<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat 0 command in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445688#M856617</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list DMZ; 3 elements&lt;BR /&gt;access-list DMZ line 1 extended permit icmp host 2.2.2.2 host 10.146.1.1 (hitcnt&lt;BR /&gt;=1) 0xa3c5bf6e&lt;BR /&gt;access-list DMZ line 2 extended permit tcp any host 10.146.1.2 eq telnet (hitcnt&lt;BR /&gt;=1) 0xfcc3c7a0&lt;BR /&gt;access-list DMZ line 3 extended permit icmp any any (hitcnt=1) 0x15d4b4de&lt;BR /&gt;access-list no-nat; 1 elements&lt;BR /&gt;access-list no-nat line 1 standard permit host 192.168.1.5 (hitcnt=0) 0xd26fb7b7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PIX(config)# sh run nat&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it so that in NAT 0 only extended access-list is used?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At present i m specifying only 1 host address that is to be exempted how i can achieve by excluding the host address which are statically natted at DMZ interface.&lt;/P&gt;&lt;P&gt;Can i specify 2 NAT 0 statement.with 2 different access-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Jun 2010 19:05:28 GMT</pubDate>
    <dc:creator>estelamathew</dc:creator>
    <dc:date>2010-06-04T19:05:28Z</dc:date>
    <item>
      <title>Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445684#M856604</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ADSL router ahead of my firewall OUTSIDE INTERFACE and ADSL is doing natting for the users who are going to the internet ,i want to disable natting for internal users on my firewall, As if now i have a&lt;STRONG&gt; &lt;SPAN style="color: #ff0000;"&gt;INTRANET&lt;/SPAN&gt;&lt;/STRONG&gt; connectivity from my DMZ interface to my rest branches i cannot disable nat-control,I have static natting for my internal servers which are been accessed from branch offices through &lt;STRONG style="color: #ff0000; "&gt;INTRANET&lt;/STRONG&gt; link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i specify access-list&amp;nbsp; for full internal subnet.&lt;/P&gt;&lt;P&gt;access-list no-nat permit 10.10.0.0 255.25.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 permit access-list exempt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;IT GIVESME THE BELOW OUTPUT:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix#(config)# nat (inside) 0 access-list exempt&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;ERROR: Cannot mix different types of access lists&lt;BR /&gt;ERROR: Access-list "exempt" does not exist&lt;/SPAN&gt;&lt;BR /&gt;Usage: [no] nat (&amp;lt;if_name&amp;gt;) &amp;lt;nat_id&amp;gt; &amp;lt;local_ip&amp;gt; [&amp;lt;mask&amp;gt;]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [dns] [outside]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [[tcp] &amp;lt;max_conns&amp;gt; [&amp;lt;emb_limit&amp;gt; [&amp;lt;norandomseq&amp;gt;]]]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [udp &amp;lt;udp_max_conns&amp;gt;]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [no] nat (if_name) &amp;lt;nat_id&amp;gt; access-list &amp;lt;acl-name&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [dns] [outside]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [[tcp] &amp;lt;max_conns&amp;gt; [&amp;lt;emb_limit&amp;gt; [&amp;lt;norandomseq&amp;gt;]]]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [udp &amp;lt;udp_max_conns&amp;gt;]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that the IP which i m using for static natting are getting mixup with nat exempt so i tried with different subnet which is not in my network but still gives me the same error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How i can achieve the above senario can i specify more than 1 acces-list for nat 0, by exempting the&amp;nbsp; ip address which i m using for static Natting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445684#M856604</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2019-03-11T17:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445685#M856607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think your syntax is wrong and your ACL does not exist. The syntax is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 14:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445685#M856607</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-06-04T14:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445686#M856610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is typing mistake by me in previous mail i have specified proper access-list , still i get the same error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 17:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445686#M856610</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T17:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445687#M856613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Estela,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're indeed having an error with the syntax.&lt;/P&gt;&lt;P&gt;Could you post the output of the following commands to show you the errors?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 17:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445687#M856613</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T17:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445688#M856617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX(config)# sh access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;BR /&gt;access-list DMZ; 3 elements&lt;BR /&gt;access-list DMZ line 1 extended permit icmp host 2.2.2.2 host 10.146.1.1 (hitcnt&lt;BR /&gt;=1) 0xa3c5bf6e&lt;BR /&gt;access-list DMZ line 2 extended permit tcp any host 10.146.1.2 eq telnet (hitcnt&lt;BR /&gt;=1) 0xfcc3c7a0&lt;BR /&gt;access-list DMZ line 3 extended permit icmp any any (hitcnt=1) 0x15d4b4de&lt;BR /&gt;access-list no-nat; 1 elements&lt;BR /&gt;access-list no-nat line 1 standard permit host 192.168.1.5 (hitcnt=0) 0xd26fb7b7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PIX(config)# sh run nat&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it so that in NAT 0 only extended access-list is used?????