<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT overload on asa 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328055#M818515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean ping the outside interface from an inside host/pc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No. You can only ping the closest interface to the PC. If the PC is on the inside you can only ping the inside interface IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the PC is outside you can only ping the outside interface IP on the FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is by design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as your nat lines. both nat and route lines appear as one line. I am not sure how that happened. Pls. make sure &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;only shows the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and sh run global &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;only shows the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These two lines do the overloading that you do in case of routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Sep 2009 16:10:44 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2009-09-07T16:10:44Z</dc:date>
    <item>
      <title>NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328046#M818498</link>
      <description>&lt;P&gt;I have a ASA 5520 and would like to know how to setup NAT overload so my internal users can access the internet with the one public IP I have.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328046#M818498</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2019-03-11T16:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328047#M818499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a link with some good NAT info.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/search/display?url=http%3A%2F%2Fwww.cisco.com%2Fen%2FUS%2Fproducts%2Fps6120%2Fproducts_configuration_example09186a008046f31a.shtml&amp;amp;pos=1&amp;amp;strqueryid=1&amp;amp;websessionid=tQ3rXdNFF5kNHv7DwDtFxox" target="_blank"&gt;http://tools.cisco.com/search/display?url=http%3A%2F%2Fwww.cisco.com%2Fen%2FUS%2Fproducts%2Fps6120%2Fproducts_configuration_example09186a008046f31a.shtml&amp;amp;pos=1&amp;amp;strqueryid=1&amp;amp;websessionid=tQ3rXdNFF5kNHv7DwDtFxox&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Sep 2009 23:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328047#M818499</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-09-06T23:47:41Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328048#M818500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I try that commands and I was unable to overload, do I need to setup any ACL?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 00:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328048#M818500</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-07T00:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328049#M818501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which IP address should I put at the nat(inside)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 00:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328049#M818501</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-07T00:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328050#M818502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can either nat anything or ur specific subnet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0.0.0.0 OR&lt;/P&gt;&lt;P&gt;nat (inside) 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as you have ur nat global ur nat inside&lt;/P&gt;&lt;P&gt;and ur default route it should work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 01:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328050#M818502</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-09-07T01:07:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328051#M818510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;simple nat exaple attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 12:41:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328051#M818510</guid>
      <dc:creator>rlisiecki</dc:creator>
      <dc:date>2009-09-07T12:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328052#M818511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;guess I am missing something cause it did not work for me at all. Can someone look over my config.. plz.. I am using windows 7 and have problems getting to the GUI.&lt;/P&gt;&lt;P&gt;==================&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 7.0(8)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname tempasa&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 69.160.74.206 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 69.160.221.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.32 255.255.254.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 route outside 0.0.0.0 0.0.0.0 69.167.64.205 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.254.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 50&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Cryptochecksum:1d6053dae2b794b9159dab62f7af0f07&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;tempasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 14:42:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328052#M818511</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-07T14:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328053#M818512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 route outside 0.0.0.0 0.0.0.0 69.167.64.205 1  (I think this should be two lines)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 69.167.64.205 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 14:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328053#M818512</guid>
      <dc:creator>rlisiecki</dc:creator>
      <dc:date>2009-09-07T14:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328054#M818513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;should I be able to ping the outside interface from the inside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 15:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328054#M818513</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-07T15:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328055#M818515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean ping the outside interface from an inside host/pc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No. You can only ping the closest interface to the PC. If the PC is on the inside you can only ping the inside interface IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the PC is outside you can only ping the outside interface IP on the FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is by design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as your nat lines. both nat and route lines appear as one line. I am not sure how that happened. Pls. make sure &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;only shows the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and sh run global &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;only shows the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These two lines do the overloading that you do in case of routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Sep 2009 16:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328055#M818515</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-09-07T16:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328056#M818517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the ASA can you ping 69.167.64.205? If it fails, do a SHOW ARP and see if you see a MAC to IP mapping. Let us know the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 12:16:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328056#M818517</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-09-08T12:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328057#M818518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks a lot guys I got it to work, I am going to try to pool 3 public IP I have to do NAT overload.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 13:06:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328057#M818518</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-08T13:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328058#M818519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can I overload the 3 public IP I have in the NAT rule?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 13:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328058#M818519</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-08T13:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328059#M818520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can only PAT one address. If you use 3 addresses, it will 1:1 NAT the first two addresses and then PAT the 3rd.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Sep 2009 13:26:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328059#M818520</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-09-08T13:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT overload on asa 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328060#M818521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot, I got it to work now. The major problem I was having was that I keep test the ping from the ASA, which keep failing when I test it from a system on the LAN I was able to access the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Sep 2009 20:34:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-overload-on-asa-5520/m-p/1328060#M818521</guid>
      <dc:creator>shanemcanuff</dc:creator>
      <dc:date>2009-09-09T20:34:43Z</dc:date>
    </item>
  </channel>
</rss>

