<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 NAT Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379378#M857022</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Since you have multiple interfaces with the same security level, one thing you need to decide is whether or not you want your directly connected subnets to have the ability to talk to one another without NAT. If that is OK, you can enter the &lt;SPAN class="content"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;same-security-traffic permit &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; intra-interface&lt;/SPAN&gt; command. Access will still be restricted by the ACL, but you will no longer need to NAT between interfaces. If you do not want to do that, I would create a NAT 0 like you have, but keep it simple.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;nat (CNES) 0 access-list CSM_nat0_CNES&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list CSM_nat0_CNES extended permit ip 187.187.168.1 255.255.0.0 192.168.168.1 255.255.255.0 &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Apr 2010 15:14:29 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2010-04-06T15:14:29Z</dc:date>
    <item>
      <title>ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379375#M857019</link>
      <description>&lt;P&gt;&lt;!-- icon and title --&gt;&lt;/P&gt;&lt;DIV align="right" class="smallfont"&gt;&lt;IMG alt="Default" border="0" class="inlineimg" src="http://www.velocityreviews.com/forums/images/icons/icon1.gif" title="Default" /&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;!-- / icon and title --&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;!-- message --&gt;&lt;DIV id="post_message_4054284"&gt;&lt;!-- google_ad_section_start --&gt;Hello there,&lt;BR /&gt;&lt;DIV class="”KonaBody”"&gt;&lt;BR /&gt; I am hoping somebody up\out there can save my sanity.&amp;nbsp; I am setting up a&amp;nbsp; new ASA 5505 with multiple &lt;A class="kLink" href="http://www.velocityreviews.com/forums/t719747-asa-5505-nat-issue.html#" id="KonaLink0" style="text-decoration: underline ! important; position: static;" target="undefined"&gt;&lt;SPAN style="color: blue ! important; position: static;"&gt;&lt;SPAN class="kLink" style="color: blue ! important; position: relative;"&gt;interfaces&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;, infact we&amp;nbsp; are using 5 of them.&amp;nbsp; The internal network is on the 192.168.168.x and&amp;nbsp; has &lt;A class="kLink" href="http://www.velocityreviews.com/forums/t719747-asa-5505-nat-issue.html#" id="KonaLink1" style="text-decoration: underline ! important; position: static;" target="undefined"&gt;&lt;SPAN style="color: blue ! important; position: static;"&gt;&lt;SPAN class="kLink" style="color: blue ! important; position: relative;"&gt;web&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; access to the&amp;nbsp; outside.&amp;nbsp; That is working without any issues but i am sure that is were&amp;nbsp; the problem lies.&amp;nbsp; I am trying to get traffic to pass from the CNES&amp;nbsp; interface to the Inside interface and vice versa.&amp;nbsp; I have configured the&amp;nbsp; ACL's using Cisco Security Manager so i know they are working.&amp;nbsp; I use&amp;nbsp; the packet trace app in ASDM and that fails with a NAT issue but for the&amp;nbsp; life of me i cant work out what i have done wrong.&amp;nbsp; The syslog message&amp;nbsp; its throwing up is:&lt;BR /&gt; &lt;BR /&gt; 08:22:20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;305005&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;192.168.168.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;No translation group found for icmp src&amp;nbsp; CNES:187.187.10.90 dst inside:192.168.168.3 (type 8, code 0)&lt;BR /&gt; &lt;BR /&gt; Here is our running config:&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="”KonaBody”"&gt;&lt;BR /&gt;&lt;/DIV&gt;&lt;DIV class="”KonaBody”"&gt;Result of the command: "sh run"&lt;P&gt;&lt;/P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname secure-access&lt;BR /&gt;domain-name ************.co.uk&lt;BR /&gt;enable password *********** encrypted&lt;BR /&gt;passwd ************ encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.168.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group BT&lt;BR /&gt; ip address 217.36.*.* 255.255.255.255 pppoe &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.169.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan22&lt;BR /&gt; nameif Wireless_HHP&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.16.36.1 255.255.254.