Well I finally was able to see the link thanks to a friend and all that link talks bout is the NAT/No-NAT statements.
That isn't really the issue. The issue is within the ACL's and how they are applied. I'm trying to determine if it is possible for a PNAT'd public IP to talk to a public static statement going to a DMZ servers.
The way I have it currently setup makes it seem like it is not possible.
I can easily access the outside world from both the internal clients and dmz servers. The outside world can easily access the dmz servers via the static statements and it seems to me that the internal clients going through the PNAT engine would be able to access the static statements but this is timing out(IE being blocked somewhere)
The idea here is to have the internal clients go outside to the public network then go through the static statements to the DMZ.
Not use the normal method of letting the ASA engine allow the packets to from higher to the lower and make ACLs for that traffic.
I do not want the internal clients to ever be NAT'd into the DMZ.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :