<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT RPF Drop Why?? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278755#M345348</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems that the first rule hit is somekind of general NAT0 rule for all&amp;nbsp; the VPN Pools perhaps and the other one is a more specific one perhaps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you talking about the VPN process?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x286ca438, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=75872441, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this "domain=ipsec-tunnel-flow, deny=true" mean that I've denied the VPN process? Is that the problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how it was processing packets prior to the manual NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It still dies with RPF-Drop. I assumed the reason this broke was the translation to the external IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 192.168.22.22 sip 192.168.22.30 sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group in-inet in interface outside&lt;BR /&gt;access-list in-inet extended permit ip 192.168.22.0 255.255.255.0 any log debugging&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-192.168.22.0&lt;BR /&gt; nat (outside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.22.22/5060 to x.x.23.10/27750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-192.168.22.0&lt;BR /&gt; nat (outside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;PHX5500/pri/act# packet-tracer input outside udp 172.31.2.22 sip 172.31.2.30 sip&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;access-group in-inet in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;access-list in-inet extended permit ip 172.31.2.0 255.255.255.0 any log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: FOVER&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: standby-update&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: ipsec-tunnel-flow&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;object network obj-172.31.2.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; nat (outside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d; background: yellow; mso-highlight: yellow;"&gt;Dynamic translate 172.31.2.22/5060 to 63.175.23.10/27750&lt;/SPAN&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 6&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: DROP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;object network obj-172.31.2.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; nat (outside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Action: drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Aug 2013 16:55:18 GMT</pubDate>
    <dc:creator>z08mjk2374</dc:creator>
    <dc:date>2013-08-01T16:55:18Z</dc:date>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278753#M345339</link>
      <description>&lt;P&gt;I have a pair of Cisco Anyconnect phones that can't seem to route traffic over the vpn to each other. I get a NAT RPF-Drop. I had to put a manual NAT in for section 1 to prevent the source translation to outside IP. The interfaces seem to match up. The NAT should be bidirectional. I don't get it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Code is 8.3(2).&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278753#M345339</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2019-03-12T02:20:16Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278754#M345344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration that the reverse check of NAT is hitting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems that the first rule hit is somekind of general NAT0 rule for all the VPN Pools perhaps and the other one is a more specific one perhaps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a possibility of perhaps temporarily removing the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration in the &lt;STRONG&gt;"rpf-check"&lt;/STRONG&gt; IF that VPN network is also included in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration matched first?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also imagine that the first matched Manual NAT rule for this VPN traffic should be matched on both direction. So this might be a bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 16:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278754#M345344</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T16:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278755#M345348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Seems that the first rule hit is somekind of general NAT0 rule for all&amp;nbsp; the VPN Pools perhaps and the other one is a more specific one perhaps?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you talking about the VPN process?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x286ca438, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=75872441, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this "domain=ipsec-tunnel-flow, deny=true" mean that I've denied the VPN process? Is that the problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how it was processing packets prior to the manual NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It still dies with RPF-Drop. I assumed the reason this broke was the translation to the external IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside udp 192.168.22.22 sip 192.168.22.30 sip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group in-inet in interface outside&lt;BR /&gt;access-list in-inet extended permit ip 192.168.22.0 255.255.255.0 any log debugging&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-192.168.22.0&lt;BR /&gt; nat (outside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.22.22/5060 to x.x.23.10/27750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-192.168.22.0&lt;BR /&gt; nat (outside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;PHX5500/pri/act# packet-tracer input outside udp 172.31.2.22 sip 172.31.2.30 sip&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;access-group in-inet in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;access-list in-inet extended permit ip 172.31.2.0 255.255.255.0 any log debugging&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: IP-OPTIONS&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 3&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: FOVER&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: standby-update&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 4&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: ipsec-tunnel-flow&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;object network obj-172.31.2.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; nat (outside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d; background: yellow; mso-highlight: yellow;"&gt;Dynamic translate 172.31.2.22/5060 to 63.175.23.10/27750&lt;/SPAN&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Phase: 6&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Subtype: rpf-check&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result: DROP&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;object network obj-172.31.2.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; nat (outside,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Result:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;input-interface: outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;input-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Action: drop&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="color: #1f497d;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 16:55:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278755#M345348</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2013-08-01T16:55:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278756#M345352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any other NAT statement (outside,something)? Otherwise this nat will not be required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the same-security-traffic command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any split-tunnel-policy? If yes, are you allowing the Anyconnect Pool subnet IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check my blog at http:laguiadelnetworking.com for further information. