<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asymmetric NAT rules matched for forward and reverse flows.... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249044#M350275</link>
    <description>&lt;P&gt;I am new to ASA's and have just configured my 5505 out the box with an outside (10.10.1.7) + inside (192.168.1.1) IP &amp;amp; NAT. The ASA has got a default route to another router (default geteway) thats connected to the internet. I have it connected this way so I can play and dink around with the ASA. My problem is when I try and ping a host on the ASA inside network (192.168.1.0/24) from the outside (10.10.1.0/24) I'm getting the following error:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;5&lt;/TD&gt;&lt;TD&gt;May 07 2013&lt;/TD&gt;&lt;TD&gt;16:38:36&lt;/TD&gt;&lt;TD&gt;305013&lt;/TD&gt;&lt;TD&gt;192.168.1.6&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:10.10.1.22 dst inside:192.168.1.6 (type 8, code 0) denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The recommendation from the syslog details is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;"When not on the same interface as the host using NAT, use the mapped address instead of the actual address to connect to the host. In addition, enable the &lt;STRONG&gt;inspect&lt;/STRONG&gt; command if the application embeds the IP address"&lt;/SPAN&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what exactly that means. Anyone assist with a solution? Beliw is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.1.7 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.10.1.1&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_net_Inside&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Outside_global&lt;BR /&gt;host 10.10.1.6&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside_access_in extended permit icmp any any source-quench&lt;BR /&gt;access-list outside_access_in extended permit icmp any any unreachable&lt;BR /&gt;access-list outside_access_in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.10.1.0 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=ciscoasa&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;certificate 9c997947&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201cf 30820138 a0030201 0202049c 99794730 0d06092a 864886f7 0d010105&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.10.1.0 255.255.255.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;BR /&gt;dhcpd dns 10.10.1.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 64.250.177.145 source outside prefer&lt;BR /&gt;ssl encryption rc4-md5 rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:13b794153d2dc774682fd432ef51bd&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:40:20 GMT</pubDate>
    <dc:creator>noobie198</dc:creator>
    <dc:date>2019-03-12T01:40:20Z</dc:date>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249044#M350275</link>
      <description>&lt;P&gt;I am new to ASA's and have just configured my 5505 out the box with an outside (10.10.1.7) + inside (192.168.1.1) IP &amp;amp; NAT. The ASA has got a default route to another router (default geteway) thats connected to the internet. I have it connected this way so I can play and dink around with the ASA. My problem is when I try and ping a host on the ASA inside network (192.168.1.0/24) from the outside (10.10.1.0/24) I'm getting the following error:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;5&lt;/TD&gt;&lt;TD&gt;May 07 2013&lt;/TD&gt;&lt;TD&gt;16:38:36&lt;/TD&gt;&lt;TD&gt;305013&lt;/TD&gt;&lt;TD&gt;192.168.1.6&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:10.10.1.22 dst inside:192.168.1.6 (type 8, code 0) denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The recommendation from the syslog details is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;"When not on the same interface as the host using NAT, use the mapped address instead of the actual address to connect to the host. In addition, enable the &lt;STRONG&gt;inspect&lt;/STRONG&gt; command if the application embeds the IP address"&lt;/SPAN&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what exactly that means. Anyone assist with a solution? Beliw is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.1.7 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.10.1.1&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_net_Inside&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Outside_global&lt;BR /&gt;host 10.10.1.6&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside_access_in extended permit icmp any any source-quench&lt;BR /&gt;access-list outside_access_in extended permit icmp any any unreachable&lt;BR /&gt;access-list outside_access_in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-647.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 10.10.1.0 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=ciscoasa&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;certificate 9c997947&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201cf 30820138 a0030201 0202049c 99794730 0d06092a 864886f7 0d010105&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 10.10.1.0 255.255.255.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;BR /&gt;dhcpd dns 10.10.1.1 interface inside&lt;BR /&gt;dhcpd auto_config outside interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 64.250.177.145 source outside prefer&lt;BR /&gt;ssl encryption rc4-md5 rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email &lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:13b794153d2dc774682fd432ef51bd&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249044#M350275</guid>
      <dc:creator>noobie198</dc:creator>
      <dc:date>2019-03-12T01:40:20Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249045#M350277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You currently have Dynamic PAT from "inside" to "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the only NAT configuration currently.