<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Egress Interface is not sending to the correct direction in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459975#M1083352</link>
    <description>Have you done what I mentioned about packet-trace, acls, routing?&lt;BR /&gt;</description>
    <pubDate>Sun, 05 Sep 2021 06:44:06 GMT</pubDate>
    <dc:creator>Mohammed al Baqari</dc:creator>
    <dc:date>2021-09-05T06:44:06Z</dc:date>
    <item>
      <title>Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459945#M1083345</link>
      <description>&lt;P&gt;I believe that this is NAT issue. The issue is from the inside, when I try to ping or access anything in my DMZ1 or RA subnet it is send to the outside interface. I have confirmed this by doing tracert for 144.168.0.x and 124.140.0.x two other foreign companies networked devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to be able to send traffic to my DMZ1 and VPN subnet from my inside. The RA VPN client can ping my inside devices but can't see anything in the DMZ1(because its going to the outside as well). From the ASA CLI I can ping the RA VPN clients and anything on the DMZ. DMZ1 has access to Outside\internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I correct this issue, my guess I need a NAT rule to determine the egress interface or some use the ASA the routing table. I', not sure how it should like, so if you could provide the commands that would be helpful. Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network DukeLAN&lt;BR /&gt;subnet 144.244.244.0 255.255.255.0&lt;BR /&gt;description Inside Network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network DMZ1-Network&lt;BR /&gt;subnet 144.168.0.0 255.255.255.0&lt;BR /&gt;description DMZ1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Obj-Remote-IPSEC-VPN&lt;BR /&gt;subnet 124.140.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;description RA VPN subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Current NAT's (some will be removed due to no hits)&lt;/U&gt;:&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic DMZ1-Network interface description Allow VPN Access from the Outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (any,any) source static DukeLAN DukeLAN destination static DukeLAN DukeLAN no-proxy-arp description Allow inside traffic to go anywhere&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static DukeLAN DukeLAN destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN no-proxy-arp route-lookup description For Inside VPN Split tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (dmz1,outside) source static DMZ1-Network DMZ1-Network destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN no-proxy-arp route-lookup description For DMZ VPN Split tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (any,outside) source dynamic Obj-Remote-IPSEC-VPN interface description NAT Rule for VPN Clients&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (dmz1,inside) source static any any destination static DukeLAN DukeLAN no-proxy-arp route-lookup description Allow access for DukeLAN to DMZ1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (dmz1,outside) source static any any destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN no-proxy-arp route-lookup description Allow access for VPN to DMZ1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN no-proxy-arp route-lookup description Allow access for VPN to Inside?&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 00:49:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459945#M1083345</guid>
      <dc:creator>Stevan44</dc:creator>
      <dc:date>2021-09-05T00:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459949#M1083347</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Your NAT rules mixd up. Do this.&lt;BR /&gt;&lt;BR /&gt;---- remove this.&lt;BR /&gt;&lt;BR /&gt;no nat (any,any) source static DukeLAN DukeLAN destination static DukeLAN&lt;BR /&gt;DukeLAN no-proxy-arp description Allow inside traffic to go anywhere&lt;BR /&gt;&lt;BR /&gt;no nat (outside,outside) source dynamic DMZ1-Network interface description&lt;BR /&gt;Allow VPN Access from the Outside&lt;BR /&gt;&lt;BR /&gt;no nat (dmz1,outside) source static any any destination static&lt;BR /&gt;Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN no-proxy-arp route-lookup&lt;BR /&gt;description Allow access for VPN to DMZ1&lt;BR /&gt;&lt;BR /&gt;no nat (inside,outside) source static any any destination static&lt;BR /&gt;Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN no-proxy-arp route-lookup&lt;BR /&gt;description Allow access for VPN to Inside?&lt;BR /&gt;&lt;BR /&gt;---- remove the options "no-proxy-arp route-lookup"&lt;BR /&gt;&lt;BR /&gt;---- add dynamic nat rules for dmz and inside to access the internet.&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Sun, 05 Sep 2021 01:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459949#M1083347</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-05T01:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459954#M1083349</link>
      <description>&lt;P&gt;Hi Mohammed,&lt;/P&gt;&lt;P&gt;Thanks for taking a look.