<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I need to make two ACL from in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926231#M157232</link>
    <description>&lt;P&gt;I need to make two ACL from DMZ&amp;nbsp; to fix the issue&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
    <pubDate>Sat, 02 Jul 2016 04:12:11 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2016-07-02T04:12:11Z</dc:date>
    <item>
      <title>Nat reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926222#M157206</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have config&amp;nbsp; bidirectional &amp;nbsp;ACL from inside to DMZ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;inside(10.71.35.245)----ASA-----DMZ(192.168.134.33) port 389&lt;/P&gt;
&lt;P&gt;packet tracer works fine&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;and now I config ACL&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DMZ(192.168.134.33)----------ASA-----------inside(10.71.35.245) port 51173&lt;/P&gt;
&lt;P&gt;packet tracer shows&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;#&amp;nbsp; packet-tracer input dmz tcp&amp;nbsp; 192.168.134.33&amp;nbsp; 1024 10.71.3$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.71.35.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.134.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; dmz&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group dmz in interface dmz&lt;BR /&gt;access-list dmz extended permit tcp host 192.168.134.33 10.71.35.245 eq 51173 log&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,dmz) 192.168.134.72 10.71.35.245 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host10.71.35.245 dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.134.72&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 58509, untranslate_hits = 749704&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926222#M157206</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T07:58:03Z</dc:date>
    </item>
    <item>
      <title>Hi Maesh,</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926223#M157208</link>
      <description>&lt;P&gt;Hi Maesh,&lt;/P&gt;
&lt;P&gt;The problem is related to the nat rules in place:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- You are telling the ASA that when&amp;nbsp;&amp;nbsp; inside host 10.71.35.245 tries to reach something on the dmz network, the host will be translated to 192.168.134.72. That is fine, the only inconvenient that you face is that when some host on the dmz&amp;nbsp; tries to reach inside host 10.71.35.245 using its real ip address (the 10.71.35.245) the asa will check the the original path and the returning path&amp;nbsp; to make sure the nat and routing is symmetric, so&amp;nbsp; the scenario will&amp;nbsp; look like this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-From DMZ host 192.168.134.33 is trying to reach host 10.71.35.245&lt;/P&gt;
&lt;P&gt;At this phase the&amp;nbsp; firewall will check routing and ACL in place, it will forward the traffic towards the inside using the following information:&lt;/P&gt;
&lt;P&gt;source 192.168.134.33&lt;/P&gt;
&lt;P&gt;destination 10.71.35.245&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-On the inside side host 10.71.35.245 will receive the traffic and it will respond to the dmz host and it will send the traffic to the ASA with the following information&lt;/P&gt;
&lt;P&gt;source 10.71.35.245&lt;/P&gt;
&lt;P&gt;destination 192.168.134.33&lt;/P&gt;
&lt;P&gt;-At this point the packet enters the inside interface and the ASA starts checking routing, nat and acl information for host 10.71.35.245, and he realizes that there is a nat for that host when it goes to the dmz:&lt;/P&gt;
&lt;P&gt;static (inside,dmz) 192.168.134.72 10.71.35.245 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;So he will try to nat host 10.71.35.245, but then he also check his connection table and he realizes that the connection is like this:&lt;/P&gt;
&lt;P&gt;DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;S 192.168.134.33 --- &amp;gt; D 10.71.35.245&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what the ASA will expect as a reply or return traffic is the following:&lt;/P&gt;
&lt;P&gt;Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;
&lt;P&gt;S 10.71.35.245 --&amp;gt; D 192.168.134.33&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However the nat is telling the ASA to translate host 10.71.35.245 to 192.168.134.72&lt;/P&gt;
&lt;P&gt;So the attempted reply will look like this&lt;/P&gt;
&lt;P&gt;S 192.168.134.72 (10.71.35.245 NAT´D IP) ---&amp;gt; D 192.168.134.33&lt;/P&gt;
&lt;P&gt;The ASA realizes that the above is a different from what he is expecting the connection to be, the communication is meant&amp;nbsp; between host 10.71.35.245 and 192.168.134.33 not between 192.168.134.72&amp;nbsp; (10.71.35.245 NAT´D IP) and 192.168.134.33, for that reason he notices that the return traffic flow is not the same and drops the packet.&lt;/P&gt;
&lt;P&gt;In order to fix this, if you need to access from the DMZ side the inside host using its real ip address wich is 10.71.35.245 you will need to build another&amp;nbsp; nat.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For example&lt;/P&gt;
&lt;P&gt;access-list inhost permit ip host 10.71.35.245 host 192.168.134.33&lt;/P&gt;
&lt;P&gt;static (inside,dmz)&amp;nbsp; 10.71.35.245 access-list inhost&lt;/P&gt;
&lt;P&gt;Make sure that the given rule is above of the following nat:&lt;/P&gt;
&lt;P&gt;static (inside,dmz) 192.168.134.72 10.71.35.245 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 20:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926223#M157208</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2016-06-29T20:14:20Z</dc:date>
    </item>
    <item>
      <title>Thanks for very great and</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926224#M157211</link>