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At present i m specifying only 1 host address that is to be exempted how i can achieve by excluding the host address which are statically natted at DMZ interface.&lt;/P&gt;&lt;P&gt;Can i specify 2 NAT 0 statement.with 2 different access-list&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 19:05:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445688#M856617</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T19:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445689#M856623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have internal users accessing the DMZ?&lt;/P&gt;&lt;P&gt;Do you want the exempt from the internal users to the DMZ and outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you provide a "show run"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 19:24:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445689#M856623</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-06-04T19:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445690#M856625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside-------outside---------ADSL----------Internet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;Do you have internal users accessing the DMZ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;Do you want the exempt from the internal users to the DMZ and outside?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i need the internal users accessing the internet through the firewall outside interface should be exempted by nat becz my ADSL router which is connected to outside on firewall is doing natting, instead of doing double natting i can do single natting on ADSL router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname PIX-1&lt;BR /&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt; description outside&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.16.1.1 255.255.255.0 standby 172.16.1.3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt; description inside&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.6 255.255.255.0 standby 192.168.1.7&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt; description dmz&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.146.254.2 255.255.255.248 standby 10.146.254.3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet4&lt;BR /&gt; description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list DMZ extended permit icmp host 2.2.2.2 host 10.146.1.1&lt;BR /&gt;access-list DMZ extended permit tcp any host 10.146.1.2 eq telnet&lt;BR /&gt;access-list no-nat standard permit host 192.168.1.5 ------------------------&amp;gt; &lt;STRONG style="color: #ff0000; "&gt;This IP is the of switch which is connected to inside interface of firewall&lt;/STRONG&gt;&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface LAN Ethernet4&lt;BR /&gt;failover interface ip LAN 192.168.2.6 255.255.255.0 standby 192.168.2.7&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (DMZ) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,DMZ) 10.146.1.1 10.146.10.2 netmask 255.255.255.255&lt;BR /&gt;static (inside,DMZ) 10.146.1.2 10.146.10.1 netmask 255.255.255.255&lt;BR /&gt;access-group DMZ in interface DMZ&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.16.1.2 1&lt;BR /&gt;route inside 10.146.10.0 255.255.255.0 192.168.1.5 1&lt;BR /&gt;route DMZ 2.2.2.2 255.255.255.255 10.146.254.1 1&lt;BR /&gt;route DMZ 10.147.254.0 255.255.255.0 10.146.254.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:0&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet 10.146.10.0 255.255.255.0 inside&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;telnet 192.168.1.5 255.255.255.255 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:1b70b59c4a8323d1b67afed38eefcfa3&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 19:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445690#M856625</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T19:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445691#M856629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK in that case all you need to do is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no global (outside) 1 interface&lt;/P&gt;&lt;P&gt;no nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need the dmz to be natted on the adsl router you need to apply similar commands.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 19:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445691#M856629</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-06-04T19:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445692#M856633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate ur replies but some confusion please corrrect me, i think my question is not clear or some misunderstanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MY GOAL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I m securing my branch users to access my internal &lt;STRONG style="color: #ff0000; "&gt;Network (A)&lt;/STRONG&gt; by giving access to specific servers which are statically natted as u can see in configuration, and giving users of &lt;STRONG style="color: #ff0000; "&gt;Network (A) &lt;/STRONG&gt;to be exempted from the nat moving towards ADSL router towards internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need internal users to go on my branches through DMZ interface,ON my DMZ interface , router is connected which is connecting to ISP for my other branches if i execute nat (inside) 0 0.0.0.0 0.0.0.0 then will i will be able to go on my