Static NATs using the network parameter

If I want one-to-one static NATs which allow inbound traffic, will this work? I want to be able to ping, SSH, etc to 172.18.48.1 by going to 172.18.31.48.1 from the other side of the VPN.
ip nat inside source static network 172.18.48.0 172.31.48.0 /24 route-map VPN_Somerset_NAT-rm reversible
route-map VPN_Somerset_NAT-rm permit 10
 match ip address VPN_Somerset_NAT-ACL
ip access-list extended VPN_Somerset_NAT-ACL
 permit ip 172.18.48.0 0.0.0.255 10.61.0.0 0.0.255.255

To translate the real address 10.1.1.1 to the mapped address 192.168.1.1 when 10.1.1.1 sends traffic to the 209.165.200.224 network, the access-list and static commands are as follows:
hostname(config)# access-list TEST extended ip host 10.1.1.1 209.165.200.224
255.255.255.224
hostname(config)# static (inside,outside) 192.168.1.1 access-list TEST
In this case, the second address is the destination address. However, the same configuration is used for hosts to originate a connection to the mapped address. For example, when a host on the 209.165.200.224/27 network initiates a connection to 192.168.1.1, then the second address in the access list is the source address.
This access list should include only permit ACEs. You can optionally specify the real and destination ports in the access list using the eq operator. Policy NAT does not consider the inactive or time-range keywords; all ACEs are considered to be active for policy NAT configuration. See the "Policy NAT" section for more information.
If you specify a network for translation (for example, 10.1.1.0 255.255.255.0), then the ASA translates the .0 and .255 addresses. If you want to prevent access to these addresses, be sure to configure an access list to deny access.

Similar Messages

  • Two commands in the report using the same parameter - fail under Java

    I have a report that contains 2 SQL commands.
    Both of these commands use one parameter X of type Number in their 'WHERE' clause.
    When i'm viewing the report in CR 2008, i'm asked for a value of this parameter and all data is filled in the report - OK
    The problem occurs when the same report is printed through Crystal Java Runtime:
    Report is printed without data! - it's empty.
    What we noticed in the debug information thrown by the Crystal libraries is that parameter value is set only in one of these commands:
    Original statement 1:
    select a.something
    from ANM_T a
    where a.anmid = {?PARAMETER01Id}
    Original statement 2:
    SELECT * from ANM_T a
    WHERE  a.anmid={?PARAMETER01Id}
    OUTCOME of Statement 1:
    select a.something
    from ANM_T a
    where a.anmid = 0
    OUTCOME of Statement 2:
    SELECT * from ANM_T a
    WHERE  a.anmid=9825
    In above example we may see that crystal set the value only in the second statement - first one got 0 - i suspect its some default value.
    Parameter in the Java code is set in the right way. In case of using only one statement it works. If we use two separate parameters (whose values are equal ) it also works.
    // we have also the loop over the parameters
    ParameterFieldController paramFieldController =
                    report.getDataDefController().getParameterFieldController();
    paramFieldController.setCurrentValue( "", paramName, paramValue );
    What is strange for me is that Crystal Reports enables to use the same parameter in two commands but if you edit one of them you may change the type of this parameter for a command ( for example from Number to String) but the parameter type in the second command remains unchanged ( it's strange because in my opinion it is the same parameter). In the Field Explorer under the Parameter Fields i still see one parameter of type used in the second command.

    Hello all,
    We have prepared some sample code to illustrate the issue.
    We have modified the sample application (Link: [http://www.sdn.sap.com/irj/boc/index?rid=/library/uuid/c07fec3e-3e11-2c10-1991-8c0fb0b82b75]) to that it also changes the parameter value. Parameter is used in two commands saved in report.
    The code changing the parameters value looks like this:
    private static void changeParameters(ReportClientDocument reportClientDoc) throws ReportSDKException {
              DataDefController dataDefController = reportClientDoc.getDataDefController();
            Fields fields = dataDefController.getDataDefinition().getParameterFields();
            for( int i = 0; i < fields.size(); i++ ){
                Field field = (Field)fields.getField( i );
                if( field.getKind() == FieldKind.parameterField ){
                            setParameter( ((ParameterField)field).getName(), "9825" , reportClientDoc);          
    private static void setParameter( String paramName, String paramValue, ReportClientDocument document ) throws ReportSDKException {
         ParameterFieldController paramFieldController =
                    document.getDataDefController().getParameterFieldController();
         paramFieldController.setCurrentValue( "", paramName, paramValue );
    We have tried the following codes to change the connection info used in commands:
    Attempt 1
              Tables tables = databaseController.getDatabase().getTables();
              //Set the datasource for all main report tables.
              for (int i = 0; i < tables.size(); i++) {
                   ITable table = tables.getTable(i);
                   //Keep existing name and alias.
                   table.setName(table.getName());
                   table.setAlias(table.getAlias());
                   //Change connection information properties.
                   IConnectionInfo connectionInfo = table.getConnectionInfo();
                   //Set new table connection property attributes.
                   connectionInfo.setAttributes(propertyBag);
                   //Set database username and password.
                   //NOTE: Even if these the username and password properties don't change when switching databases, the
                   //database password is *not* saved in the report and must be set at runtime if the database is secured. 
                   connectionInfo.setUserName(DBUSERNAME);
                   connectionInfo.setPassword(DBPASSWORD);
                   connectionInfo.setKind(ConnectionInfoKind.SQL);
                   table.setConnectionInfo(connectionInfo);
                   //Update old table in the report with the new table.
                   databaseController.setTableLocation(table, tables.getTable(i));
                   //databaseController.setTableLocation(tables.getTable(i), table);
    Attempt 2
             newConnectionInfo.setAttributes(propertyBag);
             connectionInfo.setUserName(DBUSERNAME);
             connectionInfo.setPassword(DBPASSWORD);
             //preserve subreport links
             SubreportController src = doc.getSubreportController();
             Map<String, SubreportLinks> linkMapper = new HashMap<String,SubreportLinks>();
             for(String subreportName : src.getSubreportNames()){
                 linkMapper.put(subreportName,
                     (SubreportLinks) src.getSubreportLinks(subreportName).clone(true));
             //If this connection needed parameters, we would use this field. 
             Fields<IParameterField> pFields = doc.getDataDefController().getDataDefinition().getParameterFields();
             replaceConnectionInfos(doc.getDatabaseController(), newConnectionInfo, pFields);
             IStrings strs = src.getSubreportNames();
             Iterator<String> it = strs.iterator();
             while (it.hasNext()) {
               String name = it.next();
               ISubreportClientDocument subreport = src.getSubreport(name);
               pFields = subreport.getDataDefController().getDataDefinition().getParameterFields();
               replaceConnectionInfos(subreport.getDatabaseController(), newConnectionInfo, pFields);
             //reconnect subreport links since when using replaceConnection links are erased
             for(String subreportName : src.getSubreportNames())
               src.setSubreportLinks(subreportName, linkMapper.get(subreportName));
    private static void replaceConnectionInfos(DatabaseController aDc, IConnectionInfo aNewConnInfo, Fields<IParameterField> aParameterField) throws ReportSDKException {
             ConnectionInfos cis = aDc.getConnectionInfos(null);
             for (IConnectionInfo oldConnInfo : cis)
               aDc.replaceConnection(oldConnInfo, aNewConnInfo, aParameterField, DBOptions._useDefault
                   + DBOptions._doNotVerifyDB);
    In both cases, the observed problem occurred. In one query the parameter was set properly, while on the other it was set to 0 (or empty string in case of string parameters). What is more, no data appeared on the print.
    Do you happen to know the reason of this issue?How can we fix the problem?
    Best regards
    Mateusz Błaż

  • How to use the "out" parameter in idl

    hello.idl:
    module HelloApp
    interface Hello
    string sayHello();
    void getPass(in string name,out string pass);
    HelloServer:
    public class HelloServer
    class HelloServant extends _HelloImplBase
    public void getPass(String name,org.omg.CORBA.StringHolder pass)
    System.out.println("Server pass = " + pass);
    if (name.equals("lxh"))
    pass = new org.omg.CORBA.StringHolder("1234");
    if (name.equals("cbj"))
    pass = new org.omg.CORBA.StringHolder("5678");
    HelloClient:
    public class HelloClient
    public static void main(String args[])
    try{
    org.omg.CORBA.StringHolder Pass = null;
    if (args.length == 1)
    System.out.println("Client pass = " + args[0]);
    helloRef.getPass(args[0],Pass);
    System.out.println(Pass);
    } catch(Exception e) {
    When I run client main method with parameter "lxh",I will get a error says the getPass() parameter which has given is wrong.
    How to use the out parameter in client?

    Does this error only occurs if you pass "lxh" or always?
    Did you try passing a StringHolder Object rather than a NULL Object?
    Perhaps you can post the error message!?

  • How do I use the UHRY_ACTIVE_ROWS parameter?

    We want to create a button to display the rows as a hierarchy (as available in query properties). To do this I realise I need to use the UHRY_ACTIVE_ROWS parameter in the template properties so to change the properties dynamically (as we require this functionality in a button) we started with the javascript command
    newurl = "&CMD=LDOC&TEMPLATE_ID=YTEST_TEMPLATE&UHRY_ACTIVE_ROWS=X";
    SAPBWOpenURL(SAP_BW_URL_Get()+newurl);
    This successfully sets the flag in the query properties but as we have mandatory variables the variable screen is shown which we don't want to see as the users have already entered the variables previously.
    Is it possible therefore to
    1) Avoid the Variables screen showing as they are already populated?
    or
    2) Set UHRY_ACTIVE_ROWS in another method?