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan32&lt;BR /&gt; nameif CNES&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 187.187.168.1 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; switchport access vlan 22&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; switchport access vlan 32&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup DMZ&lt;BR /&gt;dns domain-lookup Wireless_HHP&lt;BR /&gt;dns domain-lookup CNES&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name hebrideanhousing.co.uk&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object-group network NET-cnes_HHP-Sty&lt;BR /&gt; network-object 172.20.224.0 255.255.240.0&lt;BR /&gt;object-group network NET-cnes_HHP-Balivanich&lt;BR /&gt; network-object 172.20.192.0 255.255.240.0&lt;BR /&gt;object-group network Oak-DC1&lt;BR /&gt; network-object 192.168.168.2 255.255.255.255&lt;BR /&gt;object-group network Maple-DC2&lt;BR /&gt; network-object 192.168.168.3 255.255.255.255&lt;BR /&gt;object-group network HHP_Domain_Controllers&lt;BR /&gt; group-object Oak-DC1&lt;BR /&gt; group-object Maple-DC2&lt;BR /&gt;object-group network PC-Support&lt;BR /&gt; network-object 187.187.60.1 255.255.255.255&lt;BR /&gt; network-object 187.187.60.2 255.255.255.254&lt;BR /&gt; network-object 187.187.60.4 255.255.255.254&lt;BR /&gt; network-object 187.187.60.6 255.255.255.255&lt;BR /&gt;object-group network ELM-ActiveH&lt;BR /&gt; network-object 192.168.168.6 255.255.255.255&lt;BR /&gt;object-group network Pine-GP&lt;BR /&gt; network-object 192.168.168.12 255.255.255.255&lt;BR /&gt;object-group network HHP_Application_Servers&lt;BR /&gt; group-object ELM-ActiveH&lt;BR /&gt; group-object Pine-GP&lt;BR /&gt;object-group network Fern-TS1&lt;BR /&gt; network-object 192.168.168.4 255.255.255.255&lt;BR /&gt;object-group network Fir-TS2&lt;BR /&gt; network-object 192.168.168.5 255.255.255.255&lt;BR /&gt;object-group network HHP_Terminal_Servers&lt;BR /&gt; group-object Fern-TS1&lt;BR /&gt; group-object Fir-TS2&lt;BR /&gt;object-group service Global_Catalog_LDAP&lt;BR /&gt; description (Generated by Cisco SM from Object "Global Catalog LDAP")&lt;BR /&gt; service-object tcp eq 3268 &lt;BR /&gt;object-group service Global_Catalog_LDAP_SSL&lt;BR /&gt; description (Generated by Cisco SM from Object "Global Catalog LDAP SSL")&lt;BR /&gt; service-object tcp eq 3269 &lt;BR /&gt;object-group service UDP-389&lt;BR /&gt; description UDP port for LDAP&lt;BR /&gt; service-object udp eq 389 &lt;BR /&gt;object-group service TCP-88&lt;BR /&gt; description TCP Port 88&lt;BR /&gt; service-object tcp eq 88 &lt;BR /&gt;object-group service TCP-445&lt;BR /&gt; description SMB&lt;BR /&gt; service-object tcp eq 445 &lt;BR /&gt;object-group network John_-_Laptop&lt;BR /&gt; description John's Laptop&lt;BR /&gt; network-object 187.187.10.65 255.255.255.255&lt;BR /&gt;object-group network Graham_-_PC&lt;BR /&gt; description Graham Morrison's PC&lt;BR /&gt; network-object 187.187.10.90 255.255.255.255&lt;BR /&gt;object-group network john_test&lt;BR /&gt; network-object 187.187.40.7 255.255.255.255&lt;BR /&gt;object-group network Iain_PC&lt;BR /&gt; description Iain Macaulay IT&lt;BR /&gt; network-object 187.187.10.19 255.255.255.255&lt;BR /&gt;object-group network John_-_PC&lt;BR /&gt; description John MacPhail's PC&lt;BR /&gt; network-object 187.187.10.7 255.255.255.255&lt;BR /&gt;object-group network it-alahen-lap&lt;BR /&gt; network-object 187.187.10.230 255.255.255.255&lt;BR /&gt;object-group network Catriona_-_Laptop&lt;BR /&gt; description Catriona's Laptop&lt;BR /&gt; network-object 187.187.10.60 255.255.255.255&lt;BR /&gt;object-group network Graham_-_Laptop&lt;BR /&gt; network-object 187.186.10.120 255.255.255.255&lt;BR /&gt;object-group network it-innive-xp&lt;BR /&gt; description Innes MacIver's PC&lt;BR /&gt; network-object 187.187.10.14 255.255.255.255&lt;BR /&gt;object-group network it-alahen-xp&lt;BR /&gt; description Desktop&lt;BR /&gt; network-object 187.187.10.229 255.255.255.255&lt;BR /&gt;object-group network Cat_-_PC&lt;BR /&gt; description Catriona Macmillan's PC&lt;BR /&gt; network-object 187.187.10.4 255.255.255.255&lt;BR /&gt;object-group network it-davdon-xp&lt;BR /&gt; description Desktop&lt;BR /&gt; network-object 187.187.10.7 255.255.255.255&lt;BR /&gt;object-group network cat-laptop&lt;BR /&gt; description Catriona's Laptop addresses&lt;BR /&gt; network-object 187.187.77.81 255.255.255.255&lt;BR /&gt; network-object 187.187.77.82 255.255.255.255&lt;BR /&gt;object-group network Catriona_old_pc&lt;BR /&gt; network-object 187.187.10.44 255.255.255.255&lt;BR /&gt;object-group network cat-tablet&lt;BR /&gt; description Catriona's Tablet ip address's&lt;BR /&gt; network-object 187.187.77.78 255.255.255.254&lt;BR /&gt;object-group network PC_Support&lt;BR /&gt; group-object John_-_Laptop&lt;BR /&gt; group-object Graham_-_PC&lt;BR /&gt; group-object john_test&lt;BR /&gt; group-object Iain_PC&lt;BR /&gt; group-object John_-_PC&lt;BR /&gt; group-object it-alahen-lap&lt;BR /&gt; group-object Catriona_-_Laptop&lt;BR /&gt; group-object Graham_-_Laptop&lt;BR /&gt; group-object it-innive-xp&lt;BR /&gt; group-object it-alahen-xp&lt;BR /&gt; group-object Cat_-_PC&lt;BR /&gt; group-object it-davdon-xp&lt;BR /&gt; group-object cat-laptop&lt;BR /&gt; group-object Catriona_old_pc&lt;BR /&gt; group-object cat-tablet&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in_1 extended permit ip any any &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq ldap &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq