<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic denied due to NAT reverse path failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547204#M206192</link>
    <description>&lt;P&gt;I have seen lots about this, but none seen to match my issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an asa5550 with and inside, outside and DMZ network, hanging off the Inside i have an asa 5505 with my dabase network.&lt;/P&gt;&lt;P&gt;I can get to me db net from the inside, and via an outside nat from the outside. But no matter what I do I cannot get to it from the dmz. The db net can access the DMZ for dns and such, but i cannot originate contact from the DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am getting the following when conecting via the dmz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5 Oct 10 2014 13:02:29 305013 x.x.129.1 172.20.0.80 Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src web_dmz:x.x.129.1 dst inside:172.20.0.80 (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;path would be x.x.129.0 net -&amp;gt; 192.168.99.0 net -&amp;gt; 172.20.0.0 net&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;asa5550 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;asa5505&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:54:16 GMT</pubDate>
    <dc:creator>benningtonr</dc:creator>
    <dc:date>2019-03-12T04:54:16Z</dc:date>
    <item>
      <title>denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547204#M206192</link>
      <description>&lt;P&gt;I have seen lots about this, but none seen to match my issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an asa5550 with and inside, outside and DMZ network, hanging off the Inside i have an asa 5505 with my dabase network.&lt;/P&gt;&lt;P&gt;I can get to me db net from the inside, and via an outside nat from the outside. But no matter what I do I cannot get to it from the dmz. The db net can access the DMZ for dns and such, but i cannot originate contact from the DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am getting the following when conecting via the dmz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5 Oct 10 2014 13:02:29 305013 x.x.129.1 172.20.0.80 Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src web_dmz:x.x.129.1 dst inside:172.20.0.80 (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;path would be x.x.129.0 net -&amp;gt; 192.168.99.0 net -&amp;gt; 172.20.0.0 net&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;asa5550 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;asa5505&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:54:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547204#M206192</guid>
      <dc:creator>benningtonr</dc:creator>
      <dc:date>2019-03-12T04:54:16Z</dc:date>
    </item>
    <item>
      <title>Hi,Would you be able to share</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547205#M206193</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Would you be able to share the configuration from the ASA device ?&lt;/P&gt;&lt;P&gt;Also , try a packet trace from DMZ to the inside server ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2014 05:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547205#M206193</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-11T05:00:13Z</dc:date>
    </item>
    <item>
      <title>Well, the logg error states</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547206#M206194</link>
      <description>&lt;P&gt;Well, the logg error states it quite clearly.&amp;nbsp; You have two NAT statements that match the traffic and it would seem that these statements reference different interfaces.&lt;/P&gt;&lt;P&gt;As Vibhor has mentioned we would need to see your configuration in order to find the statement/s that are causing the issue.&amp;nbsp; Or you could try combing through your configuration yourself in order to find it.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2014 08:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547206#M206194</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-13T08:20:20Z</dc:date>
    </item>
    <item>
      <title>Here are the configs, the 99</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547207#M206195</link>
      <description>&lt;P&gt;Here are the configs, the 99.1 is the ouside/inside/DMZ&lt;/P&gt;&lt;P&gt;The 98.17 is the inside/inside behind the 99.1 inside network&lt;/P&gt;&lt;P&gt;I am getting the error on the 99.1 asa&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2014 11:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547207#M206195</guid>
      <dc:creator>benningtonr</dc:creator>
      <dc:date>2014-10-13T11:28:30Z</dc:date>
    </item>
    <item>
      <title>  Here is the packet trace</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547208#M206196</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the packet trace:&lt;/P&gt;&lt;P&gt;Access-List&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Type -&lt;/TD&gt;&lt;TD&gt;ACCESS-LIST&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Action -&lt;/TD&gt;&lt;TD&gt;ALLOW&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;A href="#"&gt;Show rule in Access Rules table. &lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Config&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Implicit Rule&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Info&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;MAC Access list&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Route-Lookup&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Type -&lt;/TD&gt;&lt;TD&gt;ROUTE-LOOKUP&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Action -&lt;/TD&gt;&lt;TD&gt;ALLOW&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Info&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;in 172.20.0.0 255.255.255.0 inside&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access-List&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Type -&lt;/TD&gt;&lt;TD&gt;ACCESS-LIST&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Action -&lt;/TD&gt;&lt;TD&gt;ALLOW&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;A href="#"&gt;Show rule in Access Rules table. &lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Config&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;access-group web_dmz_access_in in interface web_dmz&lt;BR /&gt;access-list web_dmz_access_in extended permit ip object-group DM_INLINE_NETWORK_13 object-group DM_INLINE_NETWORK_14&lt;BR /&gt;object-group network DM_INLINE_NETWORK_13&lt;BR /&gt;network-object host x.x.129.1&lt;BR /&gt;network-object host x.x.130.8&lt;BR /&gt;object-group network DM_INLINE_NETWORK_14&lt;BR /&gt;network-object host 172.20.0.80&lt;BR /&gt;network-object host x.x.141.40&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ip-Options&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Type -&lt;/TD&gt;&lt;TD&gt;IP-OPTIONS&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE style="border-top-width: 1; border-top-color: #cccccc; border-right-style: solid; border-left-color: #cccccc; border-right-width: 1; border-bottom-style: solid; border-left-width: 1; border-bottom-color: #cccccc; border-bottom-width: 1; border-left-style: solid; border-right-color: #cccccc; border-top-style: solid"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Action -&lt;/TD&gt;&lt;TD&gt;ALLOW&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT&lt;/P&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-style: solid; border-color: rgb(204, 204, 204);"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Type -&lt;/TD&gt;&lt;TD&gt;NAT&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE style="border-style: solid; border-color: rgb(204, 204, 204);"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Subtype -&lt;/TD&gt;&lt;TD&gt;rpf-check&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE style="border-style: solid; border-color: rgb(204, 204, 204);"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Action -&lt;/TD&gt;&lt;TD&gt;DROP&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;TD&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;A href="#"&gt;Show rule in NAT Rules table.&amp;nbsp;&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;TABLE border="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;TABLE style="border-style: solid; border-color: rgb(204, 204, 204);"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;Config&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;match ip inside any web_dmz any&lt;BR /&gt;dynamic translation to pool 10 (x.x.128.1 [Interface PAT])&lt;BR /&gt;translate_hits = 1435672, untranslate_hits = 51898&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;100&lt;/TD&gt;&lt;TD&gt;RESULT - The packet is dropped.&lt;/TD&gt;&lt;TD&gt;true&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;info: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Oct 2014 12:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547208#M206196</guid>