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because the&amp;nbsp; Dynamic PAT "hides" all IP address on the "inside" to the PAT IP address when accessing network "outside" means that "outside" networks cant see the "inside" network directly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable this on the ASA you can for example configure this NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static LAN LAN destination static WAN WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration will tell the ASA that when traffic is going from the network LAN to network WAN then DO NOT NAT the traffic/connections. The reason why it doesnt NAT the traffic is that we have configured both the real IP address and mapped IP address with the same object (LAN and LAN and WAN and WAN)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to this the hosts AND the router on the "outside" HAVE to have a route towards the network 192.168.1.0/24 pointing towards the ASA "outside" interface IP address 10.10.1.17&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this it should work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the reply as the correct answer if it was. And/or Rate helpfull answers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally ask more if needed or if the above configurations didnt help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 20:51:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249045#M350277</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T20:51:15Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249046#M350279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. Did as you suggested above. Didnt quit fix the issue. This is the error I'm now getting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;6&lt;/TD&gt;&lt;TD&gt;May 07 2013&lt;/TD&gt;&lt;TD&gt;17:14:16&lt;/TD&gt;&lt;TD&gt;110003&lt;/TD&gt;&lt;TD&gt;10.10.1.22&lt;/TD&gt;&lt;TD&gt;1&lt;/TD&gt;&lt;TD&gt;192.168.1.6&lt;/TD&gt;&lt;TD&gt;0&lt;/TD&gt;&lt;TD&gt;Routing failed to locate next hop for ICMP from outside:10.10.1.22/1 to inside:192.168.1.6/0&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My routing table below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh asp table routing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 255.255.255.255 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 127.0.0.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.10.1.7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.10.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 255.255.255.255 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 10.10.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via 10.10.1.1, outside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 255.255.255.255 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 255.255.255.255 255.255.255.255 _internal_loopback&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; _internal_loopback&lt;/P&gt;&lt;P&gt;out&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via 0.0.0.0, identity&lt;/P&gt;&lt;P&gt;out&amp;nbsp; ::&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ::&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; via 0.0.0.0, identity&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:19:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249046#M350279</guid>
      <dc:creator>noobie198</dc:creator>
      <dc:date>2013-05-07T21:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows..</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249047#M350281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That was a false error message. The host was in sleep mode. This is the actual message from syslog. I am not getting any ping replys from 10.10.1.0/24 to 192.168.1.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/9/3/6/138639-ASA.png" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:27:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249047#M350281</guid>
      <dc:creator>noobie198</dc:creator>
      <dc:date>2013-05-07T21:27:08Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249048#M350283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add these&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These will convert to the following configurations on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way of entering them is fine&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249048#M350283</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T21:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows..</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249049#M350285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still no icmp replys. What do the fixup commands do? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/4/6/138645-ASA.png" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only see inspect icmp. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249049#M350285</guid>
      <dc:creator>noobie198</dc:creator>
      <dc:date>2013-05-07T21:44:01Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249050#M350286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They automatically allow the ICMP Echo Reply messages and Time Exceeded messages through the firewall without ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though the initial ICMP message needs to be allowed by ACL but the return messages are handled by the inspection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the internal host reply from the connected network even?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some firewall blocking the ICMP from on the host from networks that are not directly connect to it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you test connectivity with some TCP service?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have had some problems with some Windows computers every now and then that even if I allow the ICMP it just simply doesnt work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249050#M350286</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T21:49:33Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249051#M350288</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh, actually just noticed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you remove this NAT configuration, the Default PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And configure it in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic LAN interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this do "clear xlate" which clear all active NAT translations on the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try the ICMP again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:51:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249051#M350288</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T21:51:50Z</dc:date>
    </item>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows....</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249052#M350292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; You were right! The internal host is a Win 8 pc. Disabling the firewall on the public network setting did the trick. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 21:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/2249052#M350292</guid>
      <dc:creator>noobie198</dc:creator>
      <dc:date>2013-05-07T21:57:55Z</dc:date>
    </item>
  </channel>
</rss>

