Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.
interface f0/0 int f0/0 description Outside ip address dhcp no ip redirects no ip proxy-arp ip nat outside ip virtual-reassembly in duplex auto speed auto ! interface f0/1 description Inside ip address 192.168.3.1 255.255.255.0 ip nat inside ip virtual-reassembly in duplex auto speed auto ! ip nat inside source list 100 interface f0/0 overload ip nat inside source static tcp 192.168.3.9 85 interface f0/0 85 ! access-list 1 permit ip 192.168.3.0 0.0.0.255 any access-list 1 deny ip any any access-list 1 permit 192.168.3.0 0.0.0.255 any access-list 100 permit ip 192.168.3.1 0.0.0.255 any ip nat pool Home 192.168.3.3 192.168.3.255 netmask 255.255.255.0 ip nat inside source list 100 pool Home overload ip nat inside source list 100 interface fa0/0 overload
Join the community of 500,000 technology professionals and ask your questions.
Connect with top rated Experts
12 Experts available now in Live!