<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Interesting issue on the FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270668#M785288</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From your description I got&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3rd party-------(int1)FWSM(int2)--------concentrator&lt;/P&gt;&lt;P&gt;x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;x does not have a route to y&lt;/P&gt;&lt;P&gt;outside hosts have a route to y&lt;/P&gt;&lt;P&gt;y has a route to x&lt;/P&gt;&lt;P&gt;the 3rd party wants to talk to the concentrator y public ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can translate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (int2,int1) y y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The the 3rd party will use the FWSM as its gateway and the FWSM will be able to send the traffic to the concentrators public ip.&lt;/P&gt;&lt;P&gt;The return traffic from the concentrator will hit the FWSM and the FWSM will send it to the 3rd party.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I didn't grasp the problem correctly please explain what I am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Nov 2009 23:48:38 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2009-11-25T23:48:38Z</dc:date>
    <item>
      <title>Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270667#M785285</link>
      <description>&lt;P&gt;Dear Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an interesting issue on the FWSM. &lt;BR /&gt;There is a vpn concentrator connecting to the FWSM and the FWSM is its default gateway for outside world.&lt;/P&gt;&lt;P&gt;There is another third party network on the same network and its default gateway to outside world is the FWSM again.&lt;/P&gt;&lt;P&gt;Now, the nating on the third party network is done in its own network device and FWSM sees only public IP Addresses from this third party network.&lt;/P&gt;&lt;P&gt;But the vpn concentrator is public NAT'ed on the FWSM.&lt;/P&gt;&lt;P&gt;Now, the requirement is that the third party network needs to access the VPN COncentrator on its public IP for remote vpn.&lt;/P&gt;&lt;P&gt;Now, i am not sure if this possible.&lt;/P&gt;&lt;P&gt;Here is the relevant configuration for vpn concentrator, outside and third party network:&lt;/P&gt;&lt;P&gt;interface vlan102&lt;BR /&gt;nameif vpn&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.101.1 255.255.255.0 standby 192.168.101.2&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;interface vlanx&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 86.36.x.x x.x.x.x standby 86.36.x.x&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;interface vlan256&lt;BR /&gt;nameif thirdparty&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 86.36.x.x x.x.x.x standby 86.36.x.x&lt;BR /&gt;no shut&lt;/P&gt;&lt;P&gt;route thirdparty 86.36.50.x 255.255.255.224 86.36.x.x&lt;BR /&gt;route outside 0 0 86.36.x.x&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Here is the flow of traffic:&lt;/P&gt;&lt;P&gt;1. Third Party network--&amp;gt;FWSM--&amp;gt;Public ip of COncentrator&lt;/P&gt;&lt;P&gt;Now i am not sure if traffic would go to outside interface? Because the public IP is a nAT'ed ip on the fwsm itself.&lt;BR /&gt;I dont know how the FWSM reacts if it sees a destination IP that is a NAT'ed IP for the real IP on another interface (vpn).&lt;BR /&gt;Please note that nat-control is enabled and i have also enabled same-security-traffic permit inter-interface. &lt;BR /&gt;There is no nating configured between the vpn and third party networks.&lt;/P&gt;&lt;P&gt;2. Return Traffic&lt;/P&gt;&lt;P&gt;This is clear. It should be VPN Concentrator--&amp;gt;FWSM--&amp;gt;Third party network gateway--&amp;gt;VPN client on third party network.&lt;/P&gt;&lt;P&gt;However now the confusion is the egress path. CUrrently, the problem is that the VPN concentrator is not reachable through the third party network but is reachable from outside world.&lt;/P&gt;&lt;P&gt;I suspect that this could be asymmetric routing issue.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Does anyone have a clue on what should be the approach here?&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;Thanks a lot&lt;BR /&gt;Gautam&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270667#M785285</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2019-03-11T16:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270668#M785288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From your description I got&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3rd party-------(int1)FWSM(int2)--------concentrator&lt;/P&gt;&lt;P&gt;x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;x does not have a route to y&lt;/P&gt;&lt;P&gt;outside hosts have a route to y&lt;/P&gt;&lt;P&gt;y has a route to x&lt;/P&gt;&lt;P&gt;the 3rd party wants to talk to the concentrator y public ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can translate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (int2,int1) y y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The the 3rd party will use the FWSM as its gateway and the FWSM will be able to send the traffic to the concentrators public ip.&lt;/P&gt;&lt;P&gt;The return traffic from the concentrator will hit the FWSM and the FWSM will send it to the 3rd party.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I didn't grasp the problem correctly please explain what I am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Nov 2009 23:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270668#M785288</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2009-11-25T23:48:38Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270669#M785289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gautham,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see the topology as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN_Concentrator-------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |--------(in)FWSM(out)-----Internet&lt;/P&gt;&lt;P&gt;3-RD-PARTY-N/W--------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You want the 3-rd party n/w to access the VPN using it pubic address. Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is so much easier to access the VPN using its inside address. Anyway you would have to do D-NAT on the FWSM to get this to work and of course you need same security permit intra-interface as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,in) VPN_outside-IP VPN_inside_IP&amp;nbsp;&amp;nbsp; -----&amp;gt; This is NAT for destination&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,in) 3_RD-PARTY-N/W_IP 3_RD-PARTY-N/W_IP -----&amp;gt; This is NAT for the source&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See if this works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Nov 2009 03:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270669#M785289</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-26T03:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270670#M785290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I missed to mention that you may have to add a host&amp;nbsp; route on your VPN concentrator to send the traffic destined to the 3-rd party network via the FWSM. Otherwise it will cause assymetry meaning the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. The request from the 3-rd party will come to the FWSM&lt;/P&gt;&lt;P&gt;2. The response from VPN will go directly to 3-rd party.