    Hi Neal,
    Not sure if this would help..
    You can try using an additional parameter in your URL
    VARIABLE_SCREEN=%20 or VARIABLE_SCREEN=' '
    This should supress the Variable screen.
    Cheers,
    Praveen.

  • How can I use the same parameter to use elsewhere by Manage Variables ?

    Hello,
    I have a little problem that I need to know. I want to use the same parameter to use elsewhere.
    Example,
    I have a parameter on page 1 and I wish to use this parameter in the other page by Manage Variables.
    How can I do this ?
    Thank you.

    ..just open ManageVariables (right click on the a page and select Manage Variables)...
    then you select the parameter on the page where you want to insert your previous value (your variable)...use the dropdown list to select the variable that contains your value...and it should work
    /m

  • How to pass multiple query string values using the same parameter in Query String (URL) Filter Web Part

    Hi,
    I want to pass multiple query string values using the same parameter in Query String (URL) Filter Web Part like mentioned below:
    http://server/pages/Default.aspx?Title=Arup&Title=Ratan
    But it always return those items whose "Title" value is "Arup". It is not returned any items whose "Title" is "Ratan".
    I have followed the
    http://office.microsoft.com/en-us/sharepointserver/HA102509991033.aspx#1
    Please suggest me.
    Thanks | Arup
    THanks! Arup R(MCTS)
    SucCeSS DoEs NOT MatTer.

    Hi DH, sorry for not being clear.
    It works when I create the connection from that web part that you want to be connected with the Query String Filter Web part. So let's say you created a web part page. Then you could connect a parameterized Excel Workbook to an Excel Web Access Web Part
    (or a Performance Point Dashboard etc.) and you insert it into your page and add
    a Query String Filter Web Part . Then you can connect them by editing the Query String Filter Web Part but also by editing the Excel Web Access Web Part. And only when I created from the latter it worked
    with multiple values for one parameter. If you have any more questions let me know. See you, Ingo

  • How to use the region parameter of main report for subreport chart titles?

    I am using Crystal Reports 11.
    I create 1 main report with 10 sub-reports that contain cross-tabs & charts. The main report has a parameter regarding 3 different areas: region1, region2, and region3.
    I use the method of adding the u2018regionu2019 parameter of main report to the selection formula of the sub-reports. So, I can select 'region' from main report to controll outputs in sub-reports by region.
    I use formulas for chart titles, e.g.:
    Select {Product Code}
    Case 'a111':
      u2018Region1 u2013 a111 Counts'
    Case u2018b222u2019:
      u2018Region1 u2013 b222 Counts'
    u2026
    u2026
    Default:
    u2026
    Since I pass the u2018regionu2019 parameter of main report to sub-reports, I have to change chart titles dynamically based on the region I select.
    How can I use the region parameter from main report in the formulas to get chart titles dynamically?
    Thank you in advance.

    Thank you.
    I am not using Chart Title with "Chart Expert".
    I am using a formula for chart titles, e.g.:
    Select {Product Code}
    Case 'a111':
      u2018Region1 u2013 a111 Counts'
    Case u2018b222u2019:
      u2018Region1 u2013 b222 Counts'
    u2026
    u2026
    Default:
    u2026
    I drag this formula above the charts and it looks like a dynamic title. So, for product a111, the chart title would be "Region1 u2013 a111 Counts"; for product b222, the chart title would be "Region1 u2013 b222" Counts; and so on ...
    Because I pass the region parameter from master report to subreport, I want to change the region part of the chart titles dynamically.
    For example,
    when select Region1, the chart titles should be: "Region1 u2013 a111 Counts"; "Region1 u2013 b222"; ...
    when select Region2, the chart titles should be: "Region2 u2013 a111 Counts"; "Region2 u2013 b222"; ...
    I want to add the region parameter into the tiltle formula.
    How should I do?

  • How to use the out parameter of a transformation

    Hi All,
    I have a requirement where I need to move all the transformations from process flows to map.SO for each transformation I need to have 1 map which calls this transformation.I have 1 transformation which has both input and output parameter.If I use this transformation in mapping then how to use the out parameter of thsi transformation.This out parameter needs to beused in other mappings.Can soemone please help me.
    Thansk in advance

    Hi,
    I'm not quite sure what you are trying to do.
    What works: Connect the outgroup of a pre- or post-mapping process operator to the mapping output parameter operator..
    What does not work: Connect the outgroup of an operator that can return more than one row (e.g. table operator, filter, joiner ,...) to the mapping output parameter operator. The mapping output parameter just returns "one row", like a pl/sql function call.
    You cannot pass a "data stream" from one mapping to another. Maybe the pluggable mappings is what you are looking for.
    Regards,
    Carsten.

  • Moving a PageItem using the "by" parameter (JavaScript)

    Hi,
    So I want to move some page items. I went through the Reference and found that PageItems have the method "move"
    That method wants either to (The new location of the PageItem,in the format (x, y). Can accept: Array of 2 Units, Spread, Page or Layer. (Optional)) or by (The amount (in measurement units) to move the PageItem relative to its current position, in the format (x, y). (Optional))
    So I want to use the by parameter because moves based on the PageItem's current position.
    This is what I've been trying:
    myPage.allPageItems[i].move({by:[0, someVar]});
    But when I try to do this, it says "Invalid value for parameter 'to' of method 'move'..."
    How can I use the by parameter instead of to?

    Hi Jongware,
    I'm afraid your memory was a bit to vague there (I think)
    The second option doesn't work but one can use:
    myPage.allPageItems[i].move([],[0, someVar]);
    Trevor
    Alex, You should mark Jongware's answer as correct
    n.b. you might want to use
    myPage.pageItems.itemByRange (0,1).move([], [0, someVar]);
    Changing the range rather than looping through the items.

  • Iphone 4s getting hot up when using the network. is it a sim problem

    iphone 4s getting hot up when using the network. is it a sim problem or battery problem?

    You posted in the iPad forum instead of the iPhone forum. To get answers to your question, next time post in the proper forum. See https://discussions.apple.com/index.jspa  I'll request that Apple relocate your post.
     Cheers, Tom

  • Static nat using gloabl ip

    I have an ASA configured with a server in our DMZ.
    It is currently configured to be accessed via the internet on port 80.  That works.
    Now they want to initiate traffic from the DMZ to the internet. 
    I thought the static NAT would keep the IP.  Its actually a No-nat.
    We have registered IPs on the DMZ and wanted to use them for the internet.
    I am seeing that when the server initiates communication to the internet it is picking up a global address from the global (outside) 1 x.x.230.1-x.x230.254.
    Below is my current configuration.
    (these first 2 lines allow access from outside to inside)
    access-list acl_out extended permit tcp any host x.x.73.91 eq www
    static (dmz1,outside) x.x.73.91 143.101.73.91 netmask 255.255.255.255
    global (outside) 1 x.x.230.1-x.x.230.254
    If i do a show xlate
    it shows:
    global x.x.73.91 local x.x.73.91
    Which is why I thought I did not need to do anything to initiate from the dmz1 interface to outside!

