<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Jouni, The ASA Version is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579368#M202789</link>
    <description>&lt;P&gt;Hi Jouni,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA Version is 9.1(1), ASDM Version 7.1(1).&lt;/P&gt;&lt;P&gt;It states that 'Static' command has now been deprecated, what would be the new command to enter? Its not very often i go into the command line, majority of the configuration/maintenance is done through ASDM.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Dec 2014 09:45:38 GMT</pubDate>
    <dc:creator>Adam Handley</dc:creator>
    <dc:date>2014-12-02T09:45:38Z</dc:date>
    <item>
      <title>Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579366#M202785</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a really annoying issue with Natting on a Cisco ASA Firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an Internal device which needs to talk to a device which is in the DMZ. The routing etc is fine, they can communicate with each other. The issue is, the device in the DMZ also needs external access so I have set it up with a NAT. Once i set it up with the NAT it allows external access but stops internal access. I get the following error:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2014-12-02 08:02:04 local4.notice 10.182.15.80&amp;nbsp; %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src Inside:10.182.16.45/61264 dst DMZ:192.168.150.60/24 denied due to NAT reverse path failure\n&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I can manipulate the advanced NAT settings to allow the two devices to speak but I&amp;nbsp;then lose external connection to the device in the DMZ.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas how I get away from this NAT reverse path failure?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:10:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579366#M202785</guid>
      <dc:creator>Adam Handley</dc:creator>
      <dc:date>2019-03-12T05:10:08Z</dc:date>
    </item>
    <item>
      <title>Hi, From the looks of it you</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579367#M202787</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the looks of it you are using a software level 8.2 (or below) on the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From what I gather you have configured a &lt;STRONG&gt;"nat"&lt;/STRONG&gt; statement for the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; interface which now catches both the Internet and the Internal traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Typically in this case you would have to configure a Static Identity NAT to avoid the connection attemps between the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; and &lt;STRONG&gt;"Inside"&lt;/STRONG&gt; from being matched to the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command you have added.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would assume it should look something like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,Inside) 192.168.150.0 192.168.150.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ofcourse the subnet address and the mask might be something different than above but that should be the format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we saw the current configuration we might be able to more accurately determine if there are any other problems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 09:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579367#M202787</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-12-02T09:15:30Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni, The ASA Version is</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579368#M202789</link>
      <description>&lt;P&gt;Hi Jouni,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA Version is 9.1(1), ASDM Version 7.1(1).&lt;/P&gt;&lt;P&gt;It states that 'Static' command has now been deprecated, what would be the new command to enter? Its not very often i go into the command line, majority of the configuration/maintenance is done through ASDM.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 09:45:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579368#M202789</guid>
      <dc:creator>Adam Handley</dc:creator>
      <dc:date>2014-12-02T09:45:38Z</dc:date>
    </item>
    <item>
      <title>Hi, Ok, so you are actually</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579369#M202791</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, so you are actually using the newer software with the new NAT configuration format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well then it seems like you have possibly missconfigured some Dynamic NAT/PAT rule since in the newer softwares (8.3 and above) there is no real need to configure any NAT that would apply between internal interfaces (like LAN &amp;lt;-&amp;gt; DMZ). NAT is typically only configured referencing an internal and external interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would really need to see the output of&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and possibly if the used &lt;STRONG&gt;"object" &lt;/STRONG&gt;and &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; dont describe the subnet configured under them I would need some outputs from those objects&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for example if you want to list all the &lt;STRONG&gt;"object" &lt;/STRONG&gt;and &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; then you can use&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run object network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run object-group network&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or&amp;nbsp; if you want&amp;nbsp; to view the configurations of specific objects then you can use&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run object id &amp;lt;object name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run object-group id &amp;lt;object name&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess it might be possible that you have configured a Dynamic translation and used &lt;STRONG&gt;"any" &lt;/STRONG&gt;parameter in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; commands which would cause this behaviour.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 09:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579369#M202791</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-12-02T09:59:24Z</dc:date>
    </item>
    <item>
      <title>#Show run natobject network</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579370#M202802</link>
      <description>&lt;P&gt;#Show run nat&lt;/P&gt;&lt;P&gt;object network Sophos_Encrypt&lt;BR /&gt;&amp;nbsp;nat (Inside,DMZ) static 217.16.11.52&lt;/P&gt;&lt;P&gt;This is the one that affects whether i can get internal or external access. If I&amp;nbsp;leave it on (Any, Any) then it allows external access only. If i have it on (Inside, DMZ) then it allows internal access only.&amp;nbsp;&lt;/P&gt;&lt;P&gt;#sh run object id Sophos_Encrypt&lt;BR /&gt;object network Sophos_Encrypt&lt;BR /&gt;&amp;nbsp;host 192.168.150.60&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 10:09:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579370#M202802</guid>
      <dc:creator>Adam Handley</dc:creator>
      <dc:date>2014-12-02T10:09:09Z</dc:date>
    </item>
    <item>
      <title>Hi, The above NAT</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579371#M202803</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The above NAT configuration does Static NAT from &lt;STRONG&gt;"Inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt;. It translates a private &lt;STRONG&gt;"Inside"&lt;/STRONG&gt; address to a public IP address towards &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unless there is some specific need I would suggest not doing any NAT between &lt;STRONG&gt;"Inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unless the NAT configuration is large could you share the whole NAT configuration (remove any sensitive information)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also need a specific description on which kind of translations you want to achieve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example a typical small setup with LAN and DMZ might follow the below logic in its NAT configurations&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Dynamic PAT for all Internal interfaces (LAN&amp;amp;DMZ) towards the external network&lt;/LI&gt;&lt;LI&gt;Static NAT or Static PAT configurations from DMZ (or LAN) towards the external network&lt;/LI&gt;&lt;LI&gt;No NAT configurations between internal interfaces&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets say you had requirement for only Dynamic PAT for all internal subnets and one Static NAT for the DMZ then the configuration might look like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Dynamic PAT&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Static NAT&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-DMZ&lt;BR /&gt;&amp;nbsp; host &amp;lt;internal ip&amp;gt;&lt;BR /&gt;&amp;nbsp; nat (dmz,outside) static &amp;lt;public ip&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the above the Dynamic PAT would guarantee that any host behind the internal interfaces would have a translation rule. The Static NAT configuration would bind one DMZ hosts internal IP address to a public IP address towards the external network only. This would enable accessing the server from external network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 11:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579371#M202803</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-12-02T11:23:00Z</dc:date>
    </item>
    <item>
      <title>Thanks Jouni, really</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579372#M202805</link>
      <description>&lt;P&gt;Thanks Jouni, really appreciate the help. The Static NAT section at the bottom was the key. (dmz, outside). I was sure i had tried that combination. tried it again and i am now able to get internal and external communication to the device in the DMZ.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate the help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 11:51:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2579372#M202805</guid>
      <dc:creator>Adam Handley</dc:creator>
      <dc:date>2014-12-02T11:51:55Z</dc:date>
    </item>
  </channel>
</rss>

