<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RPF-CHECK Failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232882#M357874</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Probably something to do with overlapping NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the whole "packet-tracer" command and its whole output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesnt tell anything then might need to see the whole NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Apr 2013 14:19:43 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-26T14:19:43Z</dc:date>
    <item>
      <title>RPF-CHECK Failure</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232881#M357873</link>
      <description>&lt;P&gt;Hey gang, I'm trying to NAT a server to an outside interface on an ASA running 8.4. It isn't working and when I run packet tracer I see that I'm droping at the RPF-CHECK. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.254&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 50.198.198.19&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my nat config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.254&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 50.198.198.19&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody point me in the right direction on this?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232881#M357873</guid>
      <dc:creator>mvann</dc:creator>
      <dc:date>2019-03-12T01:35:24Z</dc:date>
    </item>
    <item>
      <title>RPF-CHECK Failure</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232882#M357874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Probably something to do with overlapping NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the whole "packet-tracer" command and its whole output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesnt tell anything then might need to see the whole NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 14:19:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232882#M357874</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-26T14:19:43Z</dc:date>
    </item>
    <item>
      <title>RPF-CHECK Failure</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232883#M357875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; JouniForss,&lt;/P&gt;&lt;P&gt;Thanks for the help. Here are the requested outputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp 173.226.30.0 255.255.255.0 host 192.168.1.254 eq https&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network obj-192.168.1.254&lt;BR /&gt; nat (inside,outside) static 50.198.198.19&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.254&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 50.198.198.19&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 3 extended permit tcp 173.226.30.0 255.255.255.0 host 192.168.1.254 eq ssh (hitcnt=0) 0x66fd5e9c&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 4 extended permit tcp 173.226.30.0 255.255.255.0 host 192.168.1.254 eq https (hitcnt=8) 0x4d4c811c&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 20:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232883#M357875</guid>
      <dc:creator>mvann</dc:creator>
      <dc:date>2013-04-26T20:42:37Z</dc:date>
    </item>
    <item>
      <title>RPF-CHECK Failure</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232884#M357876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you please confirm your packet-tracer command was like below?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 173.226.30.1 1500 50.198.198.19 443&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 21:01:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232884#M357876</guid>
      <dc:creator>palanivelm</dc:creator>
      <dc:date>2013-04-26T21:01:55Z</dc:date>
    </item>
    <item>
      <title>RPF-CHECK Failure</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232885#M357877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You didnt show the "packet-tracer" command you used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that you are using the command with wrong parameters since the connection specified by the "packet-tracer" didnt match any NAT rule at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were probably using the real IP address of the host as the destination IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would explain why we see the RPF Fail. Since on the other direction it matches the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 21:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232885#M357877</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-26T21:19:18Z</dc:date>
    </item>
    <item>
      <title>RPF-CHECK Failure</title>
      <link>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232886#M357878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; JouniForss,&lt;/P&gt;&lt;P&gt;I checked and you are correct, I was entering the packet tracer command wrong. I assumed that because the FW rules had changed to reflect the true destination, not a nat'ed address, that I should do the same for packet tracer. I appreciate you pointing that out.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Using the correct packet-tracer commands everything appears to work correctly. Unfortunatly only one of the two NAT'ed IPs responds. I'll do some digging and post relevant outputs in a different post when I get my head around the current issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 18:34:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/rpf-check-failure/m-p/2232886#M357878</guid>
      <dc:creator>mvann</dc:creator>
      <dc:date>2013-04-29T18:34:34Z</dc:date>
    </item>
  </channel>
</rss>