    FW1(config)# sh run
    : Saved
    ASA Version 8.2(1)
    hostname FW1
    names
    dns-guard
    interface GigabitEthernet0/0
    nameif outside
    security-level 0
    ip address x.x.6.4 255.255.255.0
    interface GigabitEthernet0/1
    speed 100
    duplex full
    nameif inside
    security-level 100
    ip address 172.25.1.2 255.255.255.0
    interface GigabitEthernet0/2
    speed 100
    duplex full
    nameif dmz1 
    security-level 25
    ip address x.x.0.5 255.255.255.0
    interface GigabitEthernet0/3
    speed 100
    duplex full
    nameif ServProv
    security-level 50
    ip address x.x.13.2 255.255.255.0
    interface Management0/0
    nameif management
    security-level 100
    ip address 192.168.1.1 255.255.255.0
    management-only
    boot system disk0:/asa822-k8.bin
    boot system disk0:/asa821-k8.bin
    ftp mode passive
    object-group icmp-type ICMP
    icmp-object echo
    icmp-object echo-reply
    icmp-object unreachable
    icmp-object time-exceeded
    object-group network WEB-Servers
    access-list acl_out extended permit tcp any host x.x.250.18 eq https
    access-list acl_out extended permit tcp any host x.x.250.18 eq www
    access-list acl_out extended permit tcp any host x.x.250.70 eq www
    access-list acl_out extended permit udp any host x.x.112.2 eq domain
    access-list acl_out extended permit tcp any host x.x.112.2 eq domain
    access-list acl_out extended permit udp any host x.x.112.2 eq ntp
    output - suppressed
    access-list acl_dmz1 extended permit ip host x.x.75.90 172.24.28.0 255.255.255.0
    access-list acl_dmz1 extended permit ip host x.x.75.91 172.24.28.0 255.255.255.0
    access-list acl_dmz1 extended permit ip host x.x.75.90 172.24.73.0 255.255.255.0
    access-list acl_dmz1 extended permit ip host x.x.75.91 172.24.73.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any 172.24.172.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any 172.24.17.0 255.255.255.0
    access-list acl_dmz1 extended permit ip host x.x.250.18 172.24.21.0 255.255.255.0
    access-list acl_dmz1 extended permit ip host x.x.250.18 172.24.28.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any host x.y.32.10
    access-list acl_dmz1 extended permit ip any 172.24.20.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any 172.24.28.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any host 172.25.248.12
    access-list acl_dmz1 extended permit ip x.x.125.0 255.255.255.0 10.11.17.0 255.255.255.0
    access-list acl_dmz1 extended permit ip x.x.125.0 255.255.255.0 10.25.125.0 255.255.255.0
    access-list acl_dmz1 extended permit ip x.x.130.0 255.255.255.0 10.25.125.0 255.255.255.0
    access-list acl_dmz1 extended permit ip x.x.130.0 255.255.255.0 10.11.17.0 255.255.255.0
    access-list acl_dmz1 extended permit tcp host x.x.75.142 host 172.24.76.76 eq 5000
    access-list acl_dmz1 extended deny tcp any any eq 5000
    access-list acl_dmz1 extended deny udp any any eq 1434
    access-list acl_dmz1 extended deny udp any any eq 3127
    access-list acl_dmz1 extended deny tcp any any eq 6346
    access-list acl_dmz1 extended deny tcp any any eq 6699
    access-list acl_dmz1 extended deny udp any any eq 1214
    access-list acl_dmz1 extended deny ip any host 63.210.247.160
    access-list acl_dmz1 extended deny ip any host 208.49.21.95
    access-list acl_dmz1 extended deny ip any host 165.254.12.201
    access-list acl_dmz1 extended deny ip any host 130.94.92.113
    access-list acl_dmz1 extended deny ip any host 216.235.81.6
    access-list acl_dmz1 extended deny ip any host 212.187.204.47
    access-list acl_dmz1 extended deny ip any host 66.151.128.9
    access-list acl_dmz1 extended deny ip any 64.124.45.0 255.255.255.0
    access-list acl_dmz1 extended permit tcp any 172.24.0.0 255.255.0.0 eq 135
    access-list acl_dmz1 extended permit tcp any 172.25.248.0 255.255.254.0
    access-list acl_dmz1 extended permit tcp any 128.191.0.0 255.255.0.0 eq 135
    access-list acl_dmz1 extended permit tcp any x.y.0.0 255.255.0.0 eq 135
    access-list acl_dmz1 extended permit tcp any 157.123.0.0 255.255.0.0 eq 135
    access-list acl_dmz1 extended permit tcp x.x.124.0 255.255.255.0 172.26.128.0 255.255.128.0
    access-list acl_dmz1 extended permit tcp 172.16.64.0 255.255.255.0 172.26.128.0 255.255.128.0
    access-list acl_dmz1 extended deny udp any any eq 135
    access-list acl_dmz1 extended deny tcp any any eq 135
    access-list acl_dmz1 extended deny udp any any eq 445
    access-list acl_dmz1 extended deny tcp any any eq 138
    access-list acl_dmz1 extended deny udp any any eq 139
    access-list acl_dmz1 extended deny udp any any eq 2110
    access-list acl_dmz1 extended deny tcp any any eq 2110
    access-list acl_dmz1 extended deny tcp any any eq 3410
    access-list acl_dmz1 extended permit tcp any host 172.24.20.60 eq smtp
    access-list acl_dmz1 extended permit tcp host x.x.75.46 any eq smtp
    access-list acl_dmz1 extended permit tcp host x.x.250.22 any eq smtp
    access-list acl_dmz1 extended permit tcp host x.x.250.61 any eq smtp
    access-list acl_dmz1 extended permit tcp host x.x.112.2 any eq smtp
    access-list acl_dmz1 extended permit tcp host x.x.0.20 any eq smtp
    access-list acl_dmz1 extended permit tcp host x.x.0.21 any eq smtp
    access-list acl_dmz1 extended permit tcp host x.w.66.58 any eq smtp
    access-list acl_dmz1 extended deny tcp any any eq 465
    access-list acl_dmz1 extended permit tcp x.x.250.0 255.255.255.0 any eq smtp
    access-list acl_dmz1 extended permit tcp x.x.129.0 255.255.255.0 host 172.25.144.5 eq smtp
    access-list acl_dmz1 extended permit tcp x.x.129.0 255.255.255.0 host 172.25.145.5 eq smtp
    access-list acl_dmz1 extended deny tcp any any eq smtp
    access-list acl_dmz1 extended permit ip any any
    access-list acl_dmz1 extended permit udp host x.x.157.12 any eq tftp
    access-list acl_dmz1 extended permit tcp host x.x.157.12 any eq ftp
    access-list acl_dmz1 extended permit tcp host x.x.157.12 any eq ftp-data
    access-list acl_dmz1 extended permit ip any host x.x.24.62
    access-list acl_dmz1 extended permit ip any 172.24.54.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any 172.24.21.0 255.255.255.0
    access-list acl_dmz1 extended permit ip any 172.16.68.0 255.255.255.0
    access-list acl_dmz1 extended permit ip host x.x.250.52 host 172.24.23.150
    access-list acl_dmz1 extended permit icmp x.x.75.0 255.255.255.0 any echo
    access-list acl_dmz1 extended permit icmp x.x.75.0 255.255.255.0 any echo-reply
    access-list acl_dmz1 extended permit ip host x.x.75.90 host x.z.186.69
    access-list acl_dmz1 extended permit ip 172.16.51.0 255.255.255.0 host 10.38.65.12
    access-list acl_ServProv extended deny tcp any any eq 5000
    access-list acl_ServProv extended deny tcp any any eq 465
    access-list acl_ServProv extended permit tcp host x.x.159.56 172.24.130.0 255.255.254.0 eq 1044
    access-list acl_ServProv extended permit tcp host x.x.159.56 172.24.132.0 255.255.254.0 eq 1044
    access-list acl_ServProv extended permit tcp host x.x.159.56 172.24.130.0 255.255.254.0 eq 5690
    access-list acl_ServProv extended permit tcp host x.x.159.56 172.24.132.0 255.255.254.0 eq 5690
    access-list acl_in extended permit ip 172.24.20.0 255.255.255.0 any
    access-list acl_in extended permit ip 172.24.17.0 255.255.255.0 any
    access-list acl_in extended permit ip 172.24.172.0 255.255.255.0 any
    access-list acl_in extended permit ip 172.24.28.0 255.255.255.0 any
    access-list acl_in extended permit ip 172.24.35.0 255.255.255.0 x.x.200.0 255.255.255.0
    access-list acl_in extended permit ip 172.24.35.0 255.255.255.0 172.16.53.0 255.255.255.0
    access-list acl_in extended permit ip 172.24.73.0 255.255.255.0 any
    access-list acl_in extended permit ip host x.y.32.10 any
    access-list acl_in extended permit ip host 172.24.114.91 any
    access-list acl_in extended permit tcp any host x.x.159.54 eq https
    access-list acl_in extended permit tcp any host x.x.159.54 eq www
    access-list acl_in extended permit udp any host x.x.159.54 eq 1935
    access-list acl_in extended permit tcp any host x.x.159.54 eq 1935
    access-list acl_in extended permit tcp any host x.x.159.50 eq 1434
    access-list acl_in extended permit udp any host x.x.159.50 eq 1434
    access-list acl_in extended permit udp 172.24.142.0 255.255.255.0 host x.x.159.55 eq 1434
    access-list acl_in extended permit udp 172.24.142.0 255.255.255.0 host x.x.159.53 eq 1434
    access-list acl_in extended permit udp 172.24.142.0 255.255.255.0 host x.x.159.52 eq 1434
    access-list acl_in extended permit udp 172.24.142.0 255.255.255.0 host x.x.159.51 eq 1434
    access-list acl_in extended permit tcp any host x.x.157.110 eq 1434
    access-list acl_in extended permit udp any host x.x.157.110 eq 1434
    access-list acl_in extended deny ip host 172.24.75.50 any
    access-list acl_in extended deny ip host 172.24.21.51 any
    access-list acl_in extended deny ip host 172.24.21.53 any
    access-list acl_in extended deny ip host x.w.80.218 any
    access-list acl_in extended deny ip host x.w.176.4 any
    access-list acl_in extended deny ip host x.w.40.54 any
    access-list acl_in extended deny ip host x.w.47.151 any
    access-list acl_in extended deny udp any any eq tftp
    access-list acl_in extended deny tcp any any eq 6346
    access-list acl_in extended deny tcp any any eq 6699
    access-list acl_in extended deny udp any any eq 1434
    access-list acl_in extended deny ip any host x.x.128.9
    access-list acl_in extended deny tcp any any eq 8998
    access-list acl_in extended deny udp any any eq 8998
    access-list acl_in extended deny tcp any any eq 17300
    access-list acl_in extended deny udp any any eq 17300
    access-list acl_in extended deny tcp any any eq 27374
    access-list acl_in extended deny udp any any eq 27374
    access-list acl_in extended deny udp any any eq 3127
    access-list acl_in extended deny tcp any any eq 5000
    access-list acl_in extended deny tcp any any eq 3410
    access-list acl_in extended permit tcp x.x.0.0 255.255.0.0 any eq 1025
    access-list acl_in extended deny tcp any any range 6881 6999
    access-list acl_in extended permit tcp host x.w.66.68 any eq 1025
    access-list acl_in extended deny tcp any any eq 1025
    access-list acl_in extended permit ip any any
    access-list acl_in extended permit tcp any host x.x.250.39 eq 5222
    access-list acl_in extended permit ip any 172.24.54.0 255.255.255.0
    access-list acl_in extended permit ip any 172.24.21.0 255.255.255.0
    access-list acl_in extended permit ip any 172.16.68.0 255.255.255.0
    access-list acl_in extended permit tcp 172.24.142.0 255.255.255.0 host x.x.159.51 eq 8002
    access-list acl_in extended permit ip host x.x.250.18 172.24.21.0 255.255.255.0
    pager lines 24
    logging enable
    logging timestamp
    logging buffered warnings
    logging trap warnings
    logging history errors
    logging asdm errors
    logging from-address [email protected]
    logging recipient-address [email protected] level emergencies
    logging facility 23
    logging queue 2056
    logging host inside 172.24.20.73
    mtu outside 1500
    mtu inside 1500
    mtu dmz1 1500
    mtu ServProv 1500
    mtu management 1500
    ip verify reverse-path interface outside
    ip verify reverse-path interface inside
    ip verify reverse-path interface dmz1
    ip verify reverse-path interface ServProv
    ip audit name Out-attack attack action drop reset
    ip audit name In-attack attack action drop reset
    ip audit name dmz-attack attack action drop reset
    ip audit name ServProv-attack attack action drop reset
    ip audit interface outside Out-attack
    ip audit interface inside In-attack
    ip audit interface dmz1 dmz-attack
    ip audit interface ServProv ServProv-attack
    no failover
    icmp unreachable rate-limit 1 burst-size 1
    asdm image disk0:/asdm-621.bin
    no asdm history enable
    arp timeout 14400
    nat-control
    global (outside) 1 x.x.230.1-x.x.230.254
    global (outside) 1 x.x.231.1-x.x.231.254
    global (outside) 2 x.x.243.1-x.x.243.254
    global (outside) 3 x.x.241.1-x.x.241.20
    global (dmz1) 1 x.x.242.1-x.x.242.254
    global (ServProv) 2 x.x.244.1-x.x.244.254
    nat (inside) 1 0.0.0.0 0.0.0.0 tcp 22000 0
    nat (dmz1) 1 0.0.0.0 0.0.0.0 tcp 28000 0
    nat (ServProv) 2 0.0.0.0 0.0.0.0 tcp 500 0
    static (dmz1,outside) x.x.0.0 x.x.0.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.147.12 x.x.147.12 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.13 x.x.147.13 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.52 x.x.147.52 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.53 x.x.147.53 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.54 x.x.147.54 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.55 x.x.147.55 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.101 x.x.147.101 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.20 x.x.250.20 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.21 x.x.250.21 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.23 x.x.250.23 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.25 x.x.250.25 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.26 x.x.250.26 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.27 x.x.250.27 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.30 x.x.250.30 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.42 x.x.250.42 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.48 x.x.250.48 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.49 x.x.250.49 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.54 x.x.250.54 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.59 x.x.250.59 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.67 x.x.250.67 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.77 x.x.250.77 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.120 x.x.250.120 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.211 x.x.250.211 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.212 x.x.250.212 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.5 x.x.250.5 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.10 x.w.66.10 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.20 x.w.66.20 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.30 x.w.66.30 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.31 x.w.66.31 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.50 x.w.66.50 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.60 x.w.66.60 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.105 x.x.75.105 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.11 x.x.75.11 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.107 x.x.75.107 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.109 x.x.75.109 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.110 x.x.75.110 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.112 x.x.75.112 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.114 x.x.75.114 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.12 x.x.75.12 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.13 x.x.75.13 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.14 x.x.75.14 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.15 x.x.75.15 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.16 x.x.75.16 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.17 x.x.75.17 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.18 x.x.75.18 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.29 x.x.75.29 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.30 x.x.75.30 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.19 x.x.75.19 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.20 x.x.75.20 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.50 x.x.73.50 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.51 x.x.73.51 netmask 255.255.255.255