domain &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq 88 &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq ldaps &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq netbios-dgm &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq netbios-ns &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq netbios-ssn &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq ntp &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers eq 135 &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group Global_Catalog_LDAP object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group Global_Catalog_LDAP_SSL object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group UDP-389 object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group TCP-88 object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group TCP-445 object-group NET-cnes_HHP-Sty object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq ldap &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq domain &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq 88 &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq ldaps &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq netbios-dgm &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq netbios-ns &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq netbios-ssn &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit udp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq ntp &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit tcp object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers eq 135 &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group Global_Catalog_LDAP object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group Global_Catalog_LDAP_SSL object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group UDP-389 object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group TCP-88 object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_Wireless_HHP extended permit object-group TCP-445 object-group NET-cnes_HHP-Balivanich object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Domain_Controllers object-group NET-cnes_HHP-Balivanich &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Domain_Controllers object-group NET-cnes_HHP-Sty &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip 192.168.168.0 255.255.255.0 any &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Application_Servers object-group PC_Support &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Domain_Controllers object-group PC_Support &lt;BR /&gt;access-list CSM_FW_ACL_inside extended permit ip object-group HHP_Terminal_Servers object-group PC_Support &lt;BR /&gt;access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group NET-cnes_HHP-Balivanich &lt;BR /&gt;access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group NET-cnes_HHP-Sty &lt;BR /&gt;access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group HHP_Application_Servers &lt;BR /&gt;access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_FW_ACL_CNES extended permit ip object-group PC_Support object-group HHP_Terminal_Servers &lt;BR /&gt;access-list CSM_nat0_CNES extended permit ip any object-group HHP_Application_Servers &lt;BR /&gt;access-list CSM_nat0_CNES extended permit ip any object-group HHP_Domain_Controllers &lt;BR /&gt;access-list CSM_nat0_CNES extended permit ip any object-group HHP_Terminal_Servers &lt;BR /&gt;access-list CSM_nat0_inside extended permit ip any object-group PC-Support &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1492&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Wireless_HHP 1500&lt;BR /&gt;mtu CNES 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list CSM_nat0_inside&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (CNES) 0 access-list CSM_nat0_CNES&lt;BR /&gt;static (CNES,inside) 187.187.10.90 187.187.10.90 netmask 255.255.255.255 &lt;BR /&gt;access-group CSM_FW_ACL_inside in interface inside&lt;BR /&gt;access-group outside_access_in_1 in interface outside control-plane&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group CSM_FW_ACL_Wireless_HHP in interface Wireless_HHP&lt;BR /&gt;access-group CSM_FW_ACL_CNES in interface CNES&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 81.148.0.157 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server HHP protocol ldap&lt;BR /&gt;aaa-server HHP (inside) host 187.187.1.213&lt;BR /&gt; timeout 5&lt;BR /&gt; server-type auto-detect&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.168.