<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AnyConnect client broadcasts cause Asymmetric NAT log messages in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370852#M308761</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/ike.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/ike.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I think it is the same&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Nov 2013 05:19:02 GMT</pubDate>
    <dc:creator>jumora</dc:creator>
    <dc:date>2013-11-19T05:19:02Z</dc:date>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370848#M308757</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to figure out if this is a cosmetic issue/bug or if there really is a problem. For all broadcasts, I get the aymmetric nat error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, AC client logged in with address .1 broadcasts to .255 on port 137&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.245.103.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 137&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.245.103.255&amp;nbsp;&amp;nbsp;&amp;nbsp; 137&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5&amp;nbsp;&amp;nbsp;&amp;nbsp; Nov 16 2013&amp;nbsp;&amp;nbsp;&amp;nbsp; 18:42:02&amp;nbsp;&amp;nbsp;&amp;nbsp; 305013&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.245.103.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 137&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.245.103.255&amp;nbsp;&amp;nbsp;&amp;nbsp; 137&amp;nbsp;&amp;nbsp;&amp;nbsp; Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src outside:10.245.103.1/137(LOCAL\username) dst outside:10.245.103.255/137 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These VPN users are reporting issues with not being able to resolve WINS names. The WINS server is configured under the profile. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any insight appreciated. Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.1(2) &lt;/P&gt;&lt;P&gt;Device Manager Version 7.1(3)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370848#M308757</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-12T03:06:02Z</dc:date>
    </item>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370849#M308758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are all IPs that are to be sent over the VPN tunnel included in the NAT exempt?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please post a full sanitized running config for the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Nov 2013 09:19:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370849#M308758</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-17T09:19:53Z</dc:date>
    </item>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370850#M308759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for responding. I do have all addresses involved nat exempt. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now have a TAC case open on this. They have commented they think it is cosmetic possibly a bug, but they have taken a show tech and will get back to me. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll post their findings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Nov 2013 15:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370850#M308759</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2013-11-17T15:13:58Z</dc:date>
    </item>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370851#M308760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0cm 0cm 0.0001pt;"&gt;If you can add a VPN filter that should resolve the problem, I had something similar on an IPSec VPN connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was a note that I saw and was made me configure VPN filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use care when using the &lt;STRONG&gt;any&lt;/STRONG&gt; keyword in &lt;STRONG&gt;permit&lt;/STRONG&gt; entries in dynamic crypto maps. If the traffic covered by such a&lt;STRONG&gt; &lt;/STRONG&gt;&lt;STRONG&gt;permit&lt;/STRONG&gt; entry could include multicast or broadcast traffic, insert &lt;STRONG&gt;deny&lt;/STRONG&gt; entries for the appropriate address range into the access list. Remember to insert &lt;STRONG&gt;deny&lt;/STRONG&gt; entries for network and subnet broadcast traffic, and for any other traffic that IPsec should not protect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 05:18:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370851#M308760</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T05:18:31Z</dc:date>
    </item>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370852#M308761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/ike.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/ike.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I think it is the same&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 05:19:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370852#M308761</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T05:19:02Z</dc:date>
    </item>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370853#M308762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree with jumora here about using the any keyword.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If at all possible use specific subnets when configuring the crypto ACLs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 08:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370853#M308762</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-11-19T08:12:43Z</dc:date>
    </item>
    <item>
      <title>AnyConnect client broadcasts cause Asymmetric NAT log messages</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370854#M308763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you run with the VPN filter option?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Nov 2013 17:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370854#M308763</guid>
      <dc:creator>jumora</dc:creator>
      <dc:date>2013-11-19T17:02:12Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370855#M308764</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm having the same problem.. how did you solved it ?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 10:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/2370855#M308764</guid>
      <dc:creator>ilukeberry</dc:creator>
      <dc:date>2016-11-16T10:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: Hi</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/4028105#M308765</link>
      <description>&lt;P&gt;I solved a similar issue by creating a nat exempt rule on the outside interface, where the source and destination is the Anyconnect VPN pool.&lt;/P&gt;&lt;P&gt;nat (outside,outside) source static Anyconnect-VPN-FP Anyconnect-VPN-FP destination static Anyconnect-VPN-FP Anyconnect-VPN-FP no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue occurs, because none of your nat rules on the outside interface matches a traffic pattern with the anyconnect pool as source and destination.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 11:18:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-client-broadcasts-cause-asymmetric-nat-log-messages/m-p/4028105#M308765</guid>
      <dc:creator>Jesper Erbs</dc:creator>
      <dc:date>2020-02-12T11:18:11Z</dc:date>
    </item>
  </channel>
</rss>