    static (inside,dmz1) x.y.0.0 x.y.0.0 netmask 255.255.0.0
    static (inside,dmz1) 198.170.2.0 198.170.2.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.30.0 x.x.30.0 netmask 255.255.255.0
    static (inside,dmz1) 192.216.80.0 192.216.80.0 netmask 255.255.255.0
    <--- More --->
    static (inside,dmz1) x.x.146.0 x.x.146.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.224.0 x.x.224.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.44.0 x.x.44.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.86.0 x.x.86.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.145.0 x.x.145.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.130.0 x.x.130.0 netmask 255.255.255.0
    static (inside,dmz1) 198.170.1.0 198.170.1.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.40.0 x.w.40.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.73.55 x.x.73.55 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.2 x.x.112.2 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.3 x.x.112.3 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.7 x.x.112.7 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.21 x.x.112.21 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.30 x.x.112.30 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.35 x.x.112.35 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.36 x.x.112.36 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.50 x.x.112.50 netmask 255.255.255.255
    static (dmz1,outside) x.x.10.100 x.x.10.100 netmask 255.255.255.255
    static (inside,dmz1) x.x.36.0 x.x.36.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.162.0 x.w.162.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.152.0 x.w.152.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.16.0 x.w.16.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.223.0 x.w.223.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.232.0 x.w.232.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.240.0 x.w.240.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.200.0 x.w.200.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.138.0 x.w.138.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.80.0 x.w.80.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.204.0 x.w.204.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.136.0 x.w.136.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.48.0 x.w.48.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.28.0 x.w.28.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.72.0 x.w.72.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.104.0 x.w.104.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.112.0 x.w.112.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.132.0 x.w.132.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.144.0 x.w.144.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.146.0 x.w.146.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.47.0 x.w.47.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.176.0 x.w.176.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.116.0 x.w.116.0 netmask 255.255.255.0
    static (inside,dmz1) 172.25.0.0 172.25.0.0 netmask 255.255.0.0
    static (inside,ServProv) 172.24.112.0 172.24.112.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.113.0 172.24.113.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.21.0 172.24.21.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.21.0 172.24.21.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.20.0 172.24.20.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.32.0 172.24.32.0 netmask 255.255.224.0
    static (inside,dmz1) 172.24.96.0 172.24.96.0 netmask 255.255.224.0
    static (inside,ServProv) 172.24.232.0 172.24.232.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.128.0 172.24.128.0 netmask 255.255.224.0
    static (inside,dmz1) 172.24.160.0 172.24.160.0 netmask 255.255.224.0
    static (inside,dmz1) 172.24.192.0 172.24.192.0 netmask 255.255.224.0
    static (inside,dmz1) 172.24.224.0 172.24.224.0 netmask 255.255.224.0
    static (inside,dmz1) 172.24.64.0 172.24.64.0 netmask 255.255.224.0
    static (inside,dmz1) 172.24.25.0 172.24.25.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.233.0 172.24.233.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.20.0 172.24.20.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.18.0 172.24.18.0 netmask 255.255.255.0
    static (ServProv,dmz1) x.x.149.0 x.x.149.0 netmask 255.255.255.0
    static (inside,dmz1) 10.0.0.0 10.0.0.0 netmask 255.0.0.0
    static (dmz1,outside) x.x.147.51 x.x.147.51 netmask 255.255.255.255
    static (inside,ServProv) 147.76.0.0 147.76.0.0 netmask 255.255.0.0
    static (dmz1,outside) x.w.66.51 x.w.66.51 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.40 x.x.73.40 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.30 x.x.73.30 netmask 255.255.255.255
    static (inside,dmz1) x.x.94.0 x.x.94.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.105.0 x.w.105.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.120.0 x.w.120.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.147.240 x.x.147.60 netmask 255.255.255.255
    static (dmz1,outside) x.w.106.50 x.w.106.50 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.13.1 x.x.13.1 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.66 x.x.147.66 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.105 x.x.250.105 netmask 255.255.255.255
    static (inside,dmz1) x.x.35.0 x.x.35.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.125.0 x.w.125.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.73.57 x.x.73.57 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.81 x.x.147.81 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.91 x.x.147.91 netmask 255.255.255.255
    static (inside,dmz1) 157.123.160.0 157.123.160.0 netmask 255.255.252.0
    static (inside,dmz1) 157.123.96.0 157.123.96.0 netmask 255.255.240.0
    static (inside,dmz1) 157.123.136.0 157.123.136.0 netmask 255.255.252.0
    static (inside,dmz1) 157.123.121.0 157.123.121.0 netmask 255.255.255.0
    static (dmz1,outside) x.w.66.13 x.w.66.13 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.14 x.w.66.14 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.15 x.w.66.15 netmask 255.255.255.255
    static (inside,dmz1) 172.24.6.0 172.24.6.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.8.0 172.24.8.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.4.0 172.24.4.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.153.0 172.24.153.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.37.0 x.x.37.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.161.0 x.w.161.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.200 x.x.250.200 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.57 x.x.147.57 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.56 x.x.147.56 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.71 x.x.250.71 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.254 x.x.75.254 netmask 255.255.255.255
    static (dmz1,outside) x.x.13.100 x.x.13.100 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.200 x.x.73.200 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.250 x.x.75.250 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.251 x.x.75.251 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.252 x.x.75.252 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.100 172.24.17.100 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.110 172.24.17.110 netmask 255.255.255.255
    static (inside,dmz1) 203.127.246.0 203.127.246.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.92.0 x.x.92.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.221 x.x.250.221 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.222 x.x.250.222 netmask 255.255.255.255
    static (inside,dmz1) 1x.15.200.0 1x.15.200.0 netmask 255.255.255.0
    static (inside,dmz1) 1x.15.108.0 1x.15.108.0 netmask 255.255.255.0
    static (inside,dmz1) 1x.191.172.0 1x.191.172.0 netmask 255.255.252.0
    static (inside,dmz1) 172.28.4.0 172.28.4.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.35 x.x.75.35 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.200 172.24.17.200 netmask 255.255.255.255
    static (dmz1,outside) x.x.5.140 x.x.5.140 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.41 x.w.66.41 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.103 x.x.250.103 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.51 172.24.17.51 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.121 x.x.75.121 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.83 x.x.147.83 netmask 255.255.255.255
    static (inside,dmz1) x.x.1.250 x.x.1.250 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.15 x.x.147.15 netmask 255.255.255.255
    static (inside,dmz1) 1x.15.110.1 1x.15.110.1 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.120.0 x.x.120.0 netmask 255.255.255.0
    static (ServProv,dmz1) x.x.10.0 x.x.10.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.17.0 172.24.17.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.176.17 x.x.176.17 netmask 255.255.255.255
    static (dmz1,outside) x.x.176.15 x.x.176.15 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.113 x.x.250.113 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.154.0 x.x.154.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.56 x.x.250.56 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.61 x.x.250.61 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.60 x.x.250.60 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.58 x.x.250.58 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.57 x.x.250.57 netmask 255.255.255.255
    static (inside,dmz1) 172.28.203.1 172.28.203.1 netmask 255.255.255.255
    static (inside,dmz1) 172.28.203.2 172.28.203.2 netmask 255.255.255.255
    static (inside,dmz1) 172.28.203.3 172.28.203.3 netmask 255.255.255.255
    static (inside,dmz1) 172.28.203.4 172.28.203.4 netmask 255.255.255.255
    static (dmz1,outside) x.x.95.20 x.x.95.20 netmask 255.255.255.255
    static (dmz1,outside) x.x.95.21 x.x.95.21 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.191 x.x.250.191 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.31 172.24.27.31 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.19 172.24.27.19 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.20 172.24.27.20 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.22 172.24.27.22 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.64 172.24.27.64 netmask 255.255.255.192
    static (inside,dmz1) 172.24.27.128 172.24.27.128 netmask 255.255.255.128
    static (inside,dmz1) 172.24.27.30 172.24.27.30 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.15 172.24.27.15 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.11 172.24.27.11 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.10 172.24.27.10 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.21 172.24.17.21 netmask 255.255.255.255
    static (inside,dmz1) 192.168.106.0 192.168.106.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.69 x.x.250.69 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.30 172.24.17.30 netmask 255.255.255.255
    static (inside,dmz1) 128.191.160.0 128.191.160.0 netmask 255.255.252.0
    static (inside,dmz1) 128.191.140.0 128.191.140.0 netmask 255.255.252.0
    static (inside,dmz1) 172.24.27.32 172.24.27.32 netmask 255.255.255.224
    static (dmz1,outside) x.x.147.58 x.x.147.58 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.254 172.24.27.254 netmask 255.255.255.255
    static (inside,ServProv) 172.24.27.254 172.24.27.254 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.84 x.x.147.84 netmask 255.255.255.255
    static (dmz1,outside) x.x.176.76 x.x.176.76 netmask 255.255.255.255
    static (ServProv,outside) x.x.120.144 x.x.120.144 netmask 255.255.255.240
    static (ServProv,outside) x.x.120.160 x.x.120.160 netmask 255.255.255.240
    static (ServProv,outside) x.x.120.192 x.x.120.192 netmask 255.255.255.224
    static (ServProv,outside) x.x.120.224 x.x.120.224 netmask 255.255.255.240
    static (ServProv,outside) x.x.120.252 x.x.120.252 netmask 255.255.255.255
    static (inside,ServProv) 172.24.27.10 172.24.27.10 netmask 255.255.255.255
    static (inside,dmz1) 203.127.254.7 203.127.254.7 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.5 x.x.112.5 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.4 x.x.112.4 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.122 x.x.75.122 netmask 255.255.255.255
    static (inside,ServProv) 172.24.114.0 172.24.114.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.25 x.x.75.25 netmask 255.255.255.255
    static (inside,dmz1) 172.24.27.13 172.24.27.13 netmask 255.255.255.255
    static (ServProv,outside) x.x.120.0 x.x.120.0 netmask 255.255.255.128
    static (inside,dmz1) 172.24.27.0 172.24.27.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.100 x.x.250.100 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.197 x.x.250.197 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.193 x.x.250.193 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.196 x.x.250.196 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.53 x.w.66.53 netmask 255.255.255.255
    static (inside,dmz1) x.x.82.0 x.x.82.0 netmask 255.255.255.0
    static (inside,dmz1) x.w.222.0 x.w.222.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.27.11 172.24.27.11 netmask 255.255.255.255
    static (inside,dmz1) 192.168.100.0 192.168.100.0 netmask 255.255.255.0
    static (inside,dmz1) 192.168.101.0 192.168.101.0 netmask 255.255.255.0
    static (inside,dmz1) x.x.99.0 x.x.99.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.229.67 x.x.147.67 netmask 255.255.255.255
    static (dmz1,outside) x.x.10.196 x.x.10.196 netmask 255.255.255.255
    static (inside,dmz1) x.w.102.0 x.w.102.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.115 x.x.75.115 netmask 255.255.255.255
    static (ServProv,outside) x.x.10.196 x.x.10.196 netmask 255.255.255.255
