<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT RPF-check Failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221018#M350560</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One possible solution is to configure Static Identity NAT for this single "inside" IP address to "dmz"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you will have to configure some NAT0 configure for this host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR you will have to remove the Dynamic Policy NAT/PAT towards the "dmz" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 May 2013 23:49:52 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-03T23:49:52Z</dc:date>
    <item>
      <title>NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221016#M350556</link>
      <description>&lt;P&gt;Hi Team.&lt;/P&gt;&lt;P&gt;i know in Cisco PIX til 8.2 OS, if i have Nat control disabled and ACL permitting connection from Low Secirity ( DMZ ) to High Secuurity (INSIDE) then connectino should be successful, and i dont need any STATIC identity nat of inside IP to be created.&lt;/P&gt;&lt;P&gt;But i have Cisco PIX 525 with&amp;nbsp; Version 7.2(2)&lt;/P&gt;&lt;P&gt;Which is not allowing connection from DMZ to INSIDE , although nat control is disabled. and giving RFP check failure, &lt;/P&gt;&lt;P&gt;any thought?&lt;/P&gt;&lt;P&gt;PIT525PIXINET# sh running-config nat-control&lt;/P&gt;&lt;P&gt;no nat-cont&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input dmZ&amp;nbsp; tcp 192.168.85.4 65000 10.34.21.25 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group DMZ in interface DMZ&lt;/P&gt;&lt;P&gt;access-list DMZ extended permit ip 192.168.85.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 access-list NATDMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip DMZ host 192.168.85.4 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (38.43.45.5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 33, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.0.0.0 255.0.0.0 DMZ 192.168.85.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (192.168.85.200)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 69899671, untranslate_hits = 7&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: DMZ&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:38:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221016#M350556</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2019-03-12T01:38:30Z</dc:date>
    </item>
    <item>
      <title>NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221017#M350558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the output of the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run global 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show run nat 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show access-list NAT-DMZ&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show access-list NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or alternatively show the whole running configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems you have Dynamic Policy NAT/PAT configurations from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; that are causing problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words the direction &lt;STRONG&gt;"dmz" -&amp;gt; "inside" &lt;/STRONG&gt;is fine, but on the way back &lt;STRONG&gt;"inside" -&amp;gt; "dmz"&lt;/STRONG&gt; the traffic does hit a certain NAT rule and because of this it fails&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is causing the problems&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 access-list NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; match ip inside 10.0.0.0 255.0.0.0 DMZ 192.168.85.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Return traffic from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; is matching this Dynamic Policy NAT/PAT rule on the way back and the connection fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the easiest way to look at this would be the whole configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 23:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221017#M350558</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T23:47:59Z</dc:date>
    </item>
    <item>
      <title>NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221018#M350560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One possible solution is to configure Static Identity NAT for this single "inside" IP address to "dmz"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you will have to configure some NAT0 configure for this host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR you will have to remove the Dynamic Policy NAT/PAT towards the "dmz" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 May 2013 23:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221018#M350560</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-03T23:49:52Z</dc:date>
    </item>
    <item>
      <title>NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221019#M350562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is it true in 7.2 OS that if i access inside machine 10.34.21.25 from DMZ. then response from INSIDE to DMZ should have 10.34.21.25 as Source IP in return packet?&lt;/P&gt;&lt;P&gt;what happening is i have a NAT rule that PAT allw traffic from 10.x.x.x (inside) to 192.168.85.200 when going to DMZ.&lt;/P&gt;&lt;P&gt;so when a reply is coming from inside machine 10.34.21.25 it is changed to 192.168.85.200 and firewall doesnt like it because packet was destined for 10.34.21.25 and on way back from inside to DMZ source has become 192.168.85.200 PAT IP.&lt;/P&gt;&lt;P&gt;if thats how firewall suppose to work, expecting same IP in source on way back form INSIDE to DMZ then i guess thats the problem.. am i right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 May 2013 00:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221019#M350562</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2013-05-04T00:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221020#M350565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we are looking at the connection initiation from "dmz" to "inside" the traffic DOESNT match any NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the reply/return traffic from the "inside" to "dmz" is coming through the firewall it matches a Dynamic Policy PAT configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (DMZ) 1 192.168.85.200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 access-list DMZNAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (DMZ) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 access-list DMZNAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont want to remove any existing NAT rules you might need to configure NAT0 for example if the host IP addresses used in the "packet-tracer" command are the only IP addresses that need to communicate with eachother&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-NAT0 permit ip host 192.168.85.4 host 10.34.21.35&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 0 access-list DMZ-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the host is expecting to receive the reply to the connection from the IP address to which it attempted to form the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 May 2013 00:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221020#M350565</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-04T00:13:04Z</dc:date>
    </item>
    <item>
      <title>NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221021#M350567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you for both of you, actually there were few firewalls in organization and on few only allowing ACL makes the connection and on few we need to create static identity nat + ACL. &lt;/P&gt;&lt;P&gt;and on few with only ACL its not working due to above issue of RFP check, so all concepts were mixed, i was clarifying all stuff, your answeres helped in clearing my understanding.&lt;/P&gt;&lt;P&gt;thank you very much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 May 2013 00:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221021#M350567</guid>
      <dc:creator>ahmad82pkn</dc:creator>
      <dc:date>2013-05-04T00:20:56Z</dc:date>
    </item>
    <item>
      <title>NAT RPF-check Failure</title>
      <link>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221022#M350568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to be of help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 May 2013 00:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rpf-check-failure/m-p/2221022#M350568</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-04T00:23:46Z</dc:date>
    </item>
  </channel>
</rss>

