<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Mahesh,Almost - make the next in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530090#M235999</link>
    <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Almost - make the next hop the gateway (L3 switch or router) address in the 172.24.254.64/28 network (includes addresses 172.24.254.64 - 172.24.254.79) that interface RX is connected to.&lt;/P&gt;</description>
    <pubDate>Sun, 03 Aug 2014 17:55:27 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-08-03T17:55:27Z</dc:date>
    <item>
      <title>Asymmetric NAT rules</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530083#M235987</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;I an trying to connect PC&amp;nbsp; to server on port say&amp;nbsp;4001 here are logs from firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src RX 172.24.150.15/1937 dst GY:172.31.50.1/4001 denied due to NAT reverse path failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did packet tracer on ASA it shows that packet is dropped due to NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (GY) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip GY any RX any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; identity NAT translation, pool 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: RX&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: GY&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;Need to know how can i fix this?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530083#M235987</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T04:34:08Z</dc:date>
    </item>
    <item>
      <title>Mahesh,Give us some</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530084#M235990</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Give us some configuration bits please.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Preferably the config file but "show run nat", " show route" and "show ip address" at least.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 03:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530084#M235990</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-08-02T03:11:24Z</dc:date>
    </item>
    <item>
      <title> Hi Marvin, Thanks for reply</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530085#M235991</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for reply.&lt;/P&gt;&lt;P&gt;Here is info&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;nat (GY) 0 access-list GY_nat0_outbound&lt;BR /&gt;nat (GY) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh ip shows&lt;/P&gt;&lt;P&gt;&amp;nbsp;Gi0/2 &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GY &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.100.11&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; CONFIG&lt;BR /&gt;&lt;BR /&gt;GigabitEthernet0/3 &amp;nbsp;&amp;nbsp; RX &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.24.254.78&amp;nbsp;&amp;nbsp; 255.255.255.240 manual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh route shows&lt;/P&gt;&lt;P&gt;172.16.0.0 255.240.0.0 [1/0] via 172.31.100.254, GY&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you need any other info?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 04:13:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530085#M235991</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-02T04:13:52Z</dc:date>
    </item>
    <item>
      <title>That NAT listing doesn't seem</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530086#M235992</link>
      <description>&lt;P&gt;That NAT listing doesn't seem to make sense.&lt;/P&gt;&lt;P&gt;You have two "NAT 0" exemptions and no other NAT rules. In that scenario why have NAT configured at all?&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 13:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530086#M235992</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-08-02T13:52:00Z</dc:date>
    </item>
    <item>
      <title> Hi Marvin, Under correct</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530087#M235993</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under correct setup with present NAT config is there any way i can fix the NAT issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 14:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530087#M235993</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-02T14:54:35Z</dc:date>
    </item>
    <item>
      <title>As I understand it, your PC</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530088#M235994</link>
      <description>&lt;P&gt;As I understand it, your PC is sending from&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;172.24.150.15 and coming to the ASA via interface "RX". &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;According to the route and interface statements you provided, that subnet would be expected to be somewhere in the networks connected upstream of interface GY (due to "&lt;/SPAN&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;172.16.0.0 255.240.0.0&lt;/SPAN&gt;&lt;SPAN style="font-size: 14px;"&gt;" having been set as a static route out that interface).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;So the RPF (Reverse Path Forwarding) would expect to not route the return packets back out the same interface they arrived on and thus they would fail RPF check as your log message is showing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;At a minimum, you should ad a route so that the ASA knows to send return traffic to the subnet where your PC is sitting back out interface RX. If you do that, the flow should be recognized as valid return traffic, be part of an un-NATted connection (per your NAT 0 commands), and be allowed to pass.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Aug 2014 18:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530088#M235994</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-08-02T18:26:02Z</dc:date>