&lt;/P&gt;&lt;P&gt;Egress route is still going to the outside. I can't remove route-lookup from the 4th NAT rule it breaks the ablility to ping the inside network from RA Client. The first two NAT rules are the dynamic rules that you ask for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current NATS:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic DukeLAN interface description Allow Inside Access to the Outside&lt;BR /&gt;nat (dmz1,outside) source dynamic DMZ1-Network interface description Allow DMZ1 Access to the Outside&lt;BR /&gt;nat (dmz1,outside) source static DMZ1-Network DMZ1-Network destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN description For DMZ VPN Split tunnel&lt;BR /&gt;nat (inside,outside) source static DukeLAN DukeLAN destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN route-lookup description For Inside VPN Split tunnel&lt;BR /&gt;nat (dmz1,inside) source static any any destination static DukeLAN DukeLAN description Allow access for DukeLAN to DMZ1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic DukeLAN interface description Allow Inside Access to the Outside&lt;BR /&gt;translate_hits = 7631, untranslate_hits = 681&lt;BR /&gt;Source - Origin: 144.244.244.0/24, Translated: 107.142.207.220/22&lt;BR /&gt;2 (dmz1) to (outside) source dynamic DMZ1-Network interface description Allow DMZ1 Access to the Ouside&lt;BR /&gt;translate_hits = 10, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 144.168.0.0/24, Translated: 107.142.207.220/22&lt;BR /&gt;3 (dmz1) to (outside) source static DMZ1-Network DMZ1-Network destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN description For DMZ VPN Split tunnel&lt;BR /&gt;translate_hits = 2, untranslate_hits = 2&lt;BR /&gt;Source - Origin: 144.168.0.0/24, Translated: 144.168.0.0/24&lt;BR /&gt;Destination - Origin: 124.140.1.0/24, Translated: 124.140.1.0/24&lt;BR /&gt;4 (inside) to (outside) source static DukeLAN DukeLAN destination static Obj-Remote-IPSEC-VPN Obj-Remote-IPSEC-VPN route-lookup description For Inside VPN Split tunnel&lt;BR /&gt;translate_hits = 28, untranslate_hits = 28&lt;BR /&gt;Source - Origin: 144.244.244.0/24, Translated: 144.244.244.0/24&lt;BR /&gt;Destination - Origin: 124.140.1.0/24, Translated: 124.140.1.0/24&lt;BR /&gt;5 (dmz1) to (inside) source static any any destination static DukeLAN DukeLAN description Allow access for DukeLAN to DMZ1&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 0.0.0.0/0, Translated: 0.0.0.0/0&lt;BR /&gt;Destination - Origin: 144.244.244.0/24, Translated: 144.244.244.0/24&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 03:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459954#M1083349</guid>
      <dc:creator>Stevan44</dc:creator>
      <dc:date>2021-09-05T03:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459963#M1083350</link>
      <description>Is it working now? If not check your acls and the routing. Try to do packet&lt;BR /&gt;trace to see what's going on&lt;BR /&gt;&lt;BR /&gt;***** please remember to rate useful posts&lt;BR /&gt;</description>
      <pubDate>Sun, 05 Sep 2021 05:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459963#M1083350</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-05T05:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459968#M1083351</link>
      <description>&lt;P&gt;No its not working. Egress route is still going to the outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't remove route-lookup from the 4th NAT rule it breaks the ablility to ping the inside network from RA Client. The first two NAT rules are the dynamic rules that you ask for.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 06:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459968#M1083351</guid>
      <dc:creator>Stevan44</dc:creator>
      <dc:date>2021-09-05T06:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459975#M1083352</link>
      <description>Have you done what I mentioned about packet-trace, acls, routing?&lt;BR /&gt;</description>
      <pubDate>Sun, 05 Sep 2021 06:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4459975#M1083352</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2021-09-05T06:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4460020#M1083356</link>
      <description>&lt;P&gt;Yes, that's how I'm able to see whats going on. This link explains the issue abut i have not been able to come up with the correct NAT command to fix the issue.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.fir3net.com/Firewalls/Cisco/cisco-asa-traffic-sent-out-incorrect-interface-due-to-nat-rule.html" target="_blank"&gt;https://www.fir3net.com/Firewalls/Cisco/cisco-asa-traffic-sent-out-incorrect-interface-due-to-nat-rule.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://resources.intenseschool.com/cisco-asa-packet-flow-egress-interface-determination/" target="_blank"&gt;http://resources.intenseschool.com/cisco-asa-packet-flow-egress-interface-determination/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far you have clean up the NAT's but the problem remains.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 12:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4460020#M1083356</guid>
      <dc:creator>Stevan44</dc:creator>
      <dc:date>2021-09-05T12:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4460045#M1083358</link>
      <description>&lt;P&gt;I have it working for the inside. Inside cann now access DMZ1 assets by adding this line:&lt;/P&gt;&lt;P&gt;nat (Inside,DMZ1) after-auto source static DukeLAN DMZ1-Network destination static DMZ1-Network DMZ1-Network no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I just have to fix RA VPN access to DMZ.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 15:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4460045#M1083358</guid>
      <dc:creator>Stevan44</dc:creator>
      <dc:date>2021-09-05T15:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Egress Interface is not sending to the correct direction</title>
      <link>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4460058#M1083361</link>
      <description>&lt;P&gt;I couldn't seem to get RA VPN to talk to DMZ1 even after adding this NAT:&lt;/P&gt;&lt;P&gt;nat (Outside,DMZ1) after-auto source static Obj-Remote-IPSEC-VPN DMZ1-Network destination static DMZ1-Network DMZ1-Network no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traffic keeps going to the outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I remember to turn off split tunnel for RA VPN client. Now its using the correct interface to access the DMZ1&lt;/P&gt;</description>
      <pubDate>Sun, 05 Sep 2021 16:25:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/egress-interface-is-not-sending-to-the-correct-direction/m-p/4460058#M1083361</guid>
      <dc:creator>Stevan44</dc:creator>
      <dc:date>2021-09-05T16:25:38Z</dc:date>
    </item>
  </channel>
</rss>

