<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mahesh,Glad you got it in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675457#M193799</link>
    <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Glad you got it resolved, thank for the ratings.&lt;/P&gt;&lt;P&gt;packet-tracer is your friend on the ASA. After seeing the TAC run it time and again during my time learning the platform, I decided they might know a thing or two and put it on my short list of go-to tools as well.&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jul 2015 02:35:25 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-07-17T02:35:25Z</dc:date>
    <item>
      <title>106021: Deny TCP reverse path check from</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675451#M193786</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC traffic ------Switch ----X int ASA-----y int ----server 172.31.50.55&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see below log when user try to access the server&lt;/P&gt;&lt;P&gt;106021: Deny TCP reverse path check from 192.168.100.25 to 172.31.50.55 on interface X&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it mean that ASA did not pass the traffic from interface X to Y as there is no return path to subnet 192.168.100.25?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675451#M193786</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T06:16:19Z</dc:date>
    </item>
    <item>
      <title>Mahesh,It could be routing</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675452#M193788</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;It could be routing but the most common cause is asymmetric NAT.&lt;/P&gt;&lt;P&gt;See what a packet-tracer tells you.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 03:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675452#M193788</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-16T03:52:00Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, For packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675453#M193790</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For packet tracer i can run from interface y to x to check the return traffic right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 04:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675453#M193790</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-07-16T04:48:57Z</dc:date>
    </item>
    <item>
      <title>Mahesh,Per the syntax Igor</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675454#M193792</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Per the syntax Igor posted, always run it to simulate the actual traffic as initiated from the end user (&lt;SPAN style="font-size: 14.3999996185303px;"&gt;192.168.100.25 in your case&lt;/SPAN&gt;).&lt;/P&gt;&lt;P&gt;The utility will use&amp;nbsp;its built in logic to check the reverse path&amp;nbsp;automatically.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 13:54:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675454#M193792</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-16T13:54:43Z</dc:date>
    </item>
    <item>
      <title>Example: packet-tracer input</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675455#M193793</link>
      <description>&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;packet-tracer input &lt;U&gt;&lt;EM&gt;X_int_name&lt;/EM&gt;&lt;/U&gt;&amp;nbsp;tcp&amp;nbsp;192.168.100.25&amp;nbsp;&amp;nbsp;&lt;EM&gt;&lt;U&gt;PCSource_port&lt;/U&gt;&lt;/EM&gt;&amp;nbsp;172.31.50.55 &lt;I&gt;&lt;U&gt;dst_port&lt;/U&gt;&lt;/I&gt;&amp;nbsp;detailed&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 14:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675455#M193793</guid>
      <dc:creator>Igor Mordiuk</dc:creator>
      <dc:date>2015-07-16T14:15:35Z</dc:date>
    </item>
    <item>
      <title>issue was with routing.</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675456#M193796</link>
      <description>&lt;P&gt;issue was with routing.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jul 2015 19:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675456#M193796</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2015-07-16T19:55:56Z</dc:date>
    </item>
    <item>
      <title>Mahesh,Glad you got it</title>
      <link>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675457#M193799</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Glad you got it resolved, thank for the ratings.&lt;/P&gt;&lt;P&gt;packet-tracer is your friend on the ASA. After seeing the TAC run it time and again during my time learning the platform, I decided they might know a thing or two and put it on my short list of go-to tools as well.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2015 02:35:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/106021-deny-tcp-reverse-path-check-from/m-p/2675457#M193799</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-07-17T02:35:25Z</dc:date>
    </item>
  </channel>
</rss>

