<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Server got lost from LAN while allowing Internet connectivity in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294210#M1078614</link>
    <description>Hello Rob,&lt;BR /&gt;&lt;BR /&gt;Thanks for taking a look, that mak sense but I have a pplieda couple of NATs trying to achive this and still same issue, probably I’m doing it wrong.&lt;BR /&gt;&lt;BR /&gt;Would you guide me how to achive this? Any suggestion?&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;</description>
    <pubDate>Fri, 19 Feb 2021 09:38:34 GMT</pubDate>
    <dc:creator>Unit4_cognizant</dc:creator>
    <dc:date>2021-02-19T09:38:34Z</dc:date>
    <item>
      <title>Server got lost from LAN while allowing Internet connectivity</title>
      <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294179#M1078611</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seeking your help with an issue I've been facing deploying a new ASA5555 FW. We have a server behind the LAN interface which is well reachable over Cisco AnnyConnect profile, that server needs also internet connectivity and here is when the issue comes up; after configuring the NAT to allow internet traffic it is no longer reachable over AnyConnect and what I can see in the logs is a kind of asymmetric NAT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FW details:&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.8(2)&lt;BR /&gt;Firepower Extensible Operating System Version 2.2(2.52)&lt;BR /&gt;Device Manager Version 7.8(2)151&lt;/P&gt;&lt;P&gt;Hardware: ASA5555, 16384 MB RAM, CPU Lynnfield 2793 MHz, 1 CPU (8 cores)&lt;BR /&gt;ASA: 8546 MB RAM, 1 CPU (2 cores)&lt;BR /&gt;Internal ATA Compact Flash, 8192MB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The server is directly connected on LAN interface&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;OSLO-ASA01# show arp | in 10.47.20.245&lt;BR /&gt;LAN 10.47.20.245 0015.5db3.a9f7 12&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ACL to allow traffic from this server over the Internet (WAN Interface)&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit ip host 10.47.20.245 any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT to translate source IP to WAN interface IP for Internet traficc&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source dynamic 10.47.20.245 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As soon as that NAT gets applied the internet is allowed to go over the internet but is lost from the LAN (cisco anyconnect) and I can see below error in the logs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;5&lt;/TD&gt;&lt;TD&gt;Feb 19 2021&lt;/TD&gt;&lt;TD&gt;09:01:44&lt;/TD&gt;&lt;TD&gt;305013&lt;/TD&gt;&lt;TD&gt;10.47.200.1&lt;/TD&gt;&lt;TD&gt;LOCAL&lt;/TD&gt;&lt;TD&gt;10.47.20.245&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Asymmetric NAT rules matched for forward and reverse flows&lt;/STRONG&gt;; Connection for icmp src WAN:10.47.200.1(LOCAL\Jaime.Viera@unit4.com) dst LAN:10.47.20.245 (type 8, code 0) denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does someone know what would be the issue? I need to have this server (and many others to come up) reachable over the Cisco AnyConnect but also able to have Internet traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would be able to provide further config details and logs/debug if needed&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jaime,&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 08:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294179#M1078611</guid>
      <dc:creator>Unit4_cognizant</dc:creator>
      <dc:date>2021-02-19T08:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: Server got lost from LAN while allowing Internet connectivity</title>
      <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294182#M1078612</link>
      <description>&lt;P&gt;&lt;STRONG&gt;re is a packet-tracer result&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OSLO-ASA01# packet-tracer input LAN icmp 10.47.200.2 8 0 10.47.20.245 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f7822fa4da0, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=4348289, user_data=0x7f781925d3e0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f78169efd80, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=982379, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.47.20.245 using egress ifc LAN&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-list LAN_access_in extended permit ip any object Corplan&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f78177d0860, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=813, user_data=0x7f780a483580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.0.0.0, mask=255.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f7815c912c0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=19503, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f78171eb830, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=15286, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f78178264a0, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=212, user_data=0x7f781945ba90, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f78171eb040, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=726, user_data=0x7f78171ea5b0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f7817d00520, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;hits=1385, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f7817d00520, priority=13, domain=debug-icmp-trace, deny=false&lt;BR /&gt;hits=1386, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f7815c912c0, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=19505, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f78171eb830, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=15288, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=LAN, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 25809, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_dbg_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: LAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: LAN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 08:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294182#M1078612</guid>
      <dc:creator>Unit4_cognizant</dc:creator>
      <dc:date>2021-02-19T08:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Server got lost from LAN while allowing Internet connectivity</title>
      <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294198#M1078613</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/93609"&gt;@Unit4_cognizant&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You probably need a NAT exemption rule betweeen the LAN and RAVPN networks, as the traffic is probably being unintentionally being natted.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 09:01:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294198#M1078613</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-02-19T09:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Server got lost from LAN while allowing Internet connectivity</title>
      <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294210#M1078614</link>
      <description>Hello Rob,&lt;BR /&gt;&lt;BR /&gt;Thanks for taking a look, that mak sense but I have a pplieda couple of NATs trying to achive this and still same issue, probably I’m doing it wrong.&lt;BR /&gt;&lt;BR /&gt;Would you guide me how to achive this? Any suggestion?&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Feb 2021 09:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294210#M1078614</guid>
      <dc:creator>Unit4_cognizant</dc:creator>
      <dc:date>2021-02-19T09:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Server got lost from LAN while allowing Internet connectivity</title>
      <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294211#M1078615</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/93609"&gt;@Unit4_cognizant&lt;/a&gt; &lt;/P&gt;
&lt;P&gt;You need a rule something like this:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;nat (INSIDE,OUTSIDE) source static LAN LAN destination static RAVPN RAVPN no-proxy-arp &lt;/PRE&gt;
&lt;P&gt;You may need to amend the interfaces, you will obviously have to amend the groups used. If that fails, provide your configuration and the output of "show nat detail".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 09:44:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294211#M1078615</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-02-19T09:44:51Z</dc:date>
    </item>
    <item>
      <title>Re: Server got lost from LAN while allowing Internet connectivity</title>
      <link>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294213#M1078616</link>
      <description>Got to solve the issue now with below NAT&lt;BR /&gt;&lt;BR /&gt;nat (LAN,WAN) source static Corplan Corplan destination static Corplan Corplan no-proxy-arp route-lookup&lt;BR /&gt;&lt;BR /&gt;Corplan is our whole internal network.&lt;BR /&gt;&lt;BR /&gt;Still unclear how it works to be honest, but glad it is working fine, now that server is having internet Access and still rechable through the cisco annyconnect VPN&lt;BR /&gt;&lt;BR /&gt;Thanks so much for your help&lt;BR /&gt;</description>
      <pubDate>Fri, 19 Feb 2021 09:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-got-lost-from-lan-while-allowing-internet-connectivity/m-p/4294213#M1078616</guid>
      <dc:creator>Unit4_cognizant</dc:creator>
      <dc:date>2021-02-19T09:49:34Z</dc:date>
    </item>
  </channel>
</rss>

