<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT reverse path failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871503#M28158</link>
    <description>&lt;P&gt;would be great if you could share the config of your firewall. mean time please have look on this config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network syslog_server&lt;BR /&gt;host 192.168.1.192&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) static interface&lt;BR /&gt;!&lt;BR /&gt;access-list outside_acl extended permit udp any host 192.168.1.192 eq 514&lt;BR /&gt;!&lt;BR /&gt;access-group outside_acl in interface outside&lt;/P&gt;</description>
    <pubDate>Wed, 12 Jun 2019 13:35:15 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-06-12T13:35:15Z</dc:date>
    <item>
      <title>NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871049#M28155</link>
      <description>&lt;P&gt;I have a wan router(70.70.70.129) from where I&amp;nbsp;need to access a syslog server on inside with its real ip address(192.168.1.192).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have setup an access list on outside int:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_acl extended permit udp host 70.70.70.129 host 192.168.1.192 eq syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with this so far I get the &lt;EM&gt;Nat reverse path failure&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;now if I add a nat rule:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inside outside 192.168.1.192 any any 192.168.1.192&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;everything works except the syslog server loose access to internet, I am confuse in what I need to add to enable both, access to internet and access to the server via its private ip address.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 14:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871049#M28155</guid>
      <dc:creator>reaven</dc:creator>
      <dc:date>2019-06-11T14:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871063#M28156</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share your config please?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would remove the nat you put in place and change to something like:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Object network SYSLOG-SRV&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;host 192.168.1.192&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;nat (inside, outside) static 70.70.70.129 service udp 514 514&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also when you’ve done this, please run a packet-tracer and paste the output:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside udp 8.8.8.8 1234 70.70.70.129 514&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jun 2019 15:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871063#M28156</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-06-11T15:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871503#M28158</link>
      <description>&lt;P&gt;would be great if you could share the config of your firewall. mean time please have look on this config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network syslog_server&lt;BR /&gt;host 192.168.1.192&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) static interface&lt;BR /&gt;!&lt;BR /&gt;access-list outside_acl extended permit udp any host 192.168.1.192 eq 514&lt;BR /&gt;!&lt;BR /&gt;access-group outside_acl in interface outside&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 13:35:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871503#M28158</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T13:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871678#M28160</link>
      <description>&lt;P&gt;Hi thank for your answers, I am trying to sanitized the config since is very extend and I dont have permission to post it in its entirely.&lt;/P&gt;&lt;P&gt;Meanwhile whats the&amp;nbsp;&lt;STRONG&gt;nat (inside,outside) static interface&lt;/STRONG&gt;&amp;nbsp;does, its missing something ? whats the difference from the one I have&amp;nbsp;&lt;STRONG&gt;nat (inside,outside) static 192.168.1.192 no-proxy-arp&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 12:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871678#M28160</guid>
      <dc:creator>reaven</dc:creator>
      <dc:date>2019-06-12T12:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871740#M28162</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the below rule,&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface&lt;/P&gt;&lt;P&gt;if traffic coming from inside interface and going toward outside network use the outside interface ip address (i.e 82.1.5.4).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now coming to your nat rule&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 192.168.1.192 no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you saying if traffic coming from inside&amp;nbsp;and going toward outside network use address 192.168.1.192. in this case address 192.168.1.192 is your inside address and this address cant be routed out due to RFC 1918.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now you have two choices,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step 1.&lt;/P&gt;&lt;P&gt;=====&lt;/P&gt;&lt;P&gt;Object network syslog_server&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 192.168.1.192&lt;/P&gt;&lt;P&gt;nat (inside, outside) static 70.70.70.129 service udp 514 514&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit udp any host 192.168.1.192 eq 514&lt;BR /&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Note. if you need to access the syslog server from outside than you need to define the ACL as i mentioned)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Step2&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;object network syslog_server&lt;BR /&gt;host 192.168.1.192&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) static interface&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit udp any host 192.168.1.192 eq 514&lt;BR /&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Note. if you need to access the syslog server from outside than you need to define the ACL as i mentioned)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now I do not know what is your public ip address. so you can use the command nat (in,out) static interface. this will use your firewall outside interface ip address. the choice is yours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 13:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871740#M28162</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T13:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871843#M28163</link>
      <description>&lt;P&gt;this have been given to me very redacted/"sanitized".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my syslog server = mon002 = 10.10.1.192&lt;/P&gt;&lt;P&gt;my wan router is connected to my outside interface with ip 1.1.1.129&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need for my wan router to access my syslog server, there is an ip route in my wan router to route traffic destined to 10.10.1.192 through 1.1.1.130&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;hostname Firewall
!
interface Ethernet0/0
 speed 1000
 duplex full
 nameif outside
 security-level 0
 ip address 1.1.1.130 255.255.255.224 
!