    </item>
    <item>
      <title> Hi Marvin,Yes PC is</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530089#M235995</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;Yes PC is connected to interface RX of ASA.&lt;/P&gt;&lt;P&gt;So source interface --or packet comes to ASA on interface RX.&lt;/P&gt;&lt;P&gt;Outgoing interface is GY as per current config.&lt;/P&gt;&lt;P&gt;So per current config Outgoing interface GY covers the source subnet also.&lt;/P&gt;&lt;P&gt;To fix this should i add below route on ASA&lt;/P&gt;&lt;P&gt;route RX 172.24.150.0 255.255.255.0&amp;nbsp; 172.24.254.78&lt;/P&gt;&lt;P&gt;where 172.24.254.78 is interface RX IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sun, 03 Aug 2014 17:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530089#M235995</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-03T17:19:02Z</dc:date>
    </item>
    <item>
      <title>Mahesh,Almost - make the next</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530090#M235999</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;&lt;P&gt;Almost - make the next hop the gateway (L3 switch or router) address in the 172.24.254.64/28 network (includes addresses 172.24.254.64 - 172.24.254.79) that interface RX is connected to.&lt;/P&gt;</description>
      <pubDate>Sun, 03 Aug 2014 17:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530090#M235999</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-08-03T17:55:27Z</dc:date>
    </item>
    <item>
      <title> Hi Marvin,I checked the</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530091#M236001</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;I checked the routing and found that Firewall already has static route to&lt;/P&gt;&lt;P&gt;source PC IP via&amp;nbsp; interface RX.Also Next hop is Layer 3 switch.&lt;/P&gt;&lt;P&gt;So as per current config&amp;nbsp; this seems to be routing issue or NAT?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2014 13:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530091#M236001</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-04T13:56:20Z</dc:date>
    </item>
    <item>
      <title>It's hard to say at this</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530092#M236003</link>
      <description>&lt;P&gt;It's hard to say at this point.&lt;/P&gt;&lt;P&gt;Since you're telling me there's a route that you didn't mention earlier I wonder what else is going on that we haven't seen in this thread yet.&lt;/P&gt;&lt;P&gt;Is it possible to share the whole configuration (sanitized of course)?&lt;/P&gt;</description>
      <pubDate>Mon, 04 Aug 2014 16:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530092#M236003</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-08-04T16:11:09Z</dc:date>
    </item>
    <item>
      <title> Hi MArvin, Seems to be issue</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530093#M236004</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi MArvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Seems to be issue with Natting.&lt;/P&gt;&lt;P&gt;When i put below&amp;nbsp; NAT config&lt;/P&gt;&lt;P&gt;static (RX,GY) 0.0.0.0 0.0.0.0 and ran the packet tracer it showed that traffic&lt;/P&gt;&lt;P&gt;is passing via firewall now.&lt;/P&gt;&lt;P&gt;1&amp;gt;Does above static NAT means any source IP coming from int RX and going&lt;/P&gt;&lt;P&gt;to interface GY and vice versa do not no any NAT translations ???&lt;/P&gt;&lt;P&gt;Below is result of packet tracer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Config&lt;BR /&gt;static (RX,GY) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;BR /&gt;match ip RX any GY any&lt;BR /&gt;static translation to 0.0.0.0&lt;BR /&gt;translate_hits = 2, untranslate_hits = 6105&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Info&lt;BR /&gt;Static translate 0.0.0.0/0 to 0.0.0.0/0 using netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;config&lt;BR /&gt;static (RX,GY) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;BR /&gt;match ip RX any GY any&lt;BR /&gt;static translation to 0.0.0.0&lt;BR /&gt;translate_hits = 2, untranslate_hits = 6105&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Type - &amp;nbsp;&amp;nbsp; &amp;nbsp;NAT&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Subtype - &amp;nbsp;&amp;nbsp; &amp;nbsp;rpf-check&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Action - &amp;nbsp;&amp;nbsp; &amp;nbsp;ALLOW&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Show rule in NAT Rules table.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Config&lt;BR /&gt;nat (GY) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;match ip GY any RX any&lt;BR /&gt;identity NAT translation, pool 0&lt;BR /&gt;translate_hits = 5583, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Type - &amp;nbsp;&amp;nbsp; &amp;nbsp;NAT&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Subtype - &amp;nbsp;&amp;nbsp; &amp;nbsp;host-limits&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Action - &amp;nbsp;&amp;nbsp; &amp;nbsp;ALLOW&lt;BR /&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Show rule in NAT Rules table.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Config&lt;BR /&gt;nat (GY) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;match ip GY any GY any&lt;BR /&gt;identity NAT translation, pool 0&lt;BR /&gt;translate_hits = 0, untranslate_hits =&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But above NAT config caused other issues in network where we were unable&lt;/P&gt;&lt;P&gt;to reach some servers connected to interface GY.&lt;/P&gt;&lt;P&gt;2&amp;gt;Need to understand how packet tracer shows 3 different NAT configs in its&lt;/P&gt;&lt;P&gt;result?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 10 Aug 2014 15:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules/m-p/2530093#M236004</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-08-10T15:15:33Z</dc:date>
    </item>
  </channel>
</rss>