      <description>&lt;P&gt;Thanks for very great and detailed explanation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I already have ACL from DMZ to inside that allows source 192.168.134.33 to access inside host 10.71.35.245.&lt;/P&gt;
&lt;P&gt;This ACL is applied on DMZ interface.&lt;/P&gt;
&lt;P&gt;Which nat config should I use?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 00:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926224#M157211</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-06-30T00:07:22Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh,</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926225#M157213</link>
      <description>&lt;P&gt;Hi Mahesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You are very welcome!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Take the following NAT as an example:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list inhost permit ip host 10.71.35.245 host 192.168.134.33&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This acl is not applied in any interface, its purpose is to tell the ASA to not translate the inside host 10.71.34.245 only when is trying to communicate with 192.168.134.33.&lt;/P&gt;
&lt;P&gt;static (inside,dmz)&amp;nbsp; 10.71.35.245 &lt;STRONG&gt;access-list inhost&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This type of nat is called static policy nat&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 00:31:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926225#M157213</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2016-06-30T00:31:16Z</dc:date>
    </item>
    <item>
      <title>so if I use this ACL and NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926226#M157216</link>
      <description>&lt;P&gt;so if I use this ACL and NAT then it should not cause any outage if traffic is flowing between host servers in DMZ&lt;/P&gt;
&lt;P&gt;and inside right?&lt;/P&gt;
&lt;P&gt;Another way&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1&amp;gt;Can I use the ACL from DMZ&amp;nbsp; to inside where destination IP is 192.168.34.72 instead of 10.71.35.245?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;current NAT for traffic flow from&amp;nbsp; inside to DMZ where packet tracer works fine is&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,dmz) 192.168.134.72 10.71.35.245 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host 10.71.35.245 dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.134.72&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 58509, untranslate_hits = 749693&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.71.35.245/0 to 192.168.134.72/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,outside) 192.168.134.72 10.71.35.245 netmask 255.255.255.255&lt;BR /&gt;&amp;nbsp; match ip inside host 10.71.35.245 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.134.72&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 472116636, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: dmz&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;is there any nat config that I can use instead of using that ACL?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 00:52:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926226#M157216</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-06-30T00:52:34Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh,</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926227#M157219</link>
      <description>&lt;P&gt;Hi Mahesh,&lt;/P&gt;
&lt;P&gt;The nat should not cause an outage since is only meant betweent the specific inside and Dmz host.&lt;/P&gt;
&lt;P&gt;The packet looks fine because in that example the connection is sourced by the inside, another thing you could do is try to access from the DMZ the 192.168.34.72 instead of the real ip address which is 10.71.35.245&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 13:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926227#M157219</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2016-06-30T13:37:53Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926228#M157223</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From inside to DMZ all is ok.&lt;/P&gt;
&lt;P&gt;Can I use this ACL for traffic flow from DMZ to inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1&amp;gt;Can I use the ACL from DMZ&amp;nbsp; to inside where destination IP is 192.168.34.72 instead of 10.71.35.245?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 13:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926228#M157223</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-06-30T13:59:27Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh,</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926229#M157225</link>
      <description>&lt;P&gt;Hi Mahesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes you can try that &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 19:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926229#M157225</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2016-06-30T19:11:58Z</dc:date>
    </item>
    <item>
      <title>try that still no luck.</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926230#M157228</link>
      <description>&lt;P&gt;try that still no luck.&lt;/P&gt;
&lt;P&gt;when I try the policy nat it shows that address is used in static nat?&lt;/P&gt;
&lt;P&gt;Is there any other way I can fix this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2016 01:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926230#M157228</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-07-01T01:08:24Z</dc:date>
    </item>
    <item>
      <title>I need to make two ACL from</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926231#M157232</link>
      <description>&lt;P&gt;I need to make two ACL from DMZ&amp;nbsp; to fix the issue&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sat, 02 Jul 2016 04:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/2926231#M157232</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-07-02T04:12:11Z</dc:date>
    </item>
  </channel>
</rss>

