<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat issue Pix 525 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126865#M896789</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - are you natting it again? Of you have a layer 3 routing device that can route to them?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Sep 2008 15:44:26 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2008-09-05T15:44:26Z</dc:date>
    <item>
      <title>Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126860#M896784</link>
      <description>&lt;P&gt;Hi, I'm having an issue with NAT on a Pix 525 running 6.3.4.  I have two IP Address that I'm using a static nat on, one works and one does not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the static entries&lt;/P&gt;&lt;P&gt;static (inside,vpn) 63.xxx.xxx.37 10.200.100.131 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,vpn) 63.xxx.xxx.38 10.200.199.131 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The entry for 63.xxx.xxx.37 works fine, .38 will not  nat. &lt;/P&gt;&lt;P&gt;pix-525-fw01# show capture fix&lt;/P&gt;&lt;P&gt;9 packets captured&lt;/P&gt;&lt;P&gt;12:01:06.109476 802.1Q vlan#16 P0 10.200.199.131.4184 &amp;gt; 199.xxx.xxx.242.700: S 1627796669:1627796669(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:01:09.030363 802.1Q vlan#16 P0 10.200.199.131.4184 &amp;gt; 199.xxx.xxx.242.700: S 1627796669:1627796669(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:01:15.065609 802.1Q vlan#16 P0 10.200.199.131.4184 &amp;gt; 199.xxx.xxx.242.700: S 1627796669:1627796669(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:04:23.108987 802.1Q vlan#16 P0 10.200.199.131.4208 &amp;gt; 199.xxx.xxx.242.700: S 616249661:616249661(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:04:26.082698 802.1Q vlan#16 P0 10.200.199.131.4208 &amp;gt; 199.xxx.xxx.242.700: S 616249661:616249661(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:04:32.017378 802.1Q vlan#16 P0 10.200.199.131.4208 &amp;gt; 199.xxx.xxx.242.700: S 616249661:616249661(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:20:25.125588 802.1Q vlan#16 P0 10.200.199.131.4330 &amp;gt; 199.xxx.xxx.242.700: S 2700232030:2700232030(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:20:28.105051 802.1Q vlan#16 P0 10.200.199.131.4330 &amp;gt; 199.xxx.xxx.242.700: S 2700232030:2700232030(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;12:20:34.039701 802.1Q vlan#16 P0 10.200.199.131.4330 &amp;gt; 199.xxx.xxx.242.700: S 2700232030:2700232030(0) win 64512 &amp;lt;mss 1260,nop,wscale 0,nop,nop,[|tcp]&amp;gt;&lt;/P&gt;&lt;P&gt;9 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the xlate table &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix-525-fw01# show xlate | include 10.200.100.131&lt;/P&gt;&lt;P&gt;Global 63.xxx.xxx.37 Local 10.200.100.131&lt;/P&gt;&lt;P&gt;PAT Global 65.xxx.xxx.146(30539) Local 10.200.100.131(62685)&lt;/P&gt;&lt;P&gt;Global 10.200.100.131 Local 10.200.100.131&lt;/P&gt;&lt;P&gt;pix-525-fw01#&lt;/P&gt;&lt;P&gt;pix-525-fw01#&lt;/P&gt;&lt;P&gt;pix-525-fw01# show xlate | include 10.200.199.131&lt;/P&gt;&lt;P&gt;Global 10.200.199.131 Local 10.200.199.131&lt;/P&gt;&lt;P&gt;PAT Global 65.xxx.xxx.146(28971) Local 10.200.199.131(4510)&lt;/P&gt;&lt;P&gt;PAT Global 65.xxx.xxx.146(30551) Local 10.200.199.131(4526)&lt;/P&gt;&lt;P&gt;pix-525-fw01#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The path for both of the sources is the same except the vlan.  Has anyone ever seen something like this before? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126860#M896784</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2019-03-11T13:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126861#M896785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a vlan interface for the x.x.199.x if not - do you have a route to the 10.200.199.x configured?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 13:37:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126861#M896785</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-05T13:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126862#M896786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I have a route for the 199.x.x.x network directing it to the VPN interface.  The traffic gets to the interface for both clients but the NAT never happens for the one 10.200.x.x address, the 63.x.x.37 nat works but the .38 does not.  This is for a VPN, the encryption domain  is 63.x.x.x and 199.x.x.x so for the one 10. address the VPN works but without the NAT I can not get the other client to connect to the VPN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 14:30:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126862#M896786</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-05T14:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126863#M896787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have these config lines:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,vpn) 63.xxx.xxx.37 10.200.100.131 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,vpn) 63.xxx.xxx.38 10.200.199.131 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is 10.200.100.131?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where is 10.200.199.131?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are they directly attached?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 15:10:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126863#M896787</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-05T15:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126864#M896788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, they are clients that sit behind the inside interface.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 15:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126864#M896788</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-05T15:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126865#M896789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK - are you natting it again? Of you have a layer 3 routing device that can route to them?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 15:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126865#M896789</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-05T15:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126866#M896790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the 10. address are on my local LAN.  they attempt to connect to the 199.x.x.x address, they follow my default route, once they get to the firewall I have a route that directs them to VPN DMZ.  