<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TWO Way NAT in Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401673#M836573</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just one question,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what will check first Destinaion or source&amp;nbsp; NAT.&amp;nbsp; At which time both will Apply on Packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;A.N&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Aug 2012 13:16:20 GMT</pubDate>
    <dc:creator>ank.narang</dc:creator>
    <dc:date>2012-08-28T13:16:20Z</dc:date>
    <item>
      <title>TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401666#M836563</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to do the two way(I mean both source and destination ) in cisco ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mathew&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401666#M836563</guid>
      <dc:creator>mathew-varghese</dc:creator>
      <dc:date>2019-03-11T17:35:25Z</dc:date>
    </item>
    <item>
      <title>TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401667#M836564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class="jive-thread-reply-message"&gt;&lt;!-- [DocumentBodyStart:2eeca9db-3633-4756-a450-d2f03e452868] --&gt;&lt;DIV class="jive-rendered-content"&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to do the two way (I mean both source and destination ) NAT in cisco ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mathew&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 09:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401667#M836564</guid>
      <dc:creator>mathew-varghese</dc:creator>
      <dc:date>2010-04-21T09:26:03Z</dc:date>
    </item>
    <item>
      <title>Re: TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401668#M836565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can perform both source and destination NAT on ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check out this sample configuration on the "alternative solution: destination NAT" section:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 09:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401668#M836565</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-21T09:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401669#M836566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Halijenn for your response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't see both source and destination NAT in the example which you sent. My requirement is very simple...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got a source network (say x.x.x.x/y) which is accessing the y.y.y.y/x(real ip) beyond the ASA firewall.My requirement is that this both source and destination address should not see each other with their real address..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the source packet (x.x.x.x/y) reaches the ASA firewall it should be dynamically or PAT to say a.a.a.a/b and at the same time y.y.y.y/x should be statically NAT to say c.c.c.c/d in the ASA firewall itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please advice whether this is possible in ASA and if please send me link explaining similar example?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mathew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 11:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401669#M836566</guid>
      <dc:creator>mathew-varghese</dc:creator>
      <dc:date>2010-04-21T11:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401670#M836567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, here is an example:&lt;/P&gt;&lt;P&gt;Inside interface of ASA - 10.1.1.1 (security level 100)&lt;/P&gt;&lt;P&gt;Outside interface of ASA - 200.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host on the inside with ip address of 10.1.1.8 needs to be PATed to the ASA outside ip address.&lt;/P&gt;&lt;P&gt;Inside host is trying to reach destination of 100.1.1.1 (real), but you would like to NAT this destination to say 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 5 10.1.1.8 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 5 interface&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.1.1.20 100.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When inside host trying to access the outside host of 100.1.1.1, it should access it via its NATed ip of 10.1.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 11:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401670#M836567</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-21T11:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401671#M836569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class="jive-rendered-content"&gt;Thanks a ton for your quick response.&lt;P&gt;&lt;/P&gt;In my case the scenario is just opposite to this. There are few users sitting at the outside of my firewall need to access a server in the inside interface.&lt;P&gt;&lt;/P&gt;When a user tries to access to the server's NAT ip ,should get statically translated to server's real ip and at the same time , the source ip of the packet should get dynamically natted to the inteface ip.&lt;P&gt;&lt;/P&gt;Could you please advice on the possiblities for this along with the configuration?&lt;P&gt;&lt;/P&gt;Regards&lt;BR /&gt;Mathew&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 11:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401671#M836569</guid>
      <dc:creator>mathew-varghese</dc:creator>
      <dc:date>2010-04-21T11:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401672#M836571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, in that case, you should have the following configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming, the server is 10.1.1.8 --&amp;gt; statically NATed to 200.1.1.8&lt;/P&gt;&lt;P&gt;Outside hosts (100.1.1.1, 150.1.1.1, 170.1.1.1) needs to be PATed to inside interface ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.1.1.8 10.1.1.8 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-pat permit ip host 100.1.1.1 host 200.1.1.8&lt;/P&gt;&lt;P&gt;access-list outside-pat permit ip host 150.1.1.1 host&amp;nbsp; 200.1.1.8&lt;/P&gt;&lt;P&gt;access-list outside-pat permit ip host 170.1.1.1 host&amp;nbsp; 200.1.1.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 5 access-list outside-pat outside&lt;/P&gt;&lt;P&gt;global (inside) 5 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR, if you would like all hosts on the outside to be PATed to the inside, you can just have the following access-list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-pat permit ip any host&amp;nbsp; 200.1.1.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Apr 2010 11:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401672#M836571</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-21T11:57:29Z</dc:date>
    </item>
    <item>
      <title>TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401673#M836573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just one question,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what will check first Destinaion or source&amp;nbsp; NAT.&amp;nbsp; At which time both will Apply on Packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;A.N&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 13:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401673#M836573</guid>
      <dc:creator>ank.narang</dc:creator>
      <dc:date>2012-08-28T13:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: TWO Way NAT in Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401674#M836577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ank,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the destination of the traffic goes first &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the lab I just made to explain it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh ip&lt;/P&gt;&lt;P&gt;System IP Addresses:&lt;/P&gt;&lt;P&gt;Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Subnet mask&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Method&lt;/P&gt;&lt;P&gt;GigabitEthernet0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.4.4.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;GigabitEthernet1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.12.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; manual&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh run object network&lt;/P&gt;&lt;P&gt;object network Local&lt;/P&gt;&lt;P&gt; subnet 192.168.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Remote_real&lt;/P&gt;&lt;P&gt; subnet 192.168.13.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Remote_Fake&lt;/P&gt;&lt;P&gt; subnet 192.168.14.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Fake_lan&lt;/P&gt;&lt;P&gt; subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the result of the test ( Inside- to outside flow)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; packet-tracer input inside tcp 192.168.12.2 1025 192.168.14.10 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface outside&lt;/P&gt;&lt;P&gt;Untranslate 192.168.14.10/80 to 192.168.13.10/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 192.168.12.2/1025 to 10.10.10.2/1025&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So we can see the translation happens first from the destination of the traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now traffic from the external LAN to the inside fake lan :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; packet-tracer input outside tcp 192.168.13.20 1025 10.10.10.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 10.10.10.2/80 to 192.168.12.2/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 192.168.13.20/1025 to 192.168.14.20/1025&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Local Fake_lan destination static Remote_Fake Remote_real&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So as you can see againg the destination of the traffic gets un-translated first &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Hope this helps&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all the helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2012 18:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-way-nat-in-cisco-asa/m-p/1401674#M836577</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-08-28T18:53:42Z</dc:date>
    </item>
  </channel>
</rss>

