<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa reverse path check and policy routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863189#M1102040</link>
    <description>&lt;P&gt;i know about reason. just wanted to know if there is a way for asa urpf to be aware of pbr and see this as legitimate setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 27 Jun 2023 13:13:56 GMT</pubDate>
    <dc:creator>DraganSkundric87318</dc:creator>
    <dc:date>2023-06-27T13:13:56Z</dc:date>
    <item>
      <title>asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863118#M1102035</link>
      <description>&lt;P&gt;imagine basic asa setup with two outside interfaces, two providers, and one inside interface. I have route map that route traffic from one inside ip to provider 2 and default route to provider 1. If I implement reverse path check, asa uses routing table as reference point and I have problem with traffic from provider 2. Is there a solution to this that is implementable on asa?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 11:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863118#M1102035</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2023-06-27T11:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863162#M1102038</link>
      <description>&lt;P&gt;You should not configure uRPF on ASA on those outside interfaces, because uRPF doesn't make any sense in this scenario. Both outside interfaces can be used to access any Internet IP address, hence traffic from any IP address can come back through both of the interfaces. In a certain sense this is equivalent to two default routes, so uRPF doesn't add any value here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 12:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863162#M1102038</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-06-27T12:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863188#M1102039</link>
      <description>&lt;P&gt;you have asymmetric routing that why uRPF is drop packet&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 13:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863188#M1102039</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-27T13:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863189#M1102040</link>
      <description>&lt;P&gt;i know about reason. just wanted to know if there is a way for asa urpf to be aware of pbr and see this as legitimate setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 13:13:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863189#M1102040</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2023-06-27T13:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863193#M1102042</link>
      <description>&lt;P&gt;if you use ECMP then I think this issue will solve&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 13:24:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863193#M1102042</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-27T13:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863228#M1102047</link>
      <description>&lt;P&gt;Theoretically, PBR could mark flow to exempt returning packets from uRPF check, but this has never been implemented.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 14:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863228#M1102047</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-06-27T14:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863231#M1102048</link>
      <description>&lt;P&gt;Can you check NAT' if the traffic not NATing correctly then this can lead to asymmetric.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 14:03:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863231#M1102048</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-27T14:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863298#M1102059</link>
      <description>&lt;P&gt;I don't believe there is a fix for that, however, if you want to send the traffic from a specific endpoint on the inside out of provider 2 why not to create a NAT rule for that specific endpoint and map it to the ASA interface connected to provider 2?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 15:24:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863298#M1102059</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-27T15:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863650#M1102070</link>
      <description>&lt;P&gt;but urpf will still see return traffic from&amp;nbsp; internet IPs on interface 2 while routing table has route for them on interface 1 and reverse deny this traffic ... I guess&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 06:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863650#M1102070</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2023-06-28T06:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863734#M1102077</link>
      <description>&lt;P&gt;I think he use FW behind Edge router and Edge router doing NATing, and I am with you NATing can solve issue here,&amp;nbsp;&lt;BR /&gt;instead of NATing only in edge router he can NATing to link between FW and Edge router and in Edge router he can NATing again from private to public.&amp;nbsp;&lt;BR /&gt;I ask him about NATing let see his answer&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 09:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863734#M1102077</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-28T09:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863739#M1102078</link>
      <description>&lt;P&gt;No NATing is workaround that solve your issue'&lt;/P&gt;
&lt;P&gt;The edge router without NATing&lt;/P&gt;
&lt;P&gt;Have route to FW inside via two path and it select one that make urpf drop packet in FW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we NATing then edge router will send traffic to direct connect link and hence the FW recieve traffic in correct OUTside interface and urpf not drop traffic&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 09:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863739#M1102078</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-28T09:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863742#M1102079</link>
      <description>&lt;P&gt;i have edge routers toward both providers where I am doing NAT. ok, there is work arround to connect both providers to same asa interface and do some chemistry there and move urpf/async path from asa&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 09:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863742#M1102079</guid>
      <dc:creator>DraganSkundric87318</dc:creator>
      <dc:date>2023-06-28T09:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863751#M1102082</link>
      <description>&lt;P&gt;The issue not edge router with ISP&lt;/P&gt;
&lt;P&gt;The isse is FW and edge router'&lt;/P&gt;
&lt;P&gt;If we NATing in FW this make edge router forward traffic to correct direct connect link.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 09:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863751#M1102082</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-28T09:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863759#M1102086</link>
      <description>&lt;P&gt;Alternatively, you can just remove the uRPF from the firewalls and configure an access list on the edge routers interfaces that are facing the ISPs to deny the incoming RFC1918 ranges allowing everything else. That will drop any private IP addresses in inbound and it won't affect VPN as the VPN traffic would be encrypted when it passes through the edge routers.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jun 2023 09:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/4863759#M1102086</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2023-06-28T09:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: asa reverse path check and policy routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/5244820#M1118633</link>
      <description>&lt;P&gt;Did you try traffic zones? I believe that is one of the purposes of traffic zones but I could be wrong.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 16:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-path-check-and-policy-routing/m-p/5244820#M1118633</guid>
      <dc:creator>ajwallace</dc:creator>
      <dc:date>2025-01-08T16:01:42Z</dc:date>
    </item>
  </channel>
</rss>

