<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA to ASA VPN Tunnel - denied due to NAT reverse path failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393167#M271126</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! I'm amazed at the number of attempts to hack in - I guess the script kiddies of the world really love their 'work'! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to spin up the full server at the Remote site, and we'll know by tomorrow how happy the world truly is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Victor. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Jan 2014 18:46:58 GMT</pubDate>
    <dc:creator>vmanuel</dc:creator>
    <dc:date>2014-01-22T18:46:58Z</dc:date>
    <item>
      <title>ASA to ASA VPN Tunnel - denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393162#M271109</link>
      <description>&lt;P&gt;We have an existing ASA 5510 running 8.2, and have added an ASA 5505 running 8.4 at our secondary location. I have created a site-to-site tunnel that shows UP and working, but when a connection is attempted, the following error shows in our logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:10.2.x.x dst inside:192.168.x.x (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both sites can ping and browse outside the network, but not to each other. Also, when I look at the VPN statistics section of the Monitoring page, it shows that the remote site has transmitted 0 bytes but rec'd 5654. Vice versa on the local site's page. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it's a factor - the only way I could get the tunnel to work was by creating a new crypto IPSec key called Krypton. it's at the end of my crypto statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config for the remote location is below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname Krypton&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.50.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network KryptonPrime&lt;/P&gt;&lt;P&gt; subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt; description Krypton Internal Network&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 192.168.50.0 255.255.255.0 object KryptonPrime &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http server idle-timeout 60&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set Krypton esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt; protocol esp encryption des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt; protocol esp encryption 3des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt; protocol esp encryption aes&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer x.x.x.x&amp;nbsp; &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev1 transform-set Krypton&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 enable inside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 60&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 5&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 120&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2 8.8.8.8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2 8.8.8.8 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain krypton-solutions.com interface inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_x.x.x.x&amp;nbsp; internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_x.x.x.x&amp;nbsp; attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;username&amp;nbsp; password&amp;nbsp; encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x&amp;nbsp; type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_66.128.51.138&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:2deed59b90dc60eaa610d0a0f02513b3&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393162#M271109</guid>
      <dc:creator>vmanuel</dc:creator>
      <dc:date>2019-03-12T03:33:50Z</dc:date>
    </item>
    <item>
      <title>ASA to ASA VPN Tunnel - denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393163#M271111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont have NAT0 configuration in the above configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though its not an issue in this case I doubt you have a 10.0.0.0/8 network configured on the other site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But to configure the NAT0 add these configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.50.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static LAN LAN destination static KryptonPrime KryptonPrime &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 18:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393163#M271111</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-21T18:47:46Z</dc:date>
    </item>
    <item>
      <title>ASA to ASA VPN Tunnel - denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393164#M271113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest that you remove your external interfaces ACL since it allows any traffic. You dont need the ACL for VPN. The VPN traffic will flow through regardles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though you dont have any Static NAT configured that would enable connectivity from external network, this ACL still might potentially allow some traffic inbound when translations are active on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2014 18:50:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393164#M271113</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-21T18:50:04Z</dc:date>
    </item>
    <item>
      <title>ASA to ASA VPN Tunnel - denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393165#M271115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've created the network object and NAT, which allows me now to ping back and forth (happydance!) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now&amp;nbsp; I am able to view shared folders and servers from the remote site&amp;nbsp; 192.168.50.x to KryptonPrime, but cannot view from KryptonPrime to the&amp;nbsp; remote site. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the monitor on the remote site shows SSH sessions with random user names (test, ts, ts3, etc) being disconnected constantly. ?&lt;/P&gt;&lt;P&gt;SSH session from 37.59.34.39 on interface outside for user "testuser" disconnected by SSH server, reason: "Internal error" (0x00)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts? Aaaaallllllmost there....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you asked about the KryptonPrime subnet - it actually is 10.0.0.0/8 because we use 10.0 and 10.2. and 10.5 networks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks immensely for your help,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Victor. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname Krypton-Global-IP-DC&lt;/P&gt;&lt;P&gt;domain-name kryptonsolutions.local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.50.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name kryptonsolutions.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network KryptonPrime&lt;/P&gt;&lt;P&gt; subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt; description Krypton Internal Network&lt;/P&gt;&lt;P&gt;object network LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network lan&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap extended permit ip 192.168.50.0 255.255.255.0 object KryptonPrime &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN LAN destination static KryptonPrime KryptonPrime&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http server idle-timeout 60&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set Krypton esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt; protocol esp encryption des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt; protocol esp encryption 3des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt; protocol esp encryption aes&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer x.x.x.x &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set ikev1 transform-set Krypton&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 enable inside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 60&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 5&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 120&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2 8.8.8.8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2 8.8.8.8 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain krypton-solutions.com interface inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_x.x.x.x internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_x.x.x.x attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;username encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_66.128.51.138&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:403b5e87e2205f35f8f0ddd3e098b6d2&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 17:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393165#M271115</guid>
      <dc:creator>vmanuel</dc:creator>
      <dc:date>2014-01-22T17:07:37Z</dc:date>
    </item>
    <item>
      <title>ASA to ASA VPN Tunnel - denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393166#M271119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should be nothing on this remote side stopping traffic towards the other site. The problem might be in its configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine that there are attemtps to log onto your device as you have permitted SSH logins from ANY source address behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface. This will permit anyone to get the login prompt on your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you either have to narrow that down to specific public IP addresses or remove it completely or handle the ASA management remotely in some other way. You could always only allow management connections through VPN then you would not have to keep the management connections allowed to the public network. Then again it cause problems to have too strict restrictions on where you can attempt management connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the above logs messages are probably attempts to login to your device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 17:30:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393166#M271119</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-22T17:30:31Z</dc:date>
    </item>
    <item>
      <title>ASA to ASA VPN Tunnel - denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393167#M271126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! I'm amazed at the number of attempts to hack in - I guess the script kiddies of the world really love their 'work'! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to spin up the full server at the Remote site, and we'll know by tomorrow how happy the world truly is. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Victor. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jan 2014 18:46:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-asa-vpn-tunnel-denied-due-to-nat-reverse-path-failure/m-p/2393167#M271126</guid>
      <dc:creator>vmanuel</dc:creator>
      <dc:date>2014-01-22T18:46:58Z</dc:date>
    </item>
  </channel>
</rss>