Before they get to the VPN interface they should be NAT'ed to the 63.x.x.x address.  Then the VPN concentrator will see that as interesting traffic, bring up the VPN and everybody goes home happy.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 17:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126866#M896790</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-05T17:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126867#M896791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you post all of:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT&lt;/P&gt;&lt;P&gt;NO-NAT&lt;/P&gt;&lt;P&gt;Routes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 19:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126867#M896791</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-05T19:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126868#M896792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0 0 0&lt;/P&gt;&lt;P&gt;nat (guest) 1 10.200.253.48 255.255.255.240 0 0&lt;/P&gt;&lt;P&gt;ip address outside 65.xxx.xxx.xxx 255.255.255.248&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 19:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126868#M896792</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-05T19:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126869#M896793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Confused.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,vpn) 63.xxx.xxx.37 10.200.100.131 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,vpn) 63.xxx.xxx.38 10.200.199.131 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the entire config - sanitised, there is quite alot of info missing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Sep 2008 21:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126869#M896793</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-05T21:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126870#M896794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry about the confusion. The flow is like this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.200.100.131 &amp;gt; 199..x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That traffic gets routed to the VPN DMZ and the 10. address NAT'ed to 63.x.x.38&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That traffic flow, 63.x.x.38 &amp;gt; 199.x.x.x should bring up a VPN on my concentrator .  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can run a capture and see the traffic going to the VPN interface but it does not get NAT'ed.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I source the traffic from 10.200.100.131 the NAT works. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Both 10. address follow the same route.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached a sanitized config.  &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 13:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126870#M896794</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-08T13:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126871#M896795</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Attached &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 13:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126871#M896795</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-08T13:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126872#M896796</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you able to ping 10.200.199.131 from the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 13:22:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126872#M896796</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-08T13:22:13Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126873#M896797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 13:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126873#M896797</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-08T13:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126874#M896798</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would recommend you remove the config line that is not currently working, then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;INPUT the="" config="" again="" /&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And re-test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 14:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126874#M896798</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2008-09-08T14:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126875#M896799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Your NAT ip addresses (63.x.x.x) are in different range as your PIX vpn interface ip address .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"ip address vpn 10.200.253.17 255.255.255.248"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you remove verify reverse-path-  "no ip verify reverse-path interface vpn"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then remove and add those two NAT statement and test.Do clear xlate also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Saju&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 14:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126875#M896799</guid>
      <dc:creator>singhsaju</dc:creator>
      <dc:date>2008-09-08T14:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126876#M896800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried that, got the same result.  One works and one does not.  Is there a limit or something on static nat's?  Is there a debug that I can use to see why it's not being nat'ed? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 15:28:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126876#M896800</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-08T15:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: Nat issue Pix 525</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126877#M896801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried that also, got the same result.  I'm stumped!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 18:52:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-pix-525/m-p/1126877#M896801</guid>
      <dc:creator>mlouis</dc:creator>
      <dc:date>2008-09-08T18:52:48Z</dc:date>
    </item>
  </channel>
</rss>

