<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asymmetric NAT rules matched for forward and reverse in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452059#M270228</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried above command&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: External&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (ifc-classify) Virtual firewall classification failed&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ASA is in Active/Active multicontext mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Feb 2014 14:58:32 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2014-02-06T14:58:32Z</dc:date>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452055#M270223</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am seeing log messages in ASA&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;50443&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Feb 01 2014 23:16:58: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src X 10.31.x.x /28122 dst Y:172.16.0..0/514 denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do i need to use no nat for traffic between interfaces X&amp;nbsp; and Y.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current NAT is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;nat (Y) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;static (Y,Z) 172.24.30.16 172.24.30.16 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static Y,Z) 172.24.30.16 172.24.30.16&amp;nbsp; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452055#M270223</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T03:41:08Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452056#M270225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you need to clarify the situation as I am not sure what the situation is as you have edited the output yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mention the connection is coming from behind &lt;STRONG&gt;X.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mention NAT configuration that has nothing to do with interface&lt;STRONG&gt; X&lt;/STRONG&gt;. I guess it might be that you have no configurations for that interface then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would probably either need NAT0 configuration for the network behind interface &lt;STRONG&gt;X&lt;/STRONG&gt; to be able to connect to destination networks behind &lt;STRONG&gt;Y&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you might have to configure Static Identity NAT for the destination network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I would really need to know the exact source and destination networks/hosts to know what kind of NAT configuration you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general your error message tells us that the traffic matches different NAT rules depending on the direction of the traffic. Or traffic might not match any NAT rule in the initial direction and then match something in the reverse direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 07:23:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452056#M270225</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-06T07:23:20Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452057#M270226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes source is interface X&lt;/P&gt;&lt;P&gt;DEstination is interface Y.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Earlier i posted the current config from the ASA which involves NAT.&lt;/P&gt;&lt;P&gt;X IP 10.31.102.17/28&lt;/P&gt;&lt;P&gt;Y 172.16.0.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is good if i use no nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 13:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452057#M270226</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-02-06T13:07:42Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452058#M270227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the output of the following&lt;STRONG&gt; "packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input X udp &lt;HOST behind="" x=""&gt; 12345 &lt;HOST behind="" y=""&gt; 514&lt;/HOST&gt;&lt;/HOST&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use for example the IP addresses in the log message that you originally posted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would they have been the following you mention above?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input X udp 10.31.102.17 12345 172.16.0.21 514&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 13:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452058#M270227</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-06T13:16:11Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452059#M270228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried above command&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: External&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (ifc-classify) Virtual firewall classification failed&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ASA is in Active/Active multicontext mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 14:58:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452059#M270228</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-02-06T14:58:32Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452060#M270229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder if the command given was correct as I would imagine the first log message doesnt refer to this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically you would see this situation on a Multiple Context setup of ASA when you have an interface that is attached to more than 1 Security Context. This means its a shared interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would probably also have this configuration on the System Context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no mac-address auto&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which means that each context that has this shared interface has an identical MAC address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore the ASA Security Context to which this connection should go to would have to have a NAT configuration for the destination IP address of the connection so it could classify the packet to the right Security Context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said I am not sure if the first log message relates to the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The exact &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command used&lt;/LI&gt;&lt;LI&gt;The full output from that command&lt;/LI&gt;&lt;LI&gt;The output of &lt;STRONG&gt;"show route"&lt;/STRONG&gt; from the Security Context through which this connection should go through&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Feb 2014 15:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452060#M270229</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-06T15:27:41Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452061#M270230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We added nat exemption ACL now all is good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 19:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse/m-p/2452061#M270230</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-02-07T19:28:34Z</dc:date>
    </item>
  </channel>
</rss>