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also, would want to add translation for the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,in) VPN_inside_IP VPN_inside_IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give this a shot and let us know how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Nov 2009 13:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270670#M785290</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-26T13:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270671#M785291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear pkampana and kushankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pkampana: When you mention y in the static (int2,int1) y y, are you saying the vpn concentrator's public ip as "y"?&lt;/P&gt;&lt;P&gt;Please note that the vpn concentrator is also nated on the FWSM in the following way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (vpn, outside) 86.36.x.x 192.168.101.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if i mention also:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (vpn, thirdpartynetwork) 86.36.x.x 192.168.101.11 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the second static statement possible? I am doubtful because my understanding is that you can nat to one ip only on one interface. You can't use the same nat'ed IP on the other interface. Please correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;kushankar: The vpn concentrator vlan terminates on the FWSM on one vlan interface and the third party network terminates on the FWSM on another vlan interface. I am sorry if i caused any confusion with my explanation. So, i guess that you recommended same-security-traffic permit intra-interface because you thought that both networks connect to the same vlan interface on the FWSM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason we need the third party network to access the vpn concentrator on its public IP is because the vpn concentrator is external to the third party network. Moreover, they access the IPSEC VPN through the hostname which resolves to a public ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Nov 2009 16:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270671#M785291</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2009-11-26T16:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270672#M785293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VPN_Concentrator-------(V)FWSM(O) ------Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (3)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3-RD-PARTY-N/W&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gautham,&lt;/P&gt;&lt;P&gt;Any time you post a question just put a clear text based diagram like this one. I paid more attention to what you said and missed the config part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I thought both VPN and 3-rd party are off the same interface. But, now I see they are not. But the solution is still the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to provide destination as well as source nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (V,3) vpn_public_ip VPN_inside_IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may or may not need the following: (this depends on whether you have translation between these interfaces for these IPs or not)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (3,V) 3_rd_Party_IP 3_rd_Party_IP&lt;/P&gt;&lt;P&gt;static (v,3) vpn_inside vpn_inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No need for same security intra.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Watch the logs and see what they say when you test the flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Nov 2009 12:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270672#M785293</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-27T12:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270673#M785296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Kushankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot. Will certainly try that one as soon as i get access to the device next which will be Dec 6 after the Eid holidays.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i still did not get it where we have two static entries for the same IP address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (V,3) vpn_public_ip VPN_inside_IP&lt;/P&gt;&lt;P&gt;static (v,3) vpn_inside vpn_inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that only the first one is necessary?&lt;/P&gt;&lt;P&gt;v and V refer to the same interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Nov 2009 17:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270673#M785296</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2009-11-27T17:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270674#M785298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gautham,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (V,3) vpn_public_ip VPN_inside_IP ---&amp;gt; this is D-NAT. This tells the FWSM's 3-rd party interface to send all packets with the destination IP of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpn_pulibc_ip to be sent to the VPN interface to the VPN_inside_IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I do not know if you have provided translation for the source for VPN inside and 3-rd party address.&amp;nbsp; I just provided identity translation for those as well. You may need it. Yes V and v mean the same VPN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck. Let us know how it goes. Logs are your best friend. Check the logs (debug level) when you test the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Nov 2009 14:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270674#M785298</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-29T14:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270675#M785300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks KS. Will let you know how it goes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Nov 2009 15:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270675#M785300</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2009-11-29T15:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270676#M785304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot KS. Your suggestion worked like a charm. !!&lt;/P&gt;&lt;P&gt;I did the static translation for vpn to third party and it worked great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I never knew that a firewall could translate a real address to another address being the same on two different interfaces.&lt;/P&gt;&lt;P&gt;But it worked great. Thanks a lot again!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Dec 2009 20:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270676#M785304</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2009-12-13T20:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: Interesting issue on the FWSM</title>
      <link>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270677#M785315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very glad to hear Gautam.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Dec 2009 23:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interesting-issue-on-the-fwsm/m-p/1270677#M785315</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-13T23:34:46Z</dc:date>
    </item>
  </channel>
</rss>

