<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA-5510: Adding another static nat issue.  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097628#M894115</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here's the current config file. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname asa510-01 &lt;/P&gt;&lt;P&gt;domain-name corp.com &lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/0 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 214.x.x.114 255.255.255.240 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/1 &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 10.20.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/2 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/3 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive &lt;/P&gt;&lt;P&gt;clock timezone CST -6 &lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring &lt;/P&gt;&lt;P&gt;dns domain-lookup inside &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS &lt;/P&gt;&lt;P&gt;domain-name corp.com &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.20.1.0 255.255.0.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.20.1.0 255.255.255.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark allow public to http &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 214.24.29.115 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging enable &lt;/P&gt;&lt;P&gt;logging buffered debugging &lt;/P&gt;&lt;P&gt;logging asdm informational &lt;/P&gt;&lt;P&gt;logging host inside 10.1.xx.xx &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;/P&gt;&lt;P&gt;icmp permit any inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside,outside) 214.24.29.115 10.20.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 214.24.29.113 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 &lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy &lt;/P&gt;&lt;P&gt;aaa-server LIST1 protocol tacacs+ &lt;/P&gt;&lt;P&gt;key xxxxxxxxx &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa accounting enable console LIST1 &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 10.20.10.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;http 207.40.115.253 255.255.255.255 outside &lt;/P&gt;&lt;P&gt;snmp-server host inside 10.1.11.45 community 1232344 &lt;/P&gt;&lt;P&gt;snmp-server location xxxxxxxx &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community 123cabaf3a &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 207.40.115.1 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside &lt;/P&gt;&lt;P&gt;crypto isakmp policy 10 &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;encryption 3des &lt;/P&gt;&lt;P&gt;hash sha &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;lifetime 86400 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 5 &lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;threat-detection basic-threat &lt;/P&gt;&lt;P&gt;threat-detection statistics &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 207.40.115.1 type ipsec-l2l &lt;/P&gt;&lt;P&gt;tunnel-group 207.40.115.1 ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map inspection_default &lt;/P&gt;&lt;P&gt;match default-inspection-traffic &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;parameters &lt;/P&gt;&lt;P&gt;message-length maximum 512 &lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;/P&gt;&lt;P&gt;class inspection_default &lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect http &lt;/P&gt;&lt;P&gt;inspect icmp &lt;/P&gt;&lt;P&gt;inspect snmp &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;service-policy global_policy global &lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Nov 2008 16:34:45 GMT</pubDate>
    <dc:creator>calvinz21</dc:creator>
    <dc:date>2008-11-03T16:34:45Z</dc:date>
    <item>
      <title>ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097627#M894114</link>
      <description>&lt;P&gt;I'm trying to add another static nat translation onto the ASA. There's already one static nat to another host. Wouldn't I just copy the same static and change the IP's? Tried it and it gave me a error. Not sure what else I'm suppose to add. Kinda lost. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; error: router(config)# static (inside,backup) 214.24.29.114 10.20.1.20 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;ERROR: Static PAT using the interface requires the use of the 'interface' keyword instead of the interface IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097627#M894114</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2019-03-11T14:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097628#M894115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here's the current config file. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname asa510-01 &lt;/P&gt;&lt;P&gt;domain-name corp.com &lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/0 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 214.x.x.114 255.255.255.240 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/1 &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 10.20.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/2 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/3 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive &lt;/P&gt;&lt;P&gt;clock timezone CST -6 &lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring &lt;/P&gt;&lt;P&gt;dns domain-lookup inside &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS &lt;/P&gt;&lt;P&gt;domain-name corp.com &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.20.1.0 255.255.0.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.20.1.0 255.255.255.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark allow public to http &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 214.24.29.115 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging enable &lt;/P&gt;&lt;P&gt;logging buffered debugging &lt;/P&gt;&lt;P&gt;logging asdm informational &lt;/P&gt;&lt;P&gt;logging host inside 10.1.xx.xx &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;/P&gt;&lt;P&gt;icmp permit any inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside,outside) 214.24.29.115 10.20.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 214.24.29.113 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 &lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy &lt;/P&gt;&lt;P&gt;aaa-server LIST1 protocol tacacs+ &lt;/P&gt;&lt;P&gt;key xxxxxxxxx &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa accounting enable console LIST1 &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 10.20.10.