Hello... did you get this to work? The static statement you have will NAT all traffic from 10.57.4.192 (or .92 --typo?) to 192.168.50.10. To identify the destination you probably need an ACL in the static statement, something like:
access-list aclnat extended permit ip host 10.57.4.192 host 192.168.67.12 static (inside,outside) 192.168.50.10 access-list aclnat For the site to site VPN crypto ACL use the NAT'ed IP 192.168.50.10.
Hi There,Is there a relationship between the hardware of the Cisco ASA 5505 FWs (V02) and the 9.x software version? Multiple ASA have been successfully updated with the same software. The ASAs that have been updated without any problems are V06 versi...
Dear Cisco Customers and Partners,
We know that the Cisco Identity Services Engine (ISE) is a critical element of your network security and so stability is of paramount importance. As a result, many of you asked us for a suggested release given sev...
Over 100-year-old Yokogawa Engineering Asia deploys Cisco Advanced Malware Protection (AMP) to shield itself against cyber attacks. With Cisco Talos threat intelligence, it stays ahead of the latest malicious behavior on the Internet. Learn more at http:/...
Learn how Cisco’s new approach to cybersecurity will simplify your experience, accelerate your success, and secure your future.
Why Cisco Firewalls?
Cisco Security Virtual Summit
Get the BIG picture
I am hoping the attached spreadsheet can help folks create their own simple custom profiles in bulk. For anyone who has to create dozens of profiles at once, it can get pretty time consuming doing it through the GUI. Shout out to Craig Hyps who created th...