<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic rpf check in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352640#M307699</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would have to see the ASA configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont have any idea of the actual source interfaces and networks in this situation which are essential.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually in this situation you might be fine configuring a Static NAT for the DMZ server towards the interface where the Wifi Router is located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again I can't tell the whole setup from the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Dec 2013 09:57:50 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-12-05T09:57:50Z</dc:date>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352637#M307695</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other workaround to reach a ip which is of ip pool configured on outside interface without disabling ip verify reverse path check. I have a ASA runing ver 8.4. &amp;amp; interfaces configured as below..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address x.x.86.2 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif standby&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address x.x.218.134 255.255.255.192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.86.1 1 &lt;/P&gt;&lt;P&gt;route standby 0.0.0.0 0.0.0.0 x.x.218.133 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two internet circuit from two different ISP. I am facing problem if i try to reach ip x.x.86.21 with source x.x.218.142 then it gets unreachable. May be because of rpf check enable. I dont want to disable rpf. So is there any other way to reach out this specific ip from this specific source addess.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls help.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:13:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352637#M307695</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2019-03-12T03:13:11Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352638#M307696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me that the traffic would never even flow that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the packet arrived on the ASA it would see that the destination hsot x.x.86.21 is directly connected network. And since you probably have some Static NAT or Static PAT for that public IP address x.x.86.21 configured on the ASA from some LAN interface to WAN interface then the connection would fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even in a normal single ISP setup you wont be able to connect to your public NAT IP address directly from the LAN unless your configure a NAT that actually translates the local server from the local IP address to the public IP address towards the LAN. In this case you will also have to configure NAT for the source address translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So t would seem to me that you probably have to configure a special NAT for your users to be able to connect to the public NAT IP address from behind the ASA. Users on the external network should not have problems reaching hosts using either of the public IP address ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 08:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352638#M307696</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T08:50:10Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352639#M307697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How could this specail NAT could be configured. A config example would make more clear to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually ip x.x.218.142 is of wifi router and ip x.x.86.21 is configured as static NAT with a DMZ server. So when any one connect over wifi and try to reach this nat server ip x.x.86.21 then it gets fail. I have two different internet router ahead to ASA for both ISP links. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any given workaround to reach this server ip would highly appreciated. Can't do any thing to reach this specfic server from wifi.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 09:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352639#M307697</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2013-12-05T09:24:24Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352640#M307699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would have to see the ASA configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont have any idea of the actual source interfaces and networks in this situation which are essential.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually in this situation you might be fine configuring a Static NAT for the DMZ server towards the interface where the Wifi Router is located.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again I can't tell the whole setup from the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 09:57:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352640#M307699</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T09:57:50Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352641#M307701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WiFi router is&amp;nbsp; connected to a ISP router and configured with a ip x.x.218.142 of ip pool which is configured as standby in ASA. Also attaching diagram.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address x.x.86.2 255.255.255.192&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif standby&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address x.x.218.134 255.255.255.192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 30&lt;/P&gt;&lt;P&gt; ip address 10.111.114.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-10.111.114.25&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) static&amp;nbsp; x.x.86.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.86.1 1 &lt;/P&gt;&lt;P&gt;route standby 0.0.0.0 0.0.0.0 x.x.218.133 20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/1/0/169012-ASA.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 18:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352641#M307701</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2013-12-05T18:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352642#M307703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I see the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the problems comes from the fact that the ASA has both of these networks as connected and the Wifi device is outside the ASA and when the Wifi user tries to form the connection the connection comes to the Wifi ISP Router and routes back through the other ISP connection and arrives at the ASA at which point the ASA blocks the connection as it sees connection attempt arrive on one ISP interface and the source IP address belong to the other ISP link. So its not expecting that traffic from there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just wondering what the options would be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess one option would be to move the Wifi Router to the other public IP address range. To the same public IP address range where the destination server is. I imagine the public IP address used on the Wifi isnt that important so this change would probably be the easiest? Might mean modifying some access rules on the ASA if there were many connections allowed from there. Or is there servers again on the original link which Wifi users would need to access and we would run into the same problem again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One solution might be moving the Wifi Router behind the ASA and NATing it to the public IP address of your choice.The required servers to which the Wifi users would need to connect to could be NATed with their public NAT IP addresses towards the Wifi Routers new link/interface on the ASA which should enable Wifi users connectivity to the servers without problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the above setup (Wifi behind the ASA) would require you to either dedicate a link on the ASA to the WAN link of the Wifi Router OR you could connect the Wifi Router WAN to some internal switch with a new Vlan ID and bring that Vlan ID to the ASA with Trunk. I am not sure if you have any existing Trunk interface to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 19:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352642#M307703</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-05T19:17:20Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352643#M307705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni.. Yes that is same problem occuring what you stated &amp;amp; suspected above. But server ip pool has fully occupied and i cant move server over other ISP pool as it has public DNS entry. Also i cant move wifi over same ip pool to which server is natted due to ip pool exausted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you said we could move wifi behind ASA and do&amp;nbsp; NAT/PAT. I dont have trunk interface configured. But i have management port free which i could use to connect wifi. I guess wifi over mgmt port would definitely work. What you have to say Jouni.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart of these could there be not any other solutions?? See if we could do some thing on Internet router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Dec 2013 19:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352643#M307705</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2013-12-05T19:37:37Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352644#M307707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the Management interface could do on the ASA model you are using. I presume by your interface types that you are using ASA5510 perhaps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You just have to remove the &lt;STRONG&gt;"management-only"&lt;/STRONG&gt; configuration from the Management interface for it to be able to pass data traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would personally probably do it so that I would move the Wifi Router behind the ASA. It would seem like the simplest solution without having to tamper with rest of the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Dec 2013 12:06:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352644#M307707</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-06T12:06:11Z</dc:date>
    </item>
    <item>
      <title>rpf check</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352645#M307708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for Help...Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Dec 2013 15:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check/m-p/2352645#M307708</guid>
      <dc:creator>Anukalp S</dc:creator>
      <dc:date>2013-12-07T15:29:34Z</dc:date>
    </item>
  </channel>
</rss>