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;http 207.40.115.253 255.255.255.255 outside &lt;/P&gt;&lt;P&gt;snmp-server host inside 10.1.11.45 community 1232344 &lt;/P&gt;&lt;P&gt;snmp-server location xxxxxxxx &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community 123cabaf3a &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 207.40.115.1 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside &lt;/P&gt;&lt;P&gt;crypto isakmp enable outside &lt;/P&gt;&lt;P&gt;crypto isakmp policy 10 &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;encryption 3des &lt;/P&gt;&lt;P&gt;hash sha &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;lifetime 86400 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 5 &lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;threat-detection basic-threat &lt;/P&gt;&lt;P&gt;threat-detection statistics &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 207.40.115.1 type ipsec-l2l &lt;/P&gt;&lt;P&gt;tunnel-group 207.40.115.1 ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map inspection_default &lt;/P&gt;&lt;P&gt;match default-inspection-traffic &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;parameters &lt;/P&gt;&lt;P&gt;message-length maximum 512 &lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;/P&gt;&lt;P&gt;class inspection_default &lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect http &lt;/P&gt;&lt;P&gt;inspect icmp &lt;/P&gt;&lt;P&gt;inspect snmp &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;service-policy global_policy global &lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 16:34:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097628#M894115</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2008-11-03T16:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097629#M894116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't see a "backup" interface in the config. It wants you to use the "interface" keyword instead of the ip address. For example...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) interface 10.20.1.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...because 214.24.29.114 is the ip address of the interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 16:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097629#M894116</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-11-03T16:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097630#M894117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;calvinz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also according to your config, the device hostname you are trying to do NAT is "router" while the hostname for your ASA is "asa510-01". make sure you are working on the correct device. NAT commands work differently on ASA/Routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francisco. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 16:51:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097630#M894117</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-11-03T16:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097631#M894118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, here's the right config and it does have backup as a interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's the current config file. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;hostname asa510-01 &lt;/P&gt;&lt;P&gt;domain-name corp.com &lt;/P&gt;&lt;P&gt;enable password xxxxxxxxxxxx encrypted &lt;/P&gt;&lt;P&gt;names &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/0 &lt;/P&gt;&lt;P&gt;nameif backup &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 214.x.x.114 255.255.255.240 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/1 &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 10.20.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/2 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Ethernet0/3 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;interface Management0/0 &lt;/P&gt;&lt;P&gt;shutdown &lt;/P&gt;&lt;P&gt;no nameif &lt;/P&gt;&lt;P&gt;no security-level &lt;/P&gt;&lt;P&gt;no ip address &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive &lt;/P&gt;&lt;P&gt;clock timezone CST -6 &lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring &lt;/P&gt;&lt;P&gt;dns domain-lookup inside &lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS &lt;/P&gt;&lt;P&gt;domain-name corp.com &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 10.20.1.0 255.255.0.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.20.1.0 255.255.255.0 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in remark allow public to http &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 214.24.29.115 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24 &lt;/P&gt;&lt;P&gt;logging enable &lt;/P&gt;&lt;P&gt;logging buffered debugging &lt;/P&gt;&lt;P&gt;logging asdm informational &lt;/P&gt;&lt;P&gt;logging host inside 10.1.xx.xx &lt;/P&gt;&lt;P&gt;mtu outside 1500 &lt;/P&gt;&lt;P&gt;mtu inside 1500 &lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside &lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1 &lt;/P&gt;&lt;P&gt;icmp permit any inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400 &lt;/P&gt;&lt;P&gt;global (backup) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound &lt;/P&gt;&lt;P&gt;nat (inside) 1 10.20.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (inside,backup) 214.24.29.115 10.20.1.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface backup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route backup 0.0.0.0 0.0.0.0 214.24.29.113 1 &lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00 &lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 &lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 &lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 &lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute &lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy &lt;/P&gt;&lt;P&gt;aaa-server LIST1 protocol tacacs+ &lt;/P&gt;&lt;P&gt;key xxxxxxxxx &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa accounting enable console LIST1 &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 10.20.10.