<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA reverse NAT failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702286#M193528</link>
    <description>&lt;P&gt;I have a customer that has had issue with RDP.&amp;nbsp; They try to RDP from 10.10.32.20 (LAN) to 10.1.2.248 (VPN external).&amp;nbsp; I pulled the following from the logs:&lt;/P&gt;&lt;P&gt;Jul 21 2015 12:54:08: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src outside:10.1.2.248/52943 dst outside:10.190.22.160/59894 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;# sh run nat&lt;BR /&gt;nat (outside) 0 access-list nonat_outside_VPN&lt;BR /&gt;nat (outside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (InsideCET) 0 access-list InsideCET_nat0_outbound&lt;BR /&gt;nat (InsideCET) 99 access-list NAT-MAIL-OUT&lt;BR /&gt;nat (InsideCET) 1 10.250.1.0 255.255.255.0&lt;BR /&gt;nat (InsideCET) 1 172.16.12.0 255.255.255.0&lt;BR /&gt;nat (InsideCET) 1 10.1.0.0 255.255.0.0&lt;BR /&gt;nat (InsideCET) 1 10.10.0.0 255.255.0.0&lt;BR /&gt;nat (InsideCET) 1 10.200.0.0 255.255.0.0&lt;BR /&gt;nat (InsideCET) 1 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;#sh run global&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 99 69.170.x.x&lt;/P&gt;&lt;P&gt;Is there something missing here or is more information required for help reviewing?&amp;nbsp; Do I need to post my ACL's?&lt;/P&gt;&lt;P&gt;Appreciate the assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:18:38 GMT</pubDate>
    <dc:creator>jwilder01</dc:creator>
    <dc:date>2019-03-12T06:18:38Z</dc:date>
    <item>
      <title>ASA reverse NAT failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702286#M193528</link>
      <description>&lt;P&gt;I have a customer that has had issue with RDP.&amp;nbsp; They try to RDP from 10.10.32.20 (LAN) to 10.1.2.248 (VPN external).&amp;nbsp; I pulled the following from the logs:&lt;/P&gt;&lt;P&gt;Jul 21 2015 12:54:08: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src outside:10.1.2.248/52943 dst outside:10.190.22.160/59894 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;# sh run nat&lt;BR /&gt;nat (outside) 0 access-list nonat_outside_VPN&lt;BR /&gt;nat (outside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (InsideCET) 0 access-list InsideCET_nat0_outbound&lt;BR /&gt;nat (InsideCET) 99 access-list NAT-MAIL-OUT&lt;BR /&gt;nat (InsideCET) 1 10.250.1.0 255.255.255.0&lt;BR /&gt;nat (InsideCET) 1 172.16.12.0 255.255.255.0&lt;BR /&gt;nat (InsideCET) 1 10.1.0.0 255.255.0.0&lt;BR /&gt;nat (InsideCET) 1 10.10.0.0 255.255.0.0&lt;BR /&gt;nat (InsideCET) 1 10.200.0.0 255.255.0.0&lt;BR /&gt;nat (InsideCET) 1 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;#sh run global&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 99 69.170.x.x&lt;/P&gt;&lt;P&gt;Is there something missing here or is more information required for help reviewing?&amp;nbsp; Do I need to post my ACL's?&lt;/P&gt;&lt;P&gt;Appreciate the assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702286#M193528</guid>
      <dc:creator>jwilder01</dc:creator>
      <dc:date>2019-03-12T06:18:38Z</dc:date>
    </item>
    <item>
      <title>The line:</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702287#M193529</link>
      <description>&lt;P&gt;The line:&lt;/P&gt;

&lt;PRE&gt;
     &lt;SPAN style="font-size: 14.3999996185303px;"&gt;nat (InsideCET) 1 10.1.0.0 255.255.0.0&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;...includes the destination address (10.1.2.248). Can you tell us if the access-list "nonat_outside_VPN" has a more specific subnet defined within the 10.1.0.0/16 subnet?&lt;/P&gt;
&lt;P&gt;A packet-tracer output would help. Try this:&lt;/P&gt;

&lt;PRE&gt;
     packet-tracer input InsideCNET tcp 10.10.32.20 1025 10.1.2.248 389&lt;/PRE&gt;</description>
      <pubDate>Tue, 21 Jul 2015 20:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702287#M193529</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-21T20:56:11Z</dc:date>
    </item>
    <item>
      <title>Marvin,Here is the packet</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702288#M193530</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;&lt;P&gt;Here is the packet tracer:&lt;/P&gt;&lt;P&gt;# packet-tracer input InsideCET tcp 10.10.32.20 1025 10.1.2.248 389&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.1.2.248&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group InsideCET_access_in in interface InsideCET&lt;BR /&gt;access-list InsideCET_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT-EXEMPT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;&amp;nbsp; match ip InsideCET 10.0.0.0 255.0.0.0 outside 10.1.2.192 255.255.255.192&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 29843, untranslate_hits = 297575&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (InsideCET) 1 10.10.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp; match ip InsideCET 10.10.0.0 255.255.0.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (64.x.x.x [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7666989, untranslate_hits = 590795&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (InsideCET) 1 10.10.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp; match ip InsideCET 10.10.0.0 255.255.0.0 outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (64.x.x.x [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 7666990, untranslate_hits = 590795&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: HQF&lt;BR /&gt;Subtype: hierarchical-queueing&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip outside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (64.x.x.x [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 297872, untranslate_hits = 1&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 33102180, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: InsideCET&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is NONAT info:&lt;/P&gt;&lt;P&gt;access-list nonat_outside_VPN extended permit ip 10.254.254.0 255.255.255.0 10.1.2.192 255.255.255.192&lt;BR /&gt;access-list nonat_outside_VPN extended permit ip 10.1.2.192 255.255.255.192 10.254.254.0 255.255.255.0&lt;BR /&gt;access-list nonat_outside_VPN extended permit ip 10.1.2.192 255.255.255.192 10.1.2.192 255.255.255.192&lt;BR /&gt;access-list nonat_outside_VPN extended permit ip 10.254.254.0 255.255.255.0 10.254.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2015 21:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702288#M193530</guid>
      <dc:creator>jwilder01</dc:creator>
      <dc:date>2015-07-21T21:03:04Z</dc:date>
    </item>
    <item>
      <title>Sorry - I was focusing on</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702289#M193531</link>
      <description>&lt;P&gt;Sorry - I was focusing on your config, not the syslog message.&lt;/P&gt;
&lt;P&gt;The error message indicates:&lt;/P&gt;

&lt;PRE&gt;
&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Connection for udp &lt;STRONG&gt;&lt;SPAN style="color:#FF0000;"&gt;src outside:10.1.2.248&lt;/SPAN&gt;&lt;/STRONG&gt;/52943 dst outside:10.190.22.160/59894 denied due to NAT reverse path failure&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;That indicates a failing source IP address is outside, not inside on the LAN. The flow from VPN to LAN should work per the packet-tracer above.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2015 12:58:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702289#M193531</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-22T12:58:12Z</dc:date>
    </item>
    <item>
      <title>Are there other things to</title>
      <link>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702290#M193532</link>
      <description>&lt;P&gt;Are there other things to look at on the ASA that may impact RDP from the 10.10.32.20 to the VPN client?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2015 14:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-reverse-nat-failure/m-p/2702290#M193532</guid>
      <dc:creator>jwilder01</dc:creator>
      <dc:date>2015-07-22T14:46:47Z</dc:date>
    </item>
  </channel>
</rss>

