<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070310#M146185</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ive worked it out thanks for the help .&amp;nbsp; ......... the nat rule was outside to inside but the device we were going to was on a dmz interface so i changed the nat to outside to dmz ... ....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Wed, 01 Mar 2017 11:23:55 GMT</pubDate>
    <dc:creator>manuscript1</dc:creator>
    <dc:date>2017-03-01T11:23:55Z</dc:date>
    <item>
      <title>reverse path verify deny</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070308#M146181</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;getting a deny on a packet going external to my dmz.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;we have recently added "ip reverse path verify " on the dmz and outside interfaces of the asa - but on no other interfaces.&lt;/P&gt;
&lt;P&gt;I dont want to remove this command for anti-spoofing .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The error we have is:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;deny tcp reverse path check from 60.x.x.x to 10.129.1.177 on interface inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the 60 address is the internet , the 10.129.1.177 is on the dmz. ( so not sure why its even going near the&amp;nbsp; inside interface )&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I understand these issues are usually routing table errors ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;relevant routing table edited is :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;0.0.0.0 0.0.0.0 via 7.7.7.7 outside&lt;/P&gt;
&lt;P&gt;10.0.0.0 255.0.0.0 via x.x.x.x inside&lt;/P&gt;
&lt;P&gt;10.129.1.128&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.128&amp;nbsp; is directly connected in DMZ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;is it the generic 10.x.x.x 255.0.0.0 on the inside interface causing this ?&amp;nbsp;&amp;nbsp;&amp;nbsp; I cannot add a more specific route as the route is directly connected .&lt;/P&gt;
&lt;P&gt;any advice given would be great !&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thank you&lt;/P&gt;
&lt;H1 style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Segoe UI','sans-serif'; color: black;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Segoe UI','sans-serif'; color: black;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin-bottom: .0001pt; line-height: normal; text-autospace: none;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Segoe UI','sans-serif'; color: black;"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:59:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070308#M146181</guid>
      <dc:creator>manuscript1</dc:creator>
      <dc:date>2019-03-12T08:59:30Z</dc:date>
    </item>
    <item>
      <title>Make sure the associated NAT</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070309#M146183</link>
      <description>&lt;P&gt;Make sure the associated NAT rule is specific (i.e. no "any" interface keyword) and that a packet-tracer shows you are hitting that particular rule.&lt;/P&gt;
&lt;P&gt;You may also need to append "route-lookup" to the rule to eliminate any confusion on the ASA's part.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 02:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070309#M146183</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-01T02:00:06Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070310#M146185</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ive worked it out thanks for the help .&amp;nbsp; ......... the nat rule was outside to inside but the device we were going to was on a dmz interface so i changed the nat to outside to dmz ... ....&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2017 11:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-verify-deny/m-p/3070310#M146185</guid>
      <dc:creator>manuscript1</dc:creator>
      <dc:date>2017-03-01T11:23:55Z</dc:date>
    </item>
  </channel>
</rss>

