<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACL for https internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-for-https-internal-network/m-p/822336#M955253</link>
    <description>&lt;P&gt;We have an internal https server that we cannot access. The statement on the router is (permit ip 172.31.2.2 0.0.0.255 any) can anyone help please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 12:01:23 GMT</pubDate>
    <dc:creator>Eduardo AYALA</dc:creator>
    <dc:date>2019-03-11T12:01:23Z</dc:date>
    <item>
      <title>ACL for https internal network</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-https-internal-network/m-p/822336#M955253</link>
      <description>&lt;P&gt;We have an internal https server that we cannot access. The statement on the router is (permit ip 172.31.2.2 0.0.0.255 any) can anyone help please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:01:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-https-internal-network/m-p/822336#M955253</guid>
      <dc:creator>Eduardo AYALA</dc:creator>
      <dc:date>2019-03-11T12:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: ACL for https internal network</title>
      <link>https://community.cisco.com/t5/network-security/acl-for-https-internal-network/m-p/822337#M955254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eduardo, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can do it this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;Inside LAN server IP 10.2.2.100&lt;/P&gt;&lt;P&gt;static NAT Address for above server 172.31.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router NAT inside-outside interface config&lt;/P&gt;&lt;P&gt;interface fe01&lt;/P&gt;&lt;P&gt;ip address 172.31.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip access-group 101  in&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface fe02&lt;/P&gt;&lt;P&gt;ip address 10.2.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.2.2.100 172.31.2.2  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit tcp any host 172.31.2.1 eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgds&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Feb 2008 17:03:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-for-https-internal-network/m-p/822337#M955254</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-02-11T17:03:06Z</dc:date>
    </item>
  </channel>
</rss>

