Basically you can only have one inside and one outside interface. Take a look at the following documentation:-- Transparent Mode Overview:http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080450b68.html#wp1201980"T...
Hi,You need to remember that you would also need to create a static NAT rule in order to allow inbound access (plus applying the ACL to the outside interface as stated on the previous post). So, what you would need is something like this (assuming st...
Hi,I believe this is kind of a "duplicate" post, but anyway, let me answer this one. Your server resides on the inside, the DNS servers are on the DMZ (when you try to resolve the server's name, doing a simple nslookup, do you get the internal or ext...
The only problem I see with doing NAT exemption (nat 0 access-list) is that given the original identity NAT that he has it would require him to do something like this:access-list nonat permit ip 172.16.10.0 255.255.255.0 anynat (inside) 0 access-list...
Hi, BruceI believe that the "untagged vlan packets" is just a misleading information on the 'show int' output under version 7.0. You should better try the 'show asp drop' command for better understanding of the dropped packets or flows.Hope that help...