interface Ethernet0/1
 speed 1000
 duplex full
 nameif inside
 security-level 100
 ip address 10.10.8.1 255.255.255.0 
!
access-list outside_acl extended permit udp host 1.1.1.129 host 10.10.1.192 eq syslog  
arp timeout 14400
no arp permit-nonconnected
!
object network obj-10.10.1.0
 nat (inside,outside) dynamic og_global_outside-1
 nat (aruba,outside) dynamic og_global_outside-1
object network ob-10.10.1.192
 nat (inside,outside) static 10.10.1.192 no-proxy-arp
access-group outside_acl in interface outside
access-group inside_acl in interface inside
access-group bppr_acl in interface bppr
access-group aruba_access_in in interface aruba
route outside 0.0.0.0 0.0.0.0 1.1.1.129 1 
http server enable
snmp-server host inside 10.10.1.192 community public version 2c
no snmp-server location
no snmp-server contact
snmp-server community public
sysopt connection tcpmss 1460&lt;/PRE&gt;</description>
      <pubDate>Thu, 13 Jun 2019 13:55:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871843#M28163</guid>
      <dc:creator>reaven</dc:creator>
      <dc:date>2019-06-13T13:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871963#M28164</link>
      <description>&lt;P&gt;&lt;BR /&gt;object network mon001&lt;BR /&gt;host 10.10.1.192&lt;BR /&gt;description PRTG monitoring&lt;BR /&gt;nat (inside,outside) static interface&lt;BR /&gt;!&lt;BR /&gt;access-list outside_acl extended permit udp host any host 10.10.1.192 eq syslog&lt;BR /&gt;(or)&lt;BR /&gt;access-list outside_acl extended permit udp host 1.1.1.129 host 10.10.1.192 eq syslog&lt;BR /&gt;!&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;!&lt;BR /&gt;packet-tracer input outside udp 1.1.1.129 1234 1.1.1.129 syslog&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or if you like you can move your nat rule into section 1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static mon001 interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit udp host 1.1.1.129 host 10.10.1.192 eq syslog&lt;BR /&gt;!&lt;BR /&gt;access-group outside_acl in interface outside&lt;BR /&gt;!&lt;BR /&gt;packet-tracer input outside udp 1.1.1.129 1234 1.1.1.129 syslog&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 19:02:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3871963#M28164</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-12T19:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872026#M28165</link>
      <description>&lt;P&gt;when enable the nat rule, what&amp;nbsp; the below error really means is all traffic from 10.10.1.192 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static ms001mon002 interface&lt;BR /&gt;WARNING: All traffic destined to the IP address of the outside interface is bein g redirected.&lt;BR /&gt;WARNING: Users may not be able to access any service enabled on the outside inte rface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;anyways am still getting the error&lt;/P&gt;&lt;P&gt;ASA-5-305013: Asymmetric NAT rules matched for forward and reverse&lt;BR /&gt;flows; Connection for udp src outside 1.1.1.129 dst inside 10.10.1.192/514 denied due to NAT reverse path failure.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jun 2019 21:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872026#M28165</guid>
      <dc:creator>reaven</dc:creator>
      <dc:date>2019-06-12T21:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872104#M28166</link>
      <description>Your monitor tool has ip 10.10.1.192, am i right?&lt;BR /&gt;&lt;BR /&gt;When you're adding the nat be careful because you have a nat in top position which is nating the subnet 10.10.1.0.&lt;BR /&gt;&lt;BR /&gt;Then put the nat statement i gave before this nat.&lt;BR /&gt;&lt;BR /&gt;Also, you have at the end a nat with any any interface which isn't following best practices. Replace any any by the correct source and destination interface name.&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Jun 2019 01:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872104#M28166</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2019-06-13T01:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872345#M28167</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/87480"&gt;@reaven&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have lab this up. .&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network SYS-LOG&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 10.10.1.192&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) source static interface service 514 514&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit udp host 1.1.1.129 host 10.10.1.192 eq syslog&lt;/P&gt;&lt;P&gt;access-list outside_acl in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;packet tracer input outside udp 1.1.1.129 12345 1.1.1.30 514&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 11:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872345#M28167</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-13T11:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872456#M28168</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321306"&gt;@Francesco Molino&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First thansk for the support, help and patience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;reading your suggestions I realized my error, In the NAT rule I had created I leave &lt;EM&gt;any&lt;/EM&gt; instead of specifying the port 514&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now internet on the monitoring tool and the syslog are working !!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 13:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-reverse-path-failure/m-p/3872456#M28168</guid>
      <dc:creator>reaven</dc:creator>
      <dc:date>2019-06-13T13:52:42Z</dc:date>
    </item>
  </channel>
</rss>

