<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845131#M172885</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;In this example, the route to 1.1.1.1 should not be via 'INTERFACE'. 'INTERFACE' is actually where 2.2.2.2 is directly connected downstream on a distribution switch.&lt;/P&gt;
&lt;P&gt;The route to&amp;nbsp;1.1.1.1&amp;nbsp;should be via the OUTSIDE interface, and there is a default route for this in place.&lt;/P&gt;
&lt;P&gt;Any ideas? Im a bit confused!&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
    <pubDate>Mon, 01 Feb 2016 14:35:50 GMT</pubDate>
    <dc:creator>drbabbers</dc:creator>
    <dc:date>2016-02-01T14:35:50Z</dc:date>
    <item>
      <title>Reverse path check error?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845129#M172883</link>
      <description>&lt;P&gt;All,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I am getting the following error message on my firewall:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1&amp;nbsp;Feb 01 2016&amp;nbsp;12:19:36&amp;nbsp;106021&amp;nbsp;1.1.1.1&amp;nbsp;&amp;nbsp;2.2.2.2&amp;nbsp;&amp;nbsp;Deny ICMP reverse path check from 1.1.1.1 to 2.2.2.2 on interface INTERFACE&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am struggling to see anything obvious at fault. I have access lists that permit the traffic, however I don't think that is the issue as there is no deny error.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Any ideas how I can begin to troubleshoot this?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;D&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845129#M172883</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2019-03-12T07:13:23Z</dc:date>
    </item>
    <item>
      <title>This happens when the route</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845130#M172884</link>
      <description>&lt;P&gt;This happens when the route for 1.1.1.1 is not via INTERFACE.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2016 12:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845130#M172884</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-01T12:28:58Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845131#M172885</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;In this example, the route to 1.1.1.1 should not be via 'INTERFACE'. 'INTERFACE' is actually where 2.2.2.2 is directly connected downstream on a distribution switch.&lt;/P&gt;
&lt;P&gt;The route to&amp;nbsp;1.1.1.1&amp;nbsp;should be via the OUTSIDE interface, and there is a default route for this in place.&lt;/P&gt;
&lt;P&gt;Any ideas? Im a bit confused!&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2016 14:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845131#M172885</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-02-01T14:35:50Z</dc:date>
    </item>
    <item>
      <title>I don't think I can work this</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845132#M172886</link>
      <description>&lt;P&gt;I don't think I can work this out without seeing the output of "show route" and knowing the actual IP addresses reported in the error.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Feb 2016 19:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845132#M172886</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-01T19:24:54Z</dc:date>
    </item>
    <item>
      <title>This was down to the network</title>
      <link>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845133#M172887</link>
      <description>&lt;P&gt;This was down to the network in question having the wrong subnet mask (/24 instead of a /25)&amp;nbsp;and as a result being advertised via the wrong interface! Once the network was advertised with the /25 mask by our MPLS provider, everything worked fine.&lt;/P&gt;
&lt;P&gt;Thanks for the help.&lt;/P&gt;
&lt;P&gt;D&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2016 10:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-path-check-error/m-p/2845133#M172887</guid>
      <dc:creator>drbabbers</dc:creator>
      <dc:date>2016-02-02T10:45:16Z</dc:date>
    </item>
  </channel>
</rss>