    static (inside,dmz1) 1x.1x.137.0 1x.1x.137.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.11 x.x.250.11 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.47 x.x.75.47 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.42 x.x.75.42 netmask 255.255.255.255
    static (inside,ServProv) 172.24.27.20 172.24.27.20 netmask 255.255.255.255
    static (inside,dmz1) 172.24.22.0 172.24.22.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.22.0 172.24.22.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.50 x.x.75.50 netmask 255.255.255.255
    static (inside,ServProv) 172.24.172.0 172.24.172.0 netmask 255.255.255.0
    static (inside,ServProv) x.x.35.0 x.x.35.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.160.0 172.24.160.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.215.0 172.24.215.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.176.45 x.x.176.45 netmask 255.255.255.255
    static (inside,ServProv) 172.24.25.0 172.24.25.0 netmask 255.255.255.0
    static (ServProv,dmz1) x.x.13.10 x.x.13.10 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.13.20 x.x.13.20 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.164.0 x.x.164.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.142.0 172.24.142.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.72.0 172.24.72.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.202 x.x.250.202 netmask 255.255.255.255
    static (dmz1,outside) x.x.112.112 x.x.112.112 netmask 255.255.255.255
    static (inside,ServProv) 172.24.54.0 172.24.54.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.161.0 172.24.161.0 netmask 255.255.255.0
    static (dmz1,outside) x.w.66.100 x.w.66.100 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.150 x.x.75.150 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.152 x.x.75.152 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.153 x.x.75.153 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.154 x.x.75.154 netmask 255.255.255.255
    static (inside,dmz1) 172.24.28.0 172.24.28.0 netmask 255.255.255.0
    static (inside,dmz1) 172.26.144.0 172.26.144.0 netmask 255.255.240.0
    static (inside,dmz1) 172.26.160.0 172.26.160.0 netmask 255.255.240.0
    static (dmz1,outside) x.x.75.140 x.x.75.140 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.141 x.x.75.141 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.142 x.x.75.142 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.180 x.x.250.180 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.115 x.x.250.115 netmask 255.255.255.255
    static (ServProv,outside) x.x.119.0 x.x.119.0 netmask 255.255.255.224
    static (ServProv,dmz1) x.x.119.0 x.x.119.0 netmask 255.255.255.224
    static (inside,ServProv) 172.24.134.0 172.24.134.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.190 x.x.250.190 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.95 x.x.250.95 netmask 255.255.255.255
    static (inside,dmz1) 172.24.23.0 172.24.23.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.82 x.x.250.82 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.83 x.x.250.83 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.40 172.24.17.40 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.84 x.x.250.84 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.85 x.x.250.85 netmask 255.255.255.255
    static (inside,dmz1) 172.24.24.0 172.24.24.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.90 x.x.250.90 netmask 255.255.255.255
    static (inside,ServProv) 172.25.74.0 172.25.74.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.80 x.x.250.80 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.81 x.x.250.81 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.93 x.x.250.93 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.65 x.x.250.65 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.101 x.x.250.101 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.156.0 x.x.156.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.150.0 172.24.150.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.140 x.x.250.140 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.141 x.x.250.141 netmask 255.255.255.255
    static (dmz1,outside) x.x.69.15 x.x.69.15 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.156 x.x.75.156 netmask 255.255.255.255
    static (inside,ServProv) 172.24.24.0 172.24.24.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.157 x.x.75.157 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.86 x.x.250.86 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.87 x.x.250.87 netmask 255.255.255.255
    static (inside,dmz1) 147.76.204.58 147.76.204.58 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.161 x.x.75.161 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.41 172.24.17.41 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.31 172.24.17.31 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.32 x.x.75.32 netmask 255.255.255.255
    static (inside,ServProv) 172.26.168.0 172.26.168.0 netmask 255.255.254.0
    static (dmz1,outside) x.x.75.60 x.x.75.60 netmask 255.255.255.255
    static (inside,dmz1) 172.24.75.0 172.24.75.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.158 x.x.75.158 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.192 x.x.250.192 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.80 x.x.75.80 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.45 x.x.250.45 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.23 x.x.75.23 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.59 x.x.73.59 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.66 x.x.250.66 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.46 x.x.75.46 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.45 x.x.75.45 netmask 255.255.255.255
    static (inside,dmz1) 172.28.32.230 172.28.32.230 netmask 255.255.255.255
    static (dmz1,outside) x.x.251.15 x.x.251.15 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.158 x.x.250.158 netmask 255.255.255.255
    static (inside,dmz1) 172.24.29.0 172.24.29.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.73.61 x.x.73.61 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.70 x.x.75.70 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.203 x.x.250.203 netmask 255.255.255.255
    static (inside,dmz1) 1x.1x.169.6 1x.1x.169.6 netmask 255.255.255.255
    static (inside,dmz1) 1x.1x.169.16 1x.1x.169.16 netmask 255.255.255.255
    static (inside,dmz1) 1x.1x.169.9 1x.1x.169.9 netmask 255.255.255.255
    static (inside,dmz1) 172.31.8.115 172.31.8.115 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.81 x.x.75.81 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.99 x.x.250.99 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.117 x.x.75.117 netmask 255.255.255.255
    static (dmz1,outside) x.x.176.198 x.x.176.198 netmask 255.255.255.254
    static (inside,ServProv) x.y.32.0 x.y.32.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.130.0 172.24.130.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.133.0 172.24.133.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.30.0 172.24.30.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.74 x.x.75.74 netmask 255.255.255.255
    static (inside,dmz1) 172.24.112.81 172.24.112.81 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.162 x.x.159.162 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.22 x.x.250.22 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.250 x.x.159.250 netmask 255.255.255.255
    static (inside,dmz1) 1xx.1xx.170.143 1xx.1xx.170.143 netmask 255.255.255.255
    static (inside,ServProv) 172.25.249.0 172.25.249.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.23.0 172.24.23.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.113 x.x.75.113 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.50 x.x.250.50 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.171 x.x.75.171 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.172 x.x.75.172 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.175 x.x.75.175 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.177 x.x.75.177 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.179 x.x.75.179 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.180 x.x.75.180 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.181 x.x.75.181 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.182 x.x.75.182 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.183 x.x.75.183 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.184 x.x.75.184 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.143 x.x.75.143 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.21 x.x.75.21 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.110 x.x.250.110 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.185 x.x.75.185 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.174 x.x.75.174 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.176 x.x.75.176 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.178 x.x.75.178 netmask 255.255.255.255
    static (ServProv,outside) x.x.120.205 x.x.120.205 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.44 x.x.250.44 netmask 255.255.255.255
    static (inside,dmz1) 172.27.133.0 172.27.133.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.186 x.x.75.186 netmask 255.255.255.255
    static (inside,ServProv) 1x.1x.172.0 1x.1x.172.0 netmask 255.255.252.0
    static (inside,ServProv) 172.25.248.0 172.25.248.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.17.90 172.24.17.90 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.187 x.x.75.187 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.163 x.x.75.163 netmask 255.255.255.255
    static (inside,ServProv) 172.31.20.0 172.31.20.0 netmask 255.255.255.0
    static (inside,ServProv) 172.31.30.0 172.31.30.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.28.0 172.24.28.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.157.60 x.x.157.60 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.130 x.x.157.130 netmask 255.255.255.255
    static (inside,ServProv) 172.24.132.0 172.24.132.0 netmask 255.255.255.0
    static (ServProv,dmz1) x.x.157.0 x.x.157.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.154.0 172.24.154.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.193.0 172.24.193.0 netmask 255.255.255.0
    static (inside,ServProv) 172.26.168.0 172.26.168.0 netmask 255.255.255.0
    static (inside,ServProv) 172.26.169.0 172.26.169.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.76.0 172.24.76.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.54 x.x.75.54 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.55 x.x.75.55 netmask 255.255.255.255
    static (dmz1,outside) x.x.0.20 x.x.0.20 netmask 255.255.255.255 tcp 10000 100
    static (inside,ServProv) 128.191.168.0 128.191.168.0 netmask 255.255.252.0
    static (inside,dmz1) x.x.80.0 x.x.80.0 netmask 255.255.255.0
    static (inside,dmz1) 172.25.2.0 172.25.2.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.80.10 x.x.80.10 netmask 255.255.255.255
    static (inside,ServProv) x.x.152.0 x.x.152.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.0.21 x.x.0.21 netmask 255.255.255.255 tcp 10000 100
    static (inside,ServProv) 172.31.43.0 172.31.43.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.76.0 172.24.76.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.77.0 172.24.77.0 netmask 255.255.255.0
    static (inside,dmz1) 1x.1x.168.0 1x.1x.168.0 netmask 255.255.252.0
    static (inside,dmz1) 1x.1x.169.0 1x.1x.169.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.33 x.x.75.33 netmask 255.255.255.255
    static (ServProv,outside) x.x.152.110 x.x.152.110 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.61 x.w.66.61 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.188 x.x.75.188 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.57 x.x.75.57 netmask 255.255.255.255
    static (inside,ServProv) 172.24.73.0 172.24.73.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.120.161 x.x.120.161 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.60 172.24.17.60 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.61 172.24.17.61 netmask 255.255.255.255
    static (inside,dmz1) 172.27.129.0 172.27.129.0 netmask 255.255.255.0
    static (inside,dmz1) 172.27.132.0 172.27.132.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.157.40 x.x.157.40 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.152 x.x.157.152 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.150 x.x.159.150 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.151 x.x.159.151 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.41 x.x.157.41 netmask 255.255.255.255
    static (inside,ServProv) 172.24.144.0 172.24.144.0 netmask 255.255.255.0
    static (inside,ServProv) 172.25.108.0 172.25.108.0 netmask 255.255.252.0
    static (inside,ServProv) 172.25.181.0 172.25.181.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.176.196 x.x.176.196 netmask 255.255.255.255
    static (dmz1,outside) x.x.176.197 x.x.176.197 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.70 x.w.66.70 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.111 x.x.75.111 netmask 255.255.255.255
    static (inside,ServProv) 172.26.175.0 172.26.175.0 netmask 255.255.255.0
    static (inside,dmz1) 172.16.80.0 172.16.80.0 netmask 255.255.255.0
    static (inside,ServProv) 172.26.165.0 172.26.165.0 netmask 255.255.255.0
    <--- More --->
    static (inside,dmz1) 172.27.137.0 172.27.137.0 netmask 255.255.255.0
    static (inside,dmz1) 172.27.136.0 172.27.136.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.145 x.x.75.145 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.146 x.x.75.146 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.31 x.x.250.31 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.64 x.w.66.64 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.65 x.w.66.65 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.144 x.x.75.144 netmask 255.255.255.255
    static (ServProv,outside) x.x.165.12 x.x.165.12 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.147 x.x.75.147 netmask 255.255.255.255
    static (dmz1,outside) x.x.90.91 x.x.90.91 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.156 x.x.250.156 netmask 255.255.255.255
    static (ServProv,dmz1) x.x.165.0 x.x.165.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.159.52 x.x.159.52 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.190 x.x.75.190 netmask 255.255.255.255
    static (inside,ServProv) 172.24.224.0 172.24.224.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.138 x.x.75.138 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.35 x.x.250.35 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.191 x.x.75.191 netmask 255.255.255.255