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;http 194.83.245.242 255.255.255.255 outside&lt;BR /&gt;http 187.187.1.72 255.255.255.255 CNES&lt;BR /&gt;http 187.187.10.90 255.255.255.255 CNES&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment terminal&lt;BR /&gt; subject-name CN=secure-access.hebrideanhousing.co.uk,O=Hebridean Housing Partnership Limited,C=GB,St=Scotland,L=Isle of Lewis&lt;BR /&gt; keypair SSL_Certificate&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt; enrollment terminal&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt; certificate 0100000000012790a5c005&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;******************************************************&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;BR /&gt; ******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&lt;BR /&gt;******************************************************&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;******************************************************&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 194.83.245.242 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group BT request dialout pppoe&lt;BR /&gt;&lt;SPAN&gt;vpdn group BT localname &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:c460484@hg28.btclick.com" target="_blank"&gt;c460484@hg28.btclick.com&lt;/A&gt;&lt;BR /&gt;vpdn group BT ppp authentication chap&lt;BR /&gt;&lt;SPAN&gt;vpdn username &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:c460484@hg28.btclick.com" target="_blank"&gt;c460484@hg28.btclick.com&lt;/A&gt;&lt;SPAN&gt; password ********* &lt;/SPAN&gt;&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;P&gt;&lt;/P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt; enable inside&lt;BR /&gt; enable outside&lt;BR /&gt;group-policy HHP internal&lt;BR /&gt;group-policy HHP attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Severs&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;username gramor password ne829U0rGFVEedhY encrypted privilege 15&lt;BR /&gt;username gramor attributes&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list value Severs&lt;BR /&gt;tunnel-group WebVPN type remote-access&lt;BR /&gt;tunnel-group WebVPN general-attributes&lt;BR /&gt; default-group-policy HHP&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:eb69b6d6dbcf50f8bc87e8b971bc3299&lt;BR /&gt;: end&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379375#M857019</guid>
      <dc:creator>Catriona Macmillan</dc:creator>
      <dc:date>2019-03-11T17:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379376#M857020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have a couple of different options. Check this link for more information. If you still need help, just continue this post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml#Same"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807fc191.shtml#Same&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 13:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379376#M857020</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-04-06T13:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379377#M857021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info....i have read through it and i think the NAT rule i have from Inside to Outside is overruling all the other NAT rules i have.&amp;nbsp; I think its the main one i have to change but i dont know what too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 14:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379377#M857021</guid>
      <dc:creator>Catriona Macmillan</dc:creator>
      <dc:date>2010-04-06T14:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379378#M857022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Since you have multiple interfaces with the same security level, one thing you need to decide is whether or not you want your directly connected subnets to have the ability to talk to one another without NAT. If that is OK, you can enter the &lt;SPAN class="content"&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;same-security-traffic permit &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; intra-interface&lt;/SPAN&gt; command. Access will still be restricted by the ACL, but you will no longer need to NAT between interfaces. If you do not want to do that, I would create a NAT 0 like you have, but keep it simple.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;nat (CNES) 0 access-list CSM_nat0_CNES&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list CSM_nat0_CNES extended permit ip 187.187.168.1 255.255.0.0 192.168.168.1 255.255.255.0 &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 15:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379378#M857022</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-04-06T15:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379379#M857023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Colin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I follwed your advice and now traffic is allowed to flow between interafces with the same security level.&amp;nbsp; I run a packet tracer from asdm to see if it was now allowed through but it failed on the a NAT check.&amp;nbsp; I have attached the screen shot.