<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Public ip on internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042431#M914035</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marwan here I have three additional ip's in addition to what is there on outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So All interanl host PATTED to public ip say 1.1.1.1 using global command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now say there are three additional pub ip's 1.1.1.2 1.1.1.3 and 1.1.1.4,which are to be accessed from outside.So want to statically nat with 192.168.0.10 ,192.168.0.20 and 192.168.0.30 respectibly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your above config not able to understnad what will the (inside,outside) interface 192.168.0.10 will do?&lt;/P&gt;&lt;P&gt;And why to change acl extended permit tcp any interface outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here need some more suggestion should i upgrade the ios.Presently running 7.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Aug 2008 13:01:03 GMT</pubDate>
    <dc:creator>sushil</dc:creator>
    <dc:date>2008-08-25T13:01:03Z</dc:date>
    <item>
      <title>Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042429#M914029</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am looking to map one of the internal host to public ip.&lt;/P&gt;&lt;P&gt;Statically natted the internal ip with public ip.somehow no luck accessing the host publically.inernet working perfectly with PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find attached the running config and suggest what all i am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reg,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042429#M914029</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2019-03-11T13:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042430#M914033</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try it like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) interface 192.168.0.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if didnt work keep it like this and change the ACL to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if u want to make the nat to static pat for example ony map http do it like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 192.168.0.10 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and in ur ACL permit only 80&lt;/P&gt;&lt;P&gt;add a line for each additional port u want&lt;/P&gt;&lt;P&gt;this is optional&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please, if helpful Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 12:22:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042430#M914033</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-25T12:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042431#M914035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marwan here I have three additional ip's in addition to what is there on outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So All interanl host PATTED to public ip say 1.1.1.1 using global command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now say there are three additional pub ip's 1.1.1.2 1.1.1.3 and 1.1.1.4,which are to be accessed from outside.So want to statically nat with 192.168.0.10 ,192.168.0.20 and 192.168.0.30 respectibly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your above config not able to understnad what will the (inside,outside) interface 192.168.0.10 will do?&lt;/P&gt;&lt;P&gt;And why to change acl extended permit tcp any interface outside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here need some more suggestion should i upgrade the ios.Presently running 7.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 13:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042431#M914035</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2008-08-25T13:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042432#M914036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok now the view is diffrent&lt;/P&gt;&lt;P&gt;i meant with interface that to use the one public ip which is the one applied to ur outside interface&lt;/P&gt;&lt;P&gt;but as u updated to me u have several IPs&lt;/P&gt;&lt;P&gt;so u just need to do like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static( inside, outside) 1.1.1.2 192.168.0.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static( inside, outside) 1.1.1.3 192.168.0.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static( inside, outside) 1.1.1.4 192.168.0.30 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in ur ACL u can be spicific to allow only spesific ports to each sever but for the example i will allow any ip connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host 1.1.1.2&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host 1.1.1.3&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host 1.1.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Aug 2008 14:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042432#M914036</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-25T14:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042433#M914039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is somehow not working.Once I add static command the internet on particular internal ip i.e 192.168.0.10 also stops working.If I remove that it works perfectly.See the config below I configured;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;boot system disk0:/asa803-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 122.160.77.125 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 192.168.0.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reg,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 08:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042433#M914039</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2008-08-26T08:48:08Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042434#M914043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what r those IPs&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 122.160.77.125 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 192.168.0.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i mean 1.1.1.2 and 122.160.77.125&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the public ip should be instead of the 1.1.1.2 and also places in ur outside ACL permit!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 12:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042434#M914043</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-26T12:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042435#M914044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry typo mistake.&lt;/P&gt;&lt;P&gt;It is 1.1.1.2 indeed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't know why I am not this get working at all..&lt;/P&gt;&lt;P&gt;Any suggestion/troubleshooting tip?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 12:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042435#M914044</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2008-08-26T12:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042436#M914046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok just make it as i told and as u have done&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the right ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;like &lt;/P&gt;&lt;P&gt;static(inside, outside) [ur public IP] [internal ip] netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip any host [the public ip in the nat]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then do the following to get the ASA update the NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xalte&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then RELOAD ur ASA&lt;/P&gt;&lt;P&gt;then test it and tell me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2008 12:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042436#M914046</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-26T12:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042437#M914048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even doing clear xlate and arp its not coming up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does there any difference going for standard or extended acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Frustrating...&lt;/P&gt;&lt;P&gt;Any other pointer you can give.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2008 06:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042437#M914048</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2008-08-28T06:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042438#M914051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try to reaload please &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2008 09:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042438#M914051</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-28T09:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042439#M914053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try to reload please &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2008 09:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042439#M914053</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-28T09:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042440#M914054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Sushil, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not gone through the complete forum but i understand you are mapping an internal machine with public ip address and you are able to access that machine from internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have looked at the configuration it looks gud .. you have configuration of something like:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0 &lt;/P&gt;&lt;P&gt;nameif outside &lt;/P&gt;&lt;P&gt;security-level 0 &lt;/P&gt;&lt;P&gt;ip address 1.1.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1 &lt;/P&gt;&lt;P&gt;nameif inside &lt;/P&gt;&lt;P&gt;security-level 100 &lt;/P&gt;&lt;P&gt;ip address 192.168.0.1 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 192.168.0.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 122.160.77.125 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You forgot the change the ip address on access-list therefore i believe your real public ip address is 122.160.77.125 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, we need to concentrate on below 3 lines &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 122.160.77.125 192.168.0.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 122.160.77.125 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now,on internet people will hit 122.160.77.125 to access 192.168.0.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration is gud ..please look for following:- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* What is the default gateway of machine 192.168.0.10. It should be inside interface of the firewall which is 192.168.0.1. &lt;/P&gt;&lt;P&gt;If default gateway is incorrect .. when users from internet try to access 192.168.0.10 then reply to its dafault gateway .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* See if the 192.168.0.10 can ping inside interface of firewall or not. With this we will be able narrowdown that our internal networking is fine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* If above settings are fine and still its not working then pls collect the real time logs on ASA and you will get the clue &lt;/P&gt;&lt;P&gt;Whether issue is internet or somewhere on inside. &lt;/P&gt;&lt;P&gt;Logs will let you now whether.. user from internet are able to hit the public ip address of the machine 192.168.0.10. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are able to get any clue .. pls upload the logs .. i will check it for you. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, &lt;/P&gt;&lt;P&gt;Manjeet &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. Rate if works  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Aug 2008 15:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042440#M914054</guid>
      <dc:creator>manjesin</dc:creator>
      <dc:date>2008-08-30T15:30:28Z</dc:date>
    </item>
    <item>
      <title>Re: Public ip on internal network</title>
      <link>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042441#M914055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Manjeet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default gateway is indeed the int interface of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I can ping the internal interface of the firewall from the 192.168.0.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This Machine is not able to go to the internet once a configure static entry with the 192.168.0.10.&lt;/P&gt;&lt;P&gt;I will collect the logs and will let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reg,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Sep 2008 10:55:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/public-ip-on-internal-network/m-p/1042441#M914055</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2008-09-01T10:55:40Z</dc:date>
    </item>
  </channel>
</rss>