    static (inside,ServProv) 172.26.160.0 172.26.160.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.162 x.x.75.162 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.59 x.w.66.59 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.166 x.x.75.166 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.80 x.w.66.80 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.81 x.w.66.81 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.82 x.w.66.82 netmask 255.255.255.255
    static (inside,dmz1) 172.24.14.0 172.24.14.0 netmask 255.255.255.0
    static (inside,dmz1) 172.24.13.0 172.24.13.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.73.63 x.x.73.63 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.53 x.x.159.53 netmask 255.255.255.255
    static (inside,dmz1) 1x.x.111.0 1x.x.111.0 netmask 255.255.255.0
    static (inside,ServProv) 172.16.22.0 172.16.22.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.225 x.x.250.225 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.70 x.x.73.70 netmask 255.255.255.255
    static (dmz1,outside) x.x.85.12 x.x.85.12 netmask 255.255.255.255
    static (dmz1,outside) x.x.148.10 x.x.148.10 netmask 255.255.255.255
    static (inside,dmz1) x.x.118.0 x.x.118.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.168.0 x.x.168.0 netmask 255.255.255.192
    static (ServProv,outside) x.x.159.51 x.x.159.51 netmask 255.255.255.255
    static (inside,dmz1) 172.16.16.0 172.16.16.0 netmask 255.255.248.0
    static (inside,dmz1) 172.27.135.0 172.27.135.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.112 x.x.250.112 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.109 x.x.250.109 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.200 x.x.159.200 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.201 x.x.159.201 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.202 x.x.159.202 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.203 x.x.159.203 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.204 x.x.159.204 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.205 x.x.159.205 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.206 x.x.159.206 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.207 x.x.159.207 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.208 x.x.159.208 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.209 x.x.159.209 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.210 x.x.159.210 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.36 x.x.250.36 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.75 x.x.73.75 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.58 x.w.66.58 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.76 x.x.73.76 netmask 255.255.255.255
    static (ServProv,outside) x.x.120.216 x.x.120.216 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.57 x.w.66.57 netmask 255.255.255.255
    static (inside,ServProv) 172.24.166.0 172.24.166.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.167 x.x.75.167 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.168 x.x.75.168 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.169 x.x.75.169 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.134 x.x.75.134 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.135 x.x.75.135 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.136 x.x.75.136 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.137 x.x.75.137 netmask 255.255.255.255
    static (dmz1,outside) x.x.85.20 x.x.85.20 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.56 x.w.66.56 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.47 x.x.147.47 netmask 255.255.255.255
    static (dmz1,outside) x.x.73.71 x.x.73.71 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.120 172.24.17.120 netmask 255.255.255.255
    static (inside,dmz1) 172.24.17.125 172.24.17.125 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.16 x.x.250.16 netmask 255.255.255.255
    static (inside,ServProv) 172.16.18.0 172.16.18.0 netmask 255.255.255.0
    static (inside,ServProv) 128.191.124.0 128.191.124.0 netmask 255.255.252.0
    static (dmz1,outside) x.x.75.173 x.x.75.173 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.54 x.x.159.54 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.55 x.x.159.55 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.69 x.w.66.69 netmask 255.255.255.255
    static (inside,ServProv) 172.24.141.0 172.24.141.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.147.110 x.x.147.110 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.112 x.x.147.112 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.111 x.x.147.111 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.113 x.x.147.113 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.114 x.x.147.114 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.115 x.x.147.115 netmask 255.255.255.255
    static (dmz1,outside) x.x.147.116 x.x.147.116 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.72 x.x.250.72 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.76 x.x.250.76 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.73 x.x.250.73 netmask 255.255.255.255
    static (inside,ServProv) 172.24.40.0 172.24.40.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.41.0 172.24.41.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.74 x.x.250.74 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.75 x.x.250.75 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.78 x.x.250.78 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.79 x.x.250.79 netmask 255.255.255.255
    static (dmz1,outside) x.w.66.68 x.w.66.68 netmask 255.255.255.255
    static (inside,ServProv) 172.24.74.0 172.24.74.0 netmask 255.255.255.0
    static (ServProv,dmz1) x.x.159.0 x.x.159.0 netmask 255.255.255.0
    static (inside,ServProv) 172.26.172.0 172.26.172.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.200 x.x.75.200 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.189 x.x.75.189 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.121 x.x.250.121 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.11 x.x.200.11 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.12 x.x.200.12 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.13 x.x.200.13 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.14 x.x.200.14 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.15 x.x.200.15 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.16 x.x.200.16 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.56 x.x.75.56 netmask 255.255.255.255
    static (inside,dmz1) 172.24.35.0 172.24.35.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.165.100 x.x.165.100 netmask 255.255.255.255
    static (inside,dmz1) 172.26.176.0 172.26.176.0 netmask 255.255.255.0
    static (inside,ServProv) 10.47.73.201 10.47.73.201 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.151 x.x.157.151 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.150 x.x.157.150 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.50 x.x.159.50 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.58 x.x.75.58 netmask 255.255.255.255
    static (ServProv,outside) x.x.120.218 x.x.120.218 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.46 x.x.157.46 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.17 x.x.200.17 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.106 x.x.75.106 netmask 255.255.255.255
    static (inside,ServProv) 172.24.75.0 172.24.75.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.77.0 172.24.77.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.78.0 172.24.78.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.157.11 x.x.157.11 netmask 255.255.255.255
    static (inside,ServProv) 172.24.192.0 172.24.192.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.46 x.x.250.46 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.47 x.x.250.47 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.33 x.x.250.33 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.34 x.x.250.34 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.37 x.x.250.37 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.38 x.x.250.38 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.59 x.x.75.59 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.104 x.x.75.104 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.51 x.x.250.51 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.152 x.x.250.152 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.151 x.x.250.151 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.39 x.x.250.39 netmask 255.255.255.255
    static (dmz1,outside) x.x.157.12 x.x.157.12 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.56 x.x.159.56 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.57 x.x.159.57 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.58 x.x.159.58 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.59 x.x.159.59 netmask 255.255.255.255
    static (inside,ServProv) 172.24.169.0 172.24.169.0 netmask 255.255.255.0
    static (inside,ServProv) 172.16.68.0 172.16.68.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.156.0 172.24.156.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.157.224 x.x.157.224 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.60 x.x.159.60 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.61 x.x.159.61 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.100 x.x.157.100 netmask 255.255.255.255
    static (dmz1,outside) x.x.105.246 x.x.105.246 netmask 255.255.255.255
    static (dmz1,outside) x.x.24.62 x.x.24.62 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.9 x.x.157.9 netmask 255.255.255.255
    static (inside,ServProv) 172.26.149.0 172.26.149.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.200.20 x.x.200.20 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.21 x.x.200.21 netmask 255.255.255.255
    static (dmz1,outside) x.x.200.22 x.x.200.22 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.120 x.x.159.120 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.121 x.x.159.121 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.122 x.x.159.122 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.123 x.x.159.123 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.124 x.x.159.124 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.125 x.x.159.125 netmask 255.255.255.255
    static (ServProv,outside) x.x.159.126 x.x.159.126 netmask 255.255.255.255
    static (dmz1,inside) x.x.250.39 x.x.250.39 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.40 x.x.250.40 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.53 x.x.250.53 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.49 x.x.157.49 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.50 x.x.157.50 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.85 x.x.157.85 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.245 x.x.157.245 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.240 x.x.157.240 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.241 x.x.157.241 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.242 x.x.157.242 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.243 x.x.157.243 netmask 255.255.255.255
    static (inside,ServProv) 172.24.71.0 172.24.71.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.157.238 x.x.157.238 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.239 x.x.157.239 netmask 255.255.255.255
    static (ServProv,inside) x.x.159.51 x.x.159.51 netmask 255.255.255.255
    static (inside,ServProv) 172.24.181.0 172.24.181.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.131.0 172.24.131.0 netmask 255.255.255.0
    static (inside,dmz1) 172.16.68.0 172.16.68.0 netmask 255.255.255.0
    static (inside,ServProv) 172.24.35.0 172.24.35.0 netmask 255.255.255.0
    static (ServProv,inside) x.x.159.54 x.x.159.54 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.102 x.x.250.102 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.18 x.x.250.18 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.127 x.x.157.127 netmask 255.255.255.255
    static (dmz1,outside) x.x.55.0 x.x.55.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.56.0 x.x.56.0 netmask 255.255.255.0
    static (ServProv,outside) x.x.157.51 x.x.157.51 netmask 255.255.255.255
    static (ServProv,outside) x.x.157.52 x.x.157.52 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.48 x.x.75.48 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.55 x.x.250.55 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.90 x.x.75.90 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.70 x.x.250.70 netmask 255.255.255.255
    static (dmz1,inside) 172.16.51.0 172.16.51.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.192 x.x.75.192 netmask 255.255.255.255
    static (inside,ServProv) 172.26.158.0 172.26.158.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.250.122 x.x.250.122 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.193 x.x.75.193 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.131 x.x.250.131 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.132 x.x.250.132 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.195 x.x.75.195 netmask 255.255.255.255
    static (dmz1,outside) x.x.75.194 x.x.75.194 netmask 255.255.255.255
    static (inside,dmz1) 172.26.143.0 172.26.143.0 netmask 255.255.255.0
    static (ServProv,inside) x.x.159.56 x.x.159.56 netmask 255.255.255.255
    static (ServProv,inside) x.x.159.55 x.x.159.55 netmask 255.255.255.255
    static (inside,ServProv) x.y.34.0 x.y.34.0 netmask 255.255.255.0
    static (inside,ServProv) 172.27.132.0 172.27.132.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.75.91 x.x.75.91 netmask 255.255.255.255
    static (inside,dmz1) 172.24.164.0 172.24.164.0 netmask 255.255.254.0
    static (inside,ServProv) 172.24.164.0 172.24.164.0 netmask 255.255.254.0
    static (dmz1,outside) x.x.250.210 x.x.250.210 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.62 x.x.250.62 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.63 x.x.250.63 netmask 255.255.255.255
    static (dmz1,outside) x.x.250.68 x.x.250.68 netmask 255.255.255.255
    static (dmz1,inside) x.x.75.91 x.x.75.91 netmask 255.255.255.255
    static (dmz1,inside) x.x.75.90 x.x.75.90 netmask 255.255.255.255
    static (inside,dmz1) 172.24.73.0 172.24.73.0 netmask 255.255.255.0
    static (dmz1,outside) x.x.73.91 x.x.73.91 netmask 255.255.255.255
    access-group acl_out in interface outside
    access-group acl_in in interface inside
    access-group acl_dmz1 in interface dmz1
    access-group acl_ServProv in interface ServProv
    route outside 0.0.0.0 0.0.0.0 x.x.6.1 1
    route inside 10.0.0.0 255.0.0.0 172.25.1.1 1
    route dmz1 10.52.109.125 255.255.255.255 x.x.0.1 1
    route dmz1 10.207.0.0 255.255.0.0 x.x.0.1 1
    route dmz1 10.222.0.0 255.255.255.0 x.x.0.1 1
    route dmz1 x.x.179.160 255.255.255.224 x.x.0.1 1
    route dmz1 x.x.54.0 255.255.255.0 x.x.0.1 1
    route dmz1 x.x.3.25 255.255.255.255 x.x.0.1 1
    route dmz1 x.x.48.76 255.255.255.255 x.x.0.1 1
    route dmz1 x.x.237.0 255.255.255.0 x.x.0.1 1
    route inside 1x.1x.0.0 255.255.0.0 172.25.1.1 1
    route outside 1x.1x.16.0 255.255.252.0 x.x.6.1 1
    route dmz1 1x.1x.128.0 255.255