&amp;nbsp; Here is the output from my SH NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;secure-access# sh nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;BR /&gt;&amp;nbsp; match ip inside any inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (217.36.32.222 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 15, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any Wireless_HHP any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any CNES any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 48, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any _internal_loopback any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface DMZ:&lt;BR /&gt;&amp;nbsp; match ip DMZ any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface Wireless_HHP:&lt;BR /&gt;&amp;nbsp; match ip Wireless_HHP any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;BR /&gt;&amp;nbsp; match ip Wireless_HHP any DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface CNES:&lt;BR /&gt;&amp;nbsp; match ip CNES any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;BR /&gt;&amp;nbsp; match ip CNES any DMZ any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 17:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379379#M857023</guid>
      <dc:creator>Catriona Macmillan</dc:creator>
      <dc:date>2010-04-06T17:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379380#M857024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post the syslog message instead of the screenshot?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 21:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379380#M857024</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-04-06T21:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379381#M857025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Colin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the messages we are getting are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;portmap translation creation failed for tcp src inside:192.168.168.100/52666 dst CNES:187.187.1.62/8192&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Apr 2010 10:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379381#M857025</guid>
      <dc:creator>Catriona Macmillan</dc:creator>
      <dc:date>2010-04-07T10:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379382#M857026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,CNES) 192.168.168.0 192.168.168.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should resolve the problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Apr 2010 11:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379382#M857026</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-07T11:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379383#M857027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no reason for this static pls. remove that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (CNES,inside) 187.187.10.90 187.187.10.90 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That syslog that you are talking about says that egress translation is missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will get you off the inside interface but to enter the CNES interface there is no matching global. You can provide that by either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (CNES) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or via the&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,CNES) 192.168.168.0 192.168.168.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;that Halijenn provided you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you choose to add the global (CNES) 1 interface then you can only initiate traffic from the inside to the CNES but, if you use the static 1-1 line then both inside and CNES can initiate traffic to the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding: 0px; min-height: 8pt; height: 8pt;"&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Apr 2010 12:06:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379383#M857027</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-07T12:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379384#M857029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Halijen,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for that! It has god rid of the messages. I take it i will need to configure static routes for the other interfaces as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Apr 2010 12:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379384#M857029</guid>
      <dc:creator>Catriona Macmillan</dc:creator>
      <dc:date>2010-04-07T12:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379385#M857031</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Static NAT is bidirectional, so once you configure "static (inside,CNES)", access from inside towards CNES and vice versa would work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to access Wireless_HHP subnet from inside and vice versa, you can configure:&lt;/P&gt;&lt;P&gt;static (inside,Wireless_HHP) 192.168.168.0 192.168.168.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Between inside and dmz interface, it would be:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.168.0 192.168.168.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Apr 2010 12:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1379385#M857031</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-07T12:16:06Z</dc:date>
    </item>
  </channel>
</rss>

