<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asymmetric NAT rules matched for forward and reverse flow in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303216#M344001</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ICMP from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to&lt;STRONG&gt; "DMZ"&lt;/STRONG&gt; wont match any NAT configuration you had since you only had the Dynamic NAT from &lt;STRONG&gt;"DMZ" &lt;/STRONG&gt;to &lt;STRONG&gt;"outside"&lt;/STRONG&gt;. So if you used ICMP / PING from&lt;STRONG&gt; "DMZ" &lt;/STRONG&gt;to &lt;STRONG&gt;"outside" &lt;/STRONG&gt;then that NAT rule would be matched correctly (on both directions)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when you are using ICMP / PING from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; it doesnt match any NAT rule on the way in but on the way out it would match the Dynamic NAT and this is why you get the NAT error message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the ICMP / PING probably doesnt reach the PC behind the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; interface. To my understanding the ASA does the check for both directions when the packet comes to the ASA and since there is a problem with the NAT it drops the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Aug 2013 14:58:29 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-08-25T14:58:29Z</dc:date>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303211#M343996</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; am pinging from switch connected to&amp;nbsp; outside interface of ASA&amp;nbsp; to the PC connected to the DMZ interface of ASA.&lt;/P&gt;&lt;P&gt;Switch had static route to the DMZ PC subnet.&lt;/P&gt;&lt;P&gt;Also ASA has ACL thats allow ping from&amp;nbsp; outside to DMZ&amp;nbsp; interface subnet ---192.168.70.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is logs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:192.168.71.1 dst DMZ:192.168.70.10 (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here 192.168.71.1&amp;nbsp; is IP of switch interface directly connected to ASA.&lt;/P&gt;&lt;P&gt;192.168.70.10 is PC IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know one way to do this is without using&amp;nbsp; NAT between DMZ and outside interface&lt;/P&gt;&lt;P&gt;Need to know if there is any other way that i can allow&amp;nbsp; ping from outside to PC subnet&amp;nbsp; in DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303211#M343996</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T02:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303212#M343997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would really need to see the NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though at the moment it ofcourse seems that the traffic matches different NAT rules on the way in than on the way out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually if you need to allow communications between 2 interfaces and 2 networks without NAT then you dont configure any NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might have some Dynamic PAT rule that is causing this problem so in that case you should probably configure NAT0 / NAT Exempt for the traffic between these 2 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what software version you are running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 14:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303212#M343997</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-25T14:21:56Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303213#M343998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version 9.1(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Auto_NAT_DMZ&lt;/P&gt;&lt;P&gt; subnet 192.168.70.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description Auto NAT&amp;nbsp; DMZ Interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Outside_pool&lt;/P&gt;&lt;P&gt; range 192.168.72.3 192.168.72.100&lt;/P&gt;&lt;P&gt; description DMZ_ Global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ,outside) source dynamic Auto_NAT_DMZ Outside_pool description Auto NAT DMZ Interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So above is all NAT config for DMZ&amp;nbsp; where users behind DMZ&amp;nbsp; have IP 192.168.70.0&amp;nbsp; there source IP gets translated to&lt;/P&gt;&lt;P&gt;Global subnet 192.168.72.3&amp;nbsp; on the way out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 14:31:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303213#M343998</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-25T14:31:28Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303214#M343999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So seems you are doing Dynamic NAT from &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means that when you try to ICMP / PING the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; network directly from behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface, that traffic wont hit any NAT rule on the ASA, but the ICMP / PING reply from the&lt;STRONG&gt; "DMZ"&lt;/STRONG&gt; will hit the Dynamic NAT rule that you mention. And this is why the traffic will be dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You seem to have configure the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; Dynamic NAT to Section 1 of the NAT rules with Manual NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means we will have to configure a NAT0 / NAT Exempt type configuration for traffic to be able to pass without NAT between these networks you mention in the original post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something like this should do the trick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.70.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.71.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,outside) 1 source static DMZ DMZ destination static OUTSIDE OUTSIDE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should enable using real addresses between these 2 networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All other traffic from &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; to &lt;STRONG&gt;"outside"&lt;/STRONG&gt; will continue using Dynamic NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 14:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303214#M343999</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-25T14:37:31Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303215#M344000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need litte more understanding on this ---&lt;/P&gt;&lt;P&gt;When you said&lt;/P&gt;&lt;P&gt;This means that when you try to ICMP / PING the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt;network directly from behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt;interface, that traffic wont hit any NAT rule on the ASA, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this default behaviour?&amp;nbsp; or this is due to my NAT&amp;nbsp; rule?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also when i&amp;nbsp; do the ping from outside the traffic reaches the PC&amp;nbsp; behind the DMZ interface right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 14:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303215#M344000</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-25T14:50:21Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303216#M344001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ICMP from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to&lt;STRONG&gt; "DMZ"&lt;/STRONG&gt; wont match any NAT configuration you had since you only had the Dynamic NAT from &lt;STRONG&gt;"DMZ" &lt;/STRONG&gt;to &lt;STRONG&gt;"outside"&lt;/STRONG&gt;. So if you used ICMP / PING from&lt;STRONG&gt; "DMZ" &lt;/STRONG&gt;to &lt;STRONG&gt;"outside" &lt;/STRONG&gt;then that NAT rule would be matched correctly (on both directions)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when you are using ICMP / PING from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; it doesnt match any NAT rule on the way in but on the way out it would match the Dynamic NAT and this is why you get the NAT error message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the ICMP / PING probably doesnt reach the PC behind the &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; interface. To my understanding the ASA does the check for both directions when the packet comes to the ASA and since there is a problem with the NAT it drops the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 14:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303216#M344001</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-25T14:58:29Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flow</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303217#M344002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks Again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Aug 2013 15:06:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flow/m-p/2303217#M344002</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2013-08-25T15:06:55Z</dc:date>
    </item>
  </channel>
</rss>

