<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977807#M917435</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not entirely clear on what you are trying to do. If you have Natted 10.0.10.25 to 10.243.32.10 then your access-list on your outside interface should be permitting access to 10.243.32.10 and not 10.0.10.25 ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any host 10.0.10.25 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq telnet &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change all instances of 10.0.10.25 to 10.243.32.10 in the above acl and then from outside access 10.243.32.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to access 10.0.10.25 directly from outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.10.25 10.0.10.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Jul 2008 19:48:24 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2008-07-01T19:48:24Z</dc:date>
    <item>
      <title>Issues with ASA 5505 - Unable to Static NAT for Incoming Connections</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977805#M917431</link>
      <description>&lt;P&gt;I have a new ASA 5505 I've been messing around with.  I'm setting it up between two different private IP based networks (two different companies) and with it is a static nat mapping to allow them to access one of our machines.  The "public" IP address assigned to the mapping is dedicated only for this purpose.  For some reason the Packet-Tracer keeps stopping on the NAT section with an RPF-CHECK, but the config looks ok.  Any help is appeciated.  The relevent config is posted below.  Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.10.58 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.243.32.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service rdp tcp&lt;/P&gt;&lt;P&gt; description Remote Desktop Protocol&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any host 10.0.10.25 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq telnet &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq 3389 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.243.32.10 10.0.10.25 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.243.32.1 1&lt;/P&gt;&lt;P&gt;route outside 10.0.0.0 255.255.0.0 10.0.10.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.0.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.0.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.0.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977805#M917431</guid>
      <dc:creator>jackdobiash</dc:creator>
      <dc:date>2019-03-11T13:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977806#M917433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;-------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output of command: packet-tracer input outside tcp 10.243.32.9 1069 10.0.10.25 3389 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0x3d66778, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;        hits=3360, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;        src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;        dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   10.0.10.0       255.255.255.0   inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq 3389&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0x3da4fc0, priority=12, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;        hits=22, user_data=0x3da4f80, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=10.0.10.25, mask=255.255.255.255, port=3389, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in  id=0x3d49bb8, priority=0, domain=permit-ip-option, deny=true&lt;/P&gt;&lt;P&gt;        hits=1406, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.243.32.10 10.0.10.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside host 10.0.10.25 outside any&lt;/P&gt;&lt;P&gt;    static translation to 10.243.32.10&lt;/P&gt;&lt;P&gt;    translate_hits = 195, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0x3d1c848, priority=5, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;        hits=10, user_data=0x39f0110, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;        src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;        dst ip=10.0.10.25, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2008 19:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977806#M917433</guid>
      <dc:creator>jackdobiash</dc:creator>
      <dc:date>2008-07-01T19:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977807#M917435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not entirely clear on what you are trying to do. If you have Natted 10.0.10.25 to 10.243.32.10 then your access-list on your outside interface should be permitting access to 10.243.32.10 and not 10.0.10.25 ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any host 10.0.10.25 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq telnet &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.0.10.25 eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change all instances of 10.0.10.25 to 10.243.32.10 in the above acl and then from outside access 10.243.32.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to access 10.0.10.25 directly from outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.10.25 10.0.10.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2008 19:48:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977807#M917435</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-07-01T19:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977808#M917438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon, thanks for the reply.    Let me try and explain a little bit more. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Private (Inside) network is 10.0.10.0/24 and the Public (Outside) network is 10.243.32.0/24.  I'm trying to translate the 'public' address of 10.243.32.10 to the private address of 10.0.10.25.  As far as I can tell it's setup correctly (this was done via the ASDM but the direct config looks ok too), but yet the Packet-Tracker keeps kicking back an error.  I've tried putting a machine on the 'outside' with an IP of 10.243.32.9 and then attempted to RDP to 10.243.32.10 (which should translate back to 10.0.10.25) but it doens't appear to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2008 19:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977808#M917438</guid>
      <dc:creator>jackdobiash</dc:creator>
      <dc:date>2008-07-01T19:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977809#M917439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify a bit more. Are you initiating the connection from outside and trying to RDP through to the inside host of 10.0.10.25 ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so you cannot leave the config as is and connect to 10.0.10.25 as the destination address. You need to make the destination address 10.243.32.10 and you need to update your access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you explain in terms of src and dst IP addresses what connectiokn you are trying to make. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apologies for being a bit slow &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2008 20:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977809#M917439</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-07-01T20:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977810#M917440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I am trying to initiate from the outside to RDP to the inside host.  I'll update the ACL's and give it a shot, thx!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2008 20:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977810#M917440</guid>
      <dc:creator>jackdobiash</dc:creator>
      <dc:date>2008-07-01T20:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977811#M917441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Boom, that was it!   I don't know why I kept thinking the ACL had to be for the internal IP and not the external.  Oh well, at least now I should remember.  Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Jul 2008 21:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977811#M917441</guid>
      <dc:creator>jackdobiash</dc:creator>
      <dc:date>2008-07-01T21:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with ASA 5505 - Unable to Static NAT for Incoming Con</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977812#M917444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for letting me know it worked. Glad to have helped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jul 2008 07:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-asa-5505-unable-to-static-nat-for-incoming/m-p/977812#M917444</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-07-02T07:14:22Z</dc:date>
    </item>
  </channel>
</rss>