branches,?????? definately NO, where is the nattting from inside to DMZ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at present my configs are below to go from inside to DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 20:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445692#M856633</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T20:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445693#M856637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You say you want to allow your internal users to be natted on the adsl one of the ways to do that is as I have mentioned before, this will allow the actual IP address of the users to be seen on the ADSL router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no global (outside) 1 interface&lt;/P&gt;&lt;P&gt;no nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want internal users to be untranslated going to the branches that are off the DMZ then you can either do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.146.10.0 10.146.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit 192.168.1.0 255.255.255.0 &lt;BRANCH subnet=""&gt; &lt;BRANCH mask=""&gt;&lt;/BRANCH&gt;&lt;/BRANCH&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit 10.146.10.0 255.255.255.0 &lt;BRANCH subnet=""&gt; &lt;BRANCH mask=""&gt;&lt;/BRANCH&gt;&lt;/BRANCH&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will also need an ACL on the DMZ interface to ensure that the traffic you want is allowed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 20:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445693#M856637</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-06-04T20:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445694#M856641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for ur support nd pateints&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Netowrk-A----------Core-Switch-----------inside----------outside----------ADSL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want only Netwrok A users untranslated going to ADSL ,they should be translated when they go to branch routers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i want the below commands intact becz the subnet between the DMZ and router is known by each and every branch site so whenever Network A users go to branch they will always pick the address of the DMZ interface which is known by every branch, (ISP has redistributed connected interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can u provide me with the solution with the above command intact.(no change).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 20:59:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445694#M856641</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T20:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445695#M856645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't know what the address of "network A" is but if all you want to do is allow that one network to be untranslated going outside then you can try the following without removing anything:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 21:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445695#M856645</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-06-04T21:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445696#M856648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes ! i think it is clear view for u now i will tell u what the problem is: In my network A i have many subnets for 10.146.0.0 for example 10.146.10.0 and 10.146.20.0 etc,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what i m thinking is&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit 10.146.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oooh do the above command will afffect to DMZ interface also ????? Also i have statically natted some of the Network A IP's. that branch will come from DMZ to access IN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.146.1.1 10.146.10.2 netmask 255.255.255.255&lt;BR /&gt;static (inside,DMZ) 10.146.1.2 10.146.10.1 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 21:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445696#M856648</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T21:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445697#M856652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes there is a NAT order of operation, so using nat 0 access list may over ride your static nat statments. Please see link below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/docs/DOC-4284;jsessionid=893EDF27EF9C9954533D709CBB180B42.node0"&gt;https://supportforums.cisco.com/docs/DOC-4284;jsessionid=893EDF27EF9C9954533D709CBB180B42.node0&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 21:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445697#M856652</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-06-04T21:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 command</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445698#M856657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From ur second last mail : u have mentioned below soultion:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;YOUR SOLUTION:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These IP &lt;STRONG style="color: #ff0000; "&gt;192.168.1.0 255.255.255.0&lt;/STRONG&gt; will also be exempted from translating when going through DMZ interface to the branche. AM i correct????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so then what is the solution to translate on DMZ side and not to translate on ADSL side????????????????????????????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 21:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-command/m-p/1445698#M856657</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-06-04T21:44:35Z</dc:date>
    </item>
  </channel>
</rss>