  • Static NAT using access-lists?

    Hi,
    i have an ASA5520 and im having an issue with static nat configuration.
    I have an inside host, say 1.1.1.1, that i want to be accessible from the outside as address 2.2.2.2.
    This is working fine. The issue is that i have other clients who i would like to access the host using its real physical address of 1.1.1.1.
    I have got this working using nat0 as an exemption, but as there will be more clients accessing the physical address than the nat address i would like to flip this logic if possible.
    Can i create a nat rule that only matches an access list i.e. 'for clients from network x.x.x.x, use the nat from 2.2.2.2 -> 1.1.1.1' and for everyone else, dont nat?
    My Pix cli skills arent the best, but the ASDM suggests that this is possible - on the nat rules page there is a section for the untranslated source to ANY, and if i could change ANY i would but dont see how to...
    Thanks,
    Des

    Des,
    You need to create an access-list to be used with the nat 0 statement.
    access-list inside_nonat extended permit ip 1.1.1.1 255.255.255.255 2.2.2.2 255.255.255.255
    - this tells the pix/asa to NOT perform NAT for traffic going from 1.1.1.1 to 2.2.2.2
    then use NAT 0 statement:
    nat (inside) 0 access-list inside_nonat
    to permit outside users to see inside addresses without NAT, flip this logic.
    access-list outside_nonat extended permit ip 2.2.2.2 255.255.255.255 1.1.1.1 255.255.255.255
    nat (outside) 0 access-list outside_nonat
    you'll also have to permit this traffic through the ACL of the outside interface.
    access-list inbound_acl extended permit ip 2.2.2.2 255.255.255.255 1.1.1.1 255.255.255.255
    - Brandon