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278756#M345352</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-08-01T17:19:21Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278757#M345354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what that indicates. I have yet to see a Cisco document that would explain all the output. Especially since not all of the output give any explanation about what blocks some traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I just noticed in the "packet-tracer" output that you attached in the original post was that there was a mention of 2 different NAT rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This (first match)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) source static VPN_basepool1 VPN_basepool1 destination static VPN_basepool1 VPN_basepool1 description Exempt VPN to VPN NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this (rpf-check drop)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) source static VPN_pool VPN_pool destination static VPN_pool VPN_pool &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question was mainly that is there a need for both of these?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although I am not quite clear why it would match 2 different rules in this case I was wondering if the rule on which this traffic dropped was needed at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278757#M345354</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T17:20:34Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278758#M345355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have any other NAT statement (outside,something)? Otherwise this nat will not be required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;Yes. Nothing in the Manual NAT Section 1, though. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the same-security-traffic command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes. same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any split-tunnel-policy? If yes, are you allowing the Anyconnect Pool subnet IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nope. Tunnellall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278758#M345355</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2013-08-01T17:30:28Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278759#M345357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okey can you share show run nat &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Check my blog at http:laguiadelnetworking.com for further information. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278759#M345357</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-08-01T17:33:02Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278760#M345359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is one statement. Sorry for the confusion. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did see this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId="&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCti90197" target="_blank"&gt;CSCti90197&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I don't think it applies to this specific case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278760#M345359</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2013-08-01T17:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278761#M345361</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a sanitized sh run nat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278761#M345361</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2013-08-01T17:44:22Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278762#M345363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could always try to move the Manual NAT rule to the very top of the NAT configurations in Section 1 and see if it makes any difference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (outside,outside) source static VPN_basepool1 VPN_basepool1 destination static VPN_basepool1 VPN_basepool1 description Exempt VPN to VPN NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) 1 source static VPN_basepool1 VPN_basepool1 destination static VPN_basepool1 VPN_basepool1 description Exempt VPN to VPN NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if this is indeed some bug then perhaps updating the ASA to 8.4(x) or 9.x software level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278762#M345363</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-01T17:47:27Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278763#M345365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Packet-tracer showing this:&lt;/P&gt;&lt;P&gt;hase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-192.168.22.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.22.22/5060 to x.x.23.10/27750&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-192.168.22.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the configuration you sent me, did you remove that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check my blog at http:laguiadelnetworking.com for further information. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 17:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278763#M345365</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-08-01T17:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278764#M345368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. I tried it both ways with the dynamic nat to the interface and the manual outside/outside and with just the outside/outside manual nat. Currently there is no dynamic nat in place.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 18:59:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278764#M345368</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2013-08-01T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278765#M345370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmm and what does the packet-tracer shows without the object nat?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check my blog at http:laguiadelnetworking.com for further information. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Aug 2013 19:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278765#M345370</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-08-01T19:23:24Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278766#M345371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I actually labbed this up this morning and here's what I found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Running a verbatim config using 8.4(5) the nat worked properly and passed the traffic through the packet-tracer.&lt;/P&gt;&lt;P&gt;2) Running a verbatim config using 8.3(2) (same as the troubled firewall). I had similar results with the packet-tracer breaking communications.&lt;/P&gt;&lt;P&gt;3) Running a verbatim config using 8.3(2). I switched the nat statement to the very top&amp;nbsp; of the manual nat &lt;/P&gt;&lt;P&gt;(as JouniForss suggested), and it worked.&lt;/P&gt;&lt;P&gt;4) Running a verbatim config using 8.3(2). I turned off all nat for the vpn pool (as jcarvaja suggested) and the connection worked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 17:53:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278766#M345371</guid>
      <dc:creator>z08mjk2374</dc:creator>
      <dc:date>2013-08-02T17:53:19Z</dc:date>
    </item>
    <item>
      <title>NAT RPF Drop Why??</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278767#M345374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the software version 8.3(1) and 8.3(2) are not very commonly used. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only installed one firewall with such software at the begging when this new NAT format was introduced and after that every firewall were running some version of 8.4 and they had no problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I have not faced this kind of problem before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems there is some wierdnes or bug going on with the 8.3(2) software perhaps and I would imagine it would be better to move to even some 8.4(x) software as there are no huge changes. I think there might be some minor VPN related configuration format changes betweem 8.3 and 8.4 but nothing that considerable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess there was some problem with the NAT ordering since just moving the rule to the top somehow corrected this situation even though it seemed to me that this should have been matched even without this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So did you remove all NAT including the Dynamic PAT for Internet access for VPN clients and it worked? If so I guess this is how the new softwares work. If you have no matching NAT configurations for traffic in either direction, the traffic can go through without NAT as there is no &lt;STRONG&gt;"nat-control"&lt;/STRONG&gt; in the ASA anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do mark the correct replys if you feel they answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 18:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-drop-why/m-p/2278767#M345374</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-02T18:12:12Z</dc:date>
    </item>
  </channel>
</rss>

