<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 NAT Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054530#M921280</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CLI rule that is causing confusion:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == permit all dmz traffic outbound ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == deny dmz traffic to inside network ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any object inside-network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Aug 2012 18:28:34 GMT</pubDate>
    <dc:creator>kerryjcox</dc:creator>
    <dc:date>2012-08-23T18:28:34Z</dc:date>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054524#M921269</link>
      <description>&lt;P&gt;Just upgraded my ASA 5510 from 8.2(1) to 8.4(4)1.&amp;nbsp; Everything appeared to work just fine with one big exception.&lt;/P&gt;&lt;P&gt;The NAT statements I had previously remained in effect and even appeared to replicate in some instances.&lt;/P&gt;&lt;P&gt;My issue now is I have set up a DMZ interface (security 50) and need a couple servers to connect back to the inside interface (security 100).&amp;nbsp; I set up the necessary NAT statements within the ASDM to allow the DMZ servers to connect to a single inside server.&amp;nbsp; However, all the DMZ servers can still ping and connect to ALL inside servers.&lt;/P&gt;&lt;P&gt;Any easy way to limit this?&amp;nbsp; Am trying to limit the number of servers in the Inside network that the DMZ can access, but it looks like the DMZ has free reign at the present time. &lt;/P&gt;&lt;P&gt;Am happy to post my configs. I would open a TAC case, but this firewall is still so new, the support contract has not yet been processed by Cisco.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:43:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054524#M921269</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2020-02-21T12:43:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054525#M921271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just a followup: when I set the Access Rule on the DMZ interface to be the implict rule, i.e. P"ermit all traffic to less secure networks", I am unable to connect to the Inside network, but can get out on on the Internet.&amp;nbsp; So far, so good.&amp;nbsp; This is what I expect.&amp;nbsp; I can ping outside IP addresses and route, etc.&lt;/P&gt;&lt;P&gt;However, when I create a default access rule on the dmz interface on the ASDM, i.e. source any, destination any, and service ip, and permit, then I can connect all dmz servers back into the inside network.&amp;nbsp; Not my desired action.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I guess I am at a loss to know why the default implicit rule overrides my static rule.&amp;nbsp; Is there a NAT statement someplace I am missing?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054525#M921271</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-08-23T17:45:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054526#M921272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;An easy fix, is to write an ACL and apply it to the DMZ interface, inbound direction.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 17:51:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054526#M921272</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T17:51:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054527#M921274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good answer, and I attempted that on the ASDM. I can probably do it better on the CLI, but I am used to the ASDM.&amp;nbsp; Apologies.&lt;/P&gt;&lt;P&gt;I added a static access rule on the DMZ interface stating ANY, ANY service IP PERMIT.&lt;/P&gt;&lt;P&gt;And then followed that up with an ANY, inside-network service IP DENY.&amp;nbsp; I can still ssh and ping the inside network from any DMZ server.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Odd.&amp;nbsp; I am feeling very dumb..... Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the packet-tracer output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# packet-tracer input dmz tcp 192.168.1.40 ssh 10.1.1.25 ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; internal-network 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == deny dmz traffic to inside network ==&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: NAT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;nat (dmz,inside) source static dmz-webapps dmz-webapps destination static proddb.wjbradley.local proddb.wjbradley.local description == nat dmz webapp servers to proddb ==&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 192.168.1.40/22 to 192.168.1.40/22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW &lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1643882, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;input-interface: dmz&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054527#M921274</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-08-23T18:06:44Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054528#M921276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Granted, I do have a rule allowing 192.168.1.40 access to the 10.1.1.25 server on the inside network.&lt;/P&gt;&lt;P&gt;So, here is a packet-trace to an inside box that the dmz servers should NOT be able to access:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;slcvw# packet-tracer input dmz tcp 192.168.1.40 ssh 10.1.1.55 ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; internal-network 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == deny dmz traffic to inside network ==&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 1645593, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: dmz&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I simply have the ACLs out of order? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054528#M921276</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-08-23T18:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054529#M921279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will look, when arrive home, but this is a fast answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 192.168.1.0/24 is DNZ and 10.1.1.0/24 is inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!---&amp;nbsp; allow only host 192.168.1.40 from DMZ to aceess host 10.1.1.25 inside network&lt;BR /&gt;&lt;STRONG&gt;access-list dmz_access_in permit ip host 192.168.1.40 host 10.1.1.25&lt;/STRONG&gt;&lt;BR /&gt;!--- deny everthing else to inside network&lt;BR /&gt;&lt;STRONG&gt;access-list dmz_access_in deny ip 192.168.1.0 255.255.255.255 10.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;!--- allow access from DNZ to the internet&lt;BR /&gt;&lt;STRONG&gt;access-list dmz_access_in permit ip 192.168.1.0 255.255.255.255 any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054529#M921279</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:24:53Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054530#M921280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CLI rule that is causing confusion:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == permit all dmz traffic outbound ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == deny dmz traffic to inside network ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any object inside-network &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group dmz_access_in in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054530#M921280</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-08-23T18:28:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054531#M921281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; First rule &lt;STRONG&gt;"access-list dmz_access_in extended permit ip any any"&lt;/STRONG&gt; will permit traffic to outbound and inside, is ovewriting second rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:32:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054531#M921281</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:32:25Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054532#M921282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Man, I feel like a fool. I see the logic now.&amp;nbsp; I have the following in place and have confirmed it works just like I want it to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == permit webapps ip access to web03 ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip object 192.168.1.40 host 10.1.1.16 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == permit webapps ip access to proddb ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip object 192.168.1.40 host 10.1.1.25 &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == deny dmz traffic to inside network ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended deny ip any object inside-network &lt;/P&gt;&lt;P&gt;access-list dmz_access_in remark == permit all dmz traffic outbound ==&lt;/P&gt;&lt;P&gt;access-list dmz_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the first two (2) rules state my dmz server can access those two (2) inside boxes, and then the 3rd rule states everything else is denied to the inside network from the dmz.&amp;nbsp; Then the 4th and last rule states the dmz network can get out to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excellent!&amp;nbsp; Tested and confirmed this is working the way I want it to. I can further refine from here.&amp;nbsp; Much appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:43:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054532#M921282</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2012-08-23T18:43:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054533#M921283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you&lt;/P&gt;&lt;P&gt;Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 18:48:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nat-question/m-p/2054533#M921283</guid>
      <dc:creator>Samuel Petrescu</dc:creator>
      <dc:date>2012-08-23T18:48:38Z</dc:date>
    </item>
  </channel>
</rss>