      <dc:creator>benningtonr</dc:creator>
      <dc:date>2014-10-13T12:50:26Z</dc:date>
    </item>
    <item>
      <title>What was the source IP you</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547209#M206197</link>
      <description>&lt;P&gt;What was the source IP you used.&amp;nbsp; Normally an RPF failure in the packet tracer would indicate that you have sourced the packet from the wrong IP.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input web_dmz tcp x.x.129.10 12345 172.20.0.80 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 07:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547209#M206197</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-14T07:46:02Z</dc:date>
    </item>
    <item>
      <title>Absolutely using the correct</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547210#M206198</link>
      <description>&lt;P&gt;Absolutely using the correct IP address, for source and dest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the inside I can ping the 172, but coming through the dmz to the inside I cannot.&lt;/P&gt;&lt;P&gt;inside is a 192 net, db net is a 172 net.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input web_dmz tcp x.x.130.8 sqlnet 172.20.0.80 sqlnet$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x242ed5a0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=19230845209, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.20.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group web_dmz_access_in in interface web_dmz&lt;BR /&gt;access-list web_dmz_access_in extended permit tcp object-group EmediaVa-Servers any object-group DM_INLINE_TCP_5&lt;BR /&gt;access-list web_dmz_access_in remark out for Qumu&lt;BR /&gt;object-group network EmediaVa-Servers&lt;BR /&gt;&amp;nbsp;description: EmediaVa Servers&lt;BR /&gt;&amp;nbsp;network-object host x.x.128.94&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.106&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.107&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.113&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.115&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.9&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.108&lt;BR /&gt;&amp;nbsp;network-object host x.x.130.8&lt;BR /&gt;object-group service DM_INLINE_TCP_5 tcp&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ldap&lt;BR /&gt;&amp;nbsp;port-object eq ldaps&lt;BR /&gt;&amp;nbsp;port-object eq sqlnet&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq 3306&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x245cd7a0, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=42, user_data=0x1dbac5c0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=64.5.130.8, mask=255.255.255.255, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=1521, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x242efb38, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=540245079, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-sqlnet&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x269e4100, priority=70, domain=inspect-sqlnet, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=107, user_data=0x269e3cb8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=1521, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any web_dmz any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 10 (x.x.128.1 [Interface PAT])&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 1471616, untranslate_hits = 53052&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x24593bb8, priority=1, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=861010, user_data=0x24593948, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: web_dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 11:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547210#M206198</guid>
      <dc:creator>benningtonr</dc:creator>
      <dc:date>2014-10-14T11:19:19Z</dc:date>
    </item>
    <item>
      <title>for the sake of elimination</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547211#M206199</link>
      <description>&lt;P&gt;for the sake of elimination could you add a permit ip any any to the web_dmz_access_in ACL and test.&amp;nbsp; Just remember to remove it after you are done testing.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 11:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547211#M206199</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-14T11:21:27Z</dc:date>
    </item>
    <item>
      <title>Looks like the same result</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547212#M206200</link>
      <description>&lt;P&gt;Looks like the same result&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input web_dmz tcp x.x.130.8 sqlnet 172.20.0.80 sqlnet$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x242ed5a0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=19237240552, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 172.20.0.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.0 &amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group web_dmz_access_in in interface web_dmz&lt;BR /&gt;access-list web_dmz_access_in extended permit ip any any&lt;BR /&gt;access-list web_dmz_access_in remark Eduwidgets&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x28a6e870, priority=12, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=912, user_data=0x1db70040, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x242efb38, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=540465202, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: inspect-sqlnet&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x269e4100, priority=70, domain=inspect-sqlnet, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=109, user_data=0x269e3cb8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=1521, dscp=0x0&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;&amp;nbsp; match ip inside any web_dmz any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 10 (x.x.128.1 [Interface PAT])&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 1472039, untranslate_hits = 53052&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x24593bb8, priority=1, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=861241, user_data=0x24593948, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: web_dmz&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 11:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547212#M206200</guid>
      <dc:creator>benningtonr</dc:creator>
      <dc:date>2014-10-14T11:26:28Z</dc:date>
    </item>
    <item>
      <title>okay, it has been solved, I</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547213#M206201</link>
      <description>&lt;P&gt;okay, it has been solved, I opened a case with cisco. This was a High Priority item for me, i needed to add a nat for the 172 net on the web-dmz. I only had a nat statment for it on the inside.&lt;/P&gt;&lt;P&gt;static&amp;nbsp;(inside,web_dmz) 172.20.0.80 17220.0.80 etc.......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So all is working now, yay Cisco, thanks you for all the help&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 14:49:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/2547213#M206201</guid>
      <dc:creator>benningtonr</dc:creator>
      <dc:date>2014-10-14T14:49:42Z</dc:date>
    </item>
  </channel>
</rss>

