpn ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:af151ea5d8a16d08a9bce5c30579f440&lt;BR /&gt;: end&lt;BR /&gt;ASA# sho nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;BR /&gt;&amp;nbsp; match tcp inside host 192.168.###.### eq 25 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 72.9.###.###/25&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 870&lt;BR /&gt;&amp;nbsp; match ip inside any inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (72.9.117.191 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1427, untranslate_hits = 93&lt;BR /&gt;&amp;nbsp; match ip inside any dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any _internal_loopback any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 04:39:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348776#M743163</guid>
      <dc:creator>jaystanley66</dc:creator>
      <dc:date>2010-02-23T04:39:48Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348777#M743164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can't see a lot wrong with your config. I did a quick test and telnetted to port 25 on your public IP and i was allowed straight in to your mail server. I logged straight back out but in future good idea not to post full public IP details. So you should see at least one hit in your acl now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you give a few more details as to what you are trying to do ie. is it to allow other mail servers on the internet to connect to your mail server and vice-versa ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 06:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348777#M743164</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-02-23T06:43:21Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348778#M743166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand correctly the following is your scenario:&lt;/P&gt;&lt;P&gt;incoming mails to ur internal mail server:&lt;/P&gt;&lt;P&gt;mail originated from internet to ur domain------&amp;gt;ur service provider mail-relay server--------&amp;gt;72.9.X.X int on ur ASA-------&amp;gt;NAT/PAT------&amp;gt;ur internal Mail Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.does the problem is one way or both ways?&lt;/P&gt;&lt;P&gt;2. if problem in recieving mails need to troubleshoot each leg of above diagram from left to right.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 14:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348778#M743166</guid>
      <dc:creator>sanjeevreddyallala</dc:creator>
      <dc:date>2010-02-23T14:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348779#M743168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, its open right now as the ASA is not plugged in, so port 25&lt;/P&gt;&lt;P&gt; is open right now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 14:38:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348779#M743168</guid>
      <dc:creator>jaystanley66</dc:creator>
      <dc:date>2010-02-23T14:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348780#M743170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes we just want to be able to send mail from Internet to our internal mail server.&amp;nbsp; I've done this several times before with ASA with no problems.&amp;nbsp; I was curious about the code version 7.2(2) and only having a single Public IP address, which is the outside interface, and then using the Global (outside) 1 interface statement.&amp;nbsp; Any limitations by only having the single public IP?&amp;nbsp; We have the DNS MX record pointed to the public IP address.&amp;nbsp; When I put the ASA back inline, no hits on access list and in the log, I see attempts on port 25 to the public IP, but all packets are "discarded".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 14:43:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348780#M743170</guid>
      <dc:creator>jaystanley66</dc:creator>
      <dc:date>2010-02-23T14:43:13Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348781#M743172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If 72.9.###.### ip is the same as the vlan 2 interface IP address then you need to change the static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 72.9.###.### smtp 192.168.###.### smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface smtp 192.168.###.### smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change it to the keyword interface instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 19:13:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348781#M743172</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-02-23T19:13:01Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348782#M743173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Changing the static NAT statement to "interface" instead of the actual IP address did it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the insight and help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This forum is a great medium for exchanging information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Feb 2010 14:21:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348782#M743173</guid>
      <dc:creator>jaystanley66</dc:creator>
      <dc:date>2010-02-25T14:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: Need help with PAT and NAT w/single public IP</title>
      <link>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348783#M743174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear. Thanks for rating.&lt;/P&gt;&lt;P&gt;Specifying the keyword interface is clearly documented in the command ref.if you need to read on that.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1512466"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/s8.html#wp1512466&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1512476table1512474" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;TD&gt;&lt;P class="pB1_Body1"&gt;&lt;STRONG class="cBold"&gt;interface&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1512511"&gt;&lt;/A&gt;&lt;P class="pB1_Body1"&gt;Uses the interface IP address as the mapped address. Use this keyword if you want to use the interface address, but the address is dynamically assigned using DHCP.&lt;/P&gt;&lt;A name="wp1512512"&gt;&lt;/A&gt;&lt;P class="pNT_NoteTable"&gt;&lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;You must use the &lt;STRONG class="cBold"&gt;interface&lt;/STRONG&gt; keyword instead of specifying the actual IP address when you want to include the IP address of an interface in a static PAT entry.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Feb 2010 14:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-with-pat-and-nat-w-single-public-ip/m-p/1348783#M743174</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-02-25T14:52:23Z</dc:date>
    </item>
  </channel>
</rss>