  • Static NAT to backend network

    I have this setup:
    outside <-> [ASA] <-> inside (10.21.30.0/23) <-> [router] <-> inside2 (10.21.40.0/23)
    I added this:
    static (inside,outside) tcp 1.2.3.180 www 10.21.41.100 www netmask 255.255.255.255
    access-list main_acl extended permit ip any host 10.21.41.100
    route inside 10.21.40.0 255.255.254.0 10.21.31.1 1
    I'm able to ping from asa to 10.21.41.100 and back to the asa from this box. So route works.
    But If I'm outside and telnet 1.2.3.180 80 it does not work. (changing the rule to a host on 10.21.30.0/23 network works fine so its a route issue)
    packet-tracer DROPS here:
    tpfw01# packet-tracer input outside tcp 4.4.4.4 80 10.21.41.100 80
    Phase: 1
    Type: ROUTE-LOOKUP
    Subtype: input
    Result: ALLOW
    Config:
    Additional Information:
    in   10.21.40.0      255.255.254.0   inside
    Phase: 2
    Type: ACCESS-LIST
    Subtype: log
    Result: ALLOW
    Config:
    access-group main_acl in interface outside
    access-list main_acl extended permit ip any host 10.21.41.100
    Additional Information:
    Phase: 3
    Type: IP-OPTIONS
    Subtype:
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 4
    Type: FOVER
    Subtype: standby-update
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 5
    Type: VPN
    Subtype: ipsec-tunnel-flow
    Result: ALLOW
    Config:
    Additional Information:
    Phase: 6
    Type: NAT
    Subtype: rpf-check
    Result: DROP
    Config:
    static (inside,outside) tcp 1.2.3.180 www 10.21.41.100 www netmask 255.255.255.255
      match tcp inside host 10.21.41.100 eq 80 outside any
        static translation to 1.2.3.180/80
        translate_hits = 0, untranslate_hits = 3
    Additional Information:
    Result:
    input-interface: outside
    input-status: up
    input-line-status: up
    output-interface: inside
    output-status: up
    output-line-status: up
    Action: drop
    Drop-reason: (acl-drop) Flow is denied by configured rule

    Hi,
    To me it seems you are opening the traffic to the Real IP address rather than the NAT IP address which should be used.
    If you are running ASA software 8.2 or below/older, you will need to use the NAT IP addresses as the destination address when you make ACL rules
    If you are running ASA software 8.3 or higher/newer, you will need to use the Real IP addresses as the destination address when you make ACL rules
    So in your above case the ACL should rather be the following
    access-list main_acl permit tcp any host 1.2.3.180 eq 80
    Also your "packet-tracer" destination IP address should be the NAT IP address rather than the Real IP address. This is why the "packet-tracer" fails.
    - Jouni

  • Configuring static routes at the network edge

    We have some Cisco 1750 routers at the edge of our network which are running RIP. We were advised to use static routes on the router, since there was only one route (across a WAN link) for traffic to go from the hub connected to the router, as RIP would only waste the limited bandwidth to the router. We posted this problem previously and got a response which stated :You could set up a default static route on your edge router, run RIP on your internal routers in order to propagate the default, but block the RIP to the outside.
    On your edge router, make a default route to your external link. Keep RIP running as before, but add the line redistribute static in your rip configuration. That will get the default route propagated.
    Now to stop the RIP on the external interface: If the link is on a different major IP network to your internal network, you can simply not include it in the network commands under rip. But if it is in the same network, then RIP will be enabled on the interface, so you will have to add passive-interface xxxxx, where xxxxx refers to the interface carrying your external link,
    Alternatively, you could define your default route using the ip default-network command. This will get propagated automatically into the RIP even without the redistribute command.
    We tried it, the problem is that the router is unreachable, via the serial or Ethernet, although if connected to the router via console port, with the configuration screen , you are able to ping external locations, and are able to telnet into the router, but he PC's on the Ethernet side of the router cant see the network.
    Assistance\Advice requested.
    attached you wll find , the actual reply , and a copy of some info from our work file.

    Ernie
    I have looked at the config that you posted and I see several issues. The serial interface on Salvage is 172.20.2.2. Your message indicates that it is connected via serial to a 3640 which your message seems to indicate is 172.20.1.4. But that makes the 3640 on a different subnet. Connections over a serial link should be in the same subnet on both ends. (The exception to that is when you are using the ip unnumbered feature - which you are not). I suspect that part of your problem is that the routers do not see themselves on a connected subnet. When you run RIP over the link it can compensate for that to some degree. But when you stop RIP the problem has impact.
    Also I see that you have a static default route as Kevin suggested. And in RIP you have redistribute static. But there is no default metric defined. To redistribute into RIP you need a default metric. Another aspect of the problem with the default route is that the next hop for the default route is 172.20.1.4, but without RIP running I believe that Salvage has no idea how to get to that address. You can confirm this by doing show ip route 172.20.1.4 on Salvage. I suspect that you will get an error about route not in table.
    Beyond these issues I believe that there is a larger problem of misunderstanding. When I look at your original post in this thread it talks about not running RIP over the serial link. And when I read Kevin's response the first paragraph is describing not running RIP over the serial interface when it says do static default on your edge router and run RIP on your internal router. If you are not running RIP over the serial interface then I see no reason to run RIP on Salvage at all. There is one piece of this that Kevin did not address. If you do not run RIP over the serial link then how does the 3640 know about the Ethernet subnet at Salvage. I believe that the answer is that the 3640 needs to configure a static route to 172.20.27.0 with the 1750 serial interface as the next hop. And if there are other routers that the 3640 communicates with via RIP then the 3640 needs to redistribute static into RIP (remembering to have a default metric).
    If you address these issues I believe that you will have connectivity from the central network to the remote subnet on Salvage.
    HTH
    Rick

  • Could Form server use the network device

    Can anyone tell me?
    When i used the form server, I had to type a full nework device path on the "serverArgs" parameter because my applications are on network device.<PARAM NAME="serverArgs" VALUE="module=\\servername\device\main.fmx>
    When i ran the html page on web ,it will appear the message (cannot read the form \\servername\device\main.fmx) . What can i do to fix the problem?

    Try changeing the DSN server. See:
    iOS 5 update issues  "Network...: Apple Support Communities

Maybe you are looking for