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;http 207.40.115.253 255.255.255.255 backup &lt;/P&gt;&lt;P&gt;snmp-server host inside 10.1.11.45 community 1232344 &lt;/P&gt;&lt;P&gt;snmp-server location xxxxxxxx &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community 123cabaf3a &lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 207.40.115.1 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt;crypto map outside_map interface backup&lt;/P&gt;&lt;P&gt;crypto isakmp enable backup &lt;/P&gt;&lt;P&gt;crypto isakmp policy 10 &lt;/P&gt;&lt;P&gt;authentication pre-share &lt;/P&gt;&lt;P&gt;encryption 3des &lt;/P&gt;&lt;P&gt;hash sha &lt;/P&gt;&lt;P&gt;group 2 &lt;/P&gt;&lt;P&gt;lifetime 86400 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;console timeout 5 &lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;threat-detection basic-threat &lt;/P&gt;&lt;P&gt;threat-detection statistics &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 207.40.115.1 type ipsec-l2l &lt;/P&gt;&lt;P&gt;tunnel-group 207.40.115.1 ipsec-attributes &lt;/P&gt;&lt;P&gt;pre-shared-key * &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;class-map inspection_default &lt;/P&gt;&lt;P&gt;match default-inspection-traffic &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;parameters &lt;/P&gt;&lt;P&gt;message-length maximum 512 &lt;/P&gt;&lt;P&gt;policy-map global_policy &lt;/P&gt;&lt;P&gt;class inspection_default &lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect http &lt;/P&gt;&lt;P&gt;inspect icmp &lt;/P&gt;&lt;P&gt;inspect snmp &lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;service-policy global_policy global &lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097631#M894118</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2008-11-03T17:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097632#M894119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm in the correct router. I just forgot what I named the router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried using backup as a interface and got this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa510-01(config)# static (inside,backup) interface 10.20.0.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;WARNING: static redirecting all traffics at backup interface;&lt;/P&gt;&lt;P&gt;WARNING: all services terminating at backup interface are disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems like I might have to create a new interface or something?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097632#M894119</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2008-11-03T17:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097633#M894120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;then what adam suggested will work for you. have you tried it? does it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francisco.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097633#M894120</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-11-03T17:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097634#M894121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i think the reason why you have this problem is because you already have "global (backup) 1 interface". (Translating already using the outside interface for 10.20.1.0 255.255.255.0. try using another public ip for one-one static translation. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097634#M894121</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-11-03T17:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097635#M894122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there anyway around it w/o having to have another public IP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097635#M894122</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2008-11-03T17:26:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097636#M894123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;unless you use static with PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example below shows how to configure static PAT for an internal web server located at 192.168.10.10  The web client on the public network will connect to the server using the public IP address of the security appliance using the default web (TCP port 80) &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.10.10 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097636#M894123</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-11-03T17:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097637#M894124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try static (inside,backup) tcp interface www 10.20.1.20 www netmask 255.255.255.255. change the port to whatever you would like to allow. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 17:35:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097637#M894124</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-11-03T17:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097638#M894125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks, i'll give that try. it seems like i'm talking to someone here that doesn't understand what they are asking. I'll check with the 3rd party on what they want. will keep you posted. thanks for the help.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Nov 2008 18:01:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097638#M894125</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2008-11-03T18:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097639#M894126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i was able to put in a static nat with another public IP. thanks for your help. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm having a access issue. wonder if you guys can see if its being block somewhere else. i already wrote up a ACL for the access but it's still being denied. same router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 11 extended permit tcp any 214.16.68.192 255.255.255.192 eq 3389 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list outside_access_in line 12 extended permit tcp any 214.16.68.192 255.255.255.192 (hitcnt=0) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny tcp src backup:214.16.68.246/4225 dst inside:214.24.29.115/3389 by access-group "outside_access_in" [0x0, 0x0]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2008 15:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097639#M894126</guid>
      <dc:creator>calvinz21</dc:creator>
      <dc:date>2008-11-04T15:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5510: Adding another static nat issue.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097640#M894127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 214.16.68.192 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francsico&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2008 16:54:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-adding-another-static-nat-issue/m-p/1097640#M894127</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2008-11-04T16:54:47Z</dc:date>
    </item>
  </channel>
</rss>

