<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA rpf-check DROP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186352#M359901</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet-tracer worked, also works for real. Can you offer an explanation, surely I must have done something wrong that I can learn from?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Mar 2013 13:56:43 GMT</pubDate>
    <dc:creator>3moloz123</dc:creator>
    <dc:date>2013-03-22T13:56:43Z</dc:date>
    <item>
      <title>ASA rpf-check DROP</title>
      <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186348#M359897</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since a day ago or so I managed to somehow break all my forwarded ports. The error is "rpf-check", as if the packet would take a different way out but I fail to see how that could be the case. Can anyone share som insight in this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# my ext-ip and internal server&lt;/P&gt;&lt;P&gt;object network someserver &lt;/P&gt;&lt;P&gt; host 10.0.0.240&lt;/P&gt;&lt;P&gt;object network ext-ip &lt;/P&gt;&lt;P&gt; host 201.201.28.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# destination nat 8080 on ext-ip to someservers 8080, tcp.&lt;/P&gt;&lt;P&gt;object network someserver&lt;/P&gt;&lt;P&gt; nat (inside,outside) static ext-ip service tcp 8080 8080 &lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any ext-ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Make sure it's first of the ACLs for debugging when ingressing "outside" interface (have no idea how hitcnt=1, I keep testing repeatedly from an external host but the counter doesn't increment)&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any object someserver object-group DM_INLINE_TCP_2 log disable 0xaf785b68&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit tcp any host 10.0.0.240 eq www log disable (hitcnt=0) 0xbfcabb69 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access_in line 1 extended permit tcp any host 10.0.0.240 eq 8080 log disable (hitcnt=1) 0x8c1c69ed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Make sure it's first of the ACLs for debugging when egressing "inside" interface&lt;/P&gt;&lt;P&gt;access-list inside_access_out line 1 extended permit tcp any host 10.0.0.240 object-group DM_INLINE_TCP_5 0xf82e5cf9 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_access_out line 1 extended permit tcp any host 10.0.0.240 eq www (hitcnt=0) 0x53d6c9d3 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_access_out line 1 extended permit tcp any host 10.0.0.240 eq 8080 (hitcnt=0) 0x09b88225 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# show run nat show no hits&lt;/P&gt;&lt;P&gt;1 (inside) to (ownit) source static skotertech mobenga-ownit-ext-ip service tcp 8080 8080 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# a packet-tracer claims it's allowed, but rpf-check fails. Verified on "someserver" using tcpdump that no packets ever reach it&lt;/P&gt;&lt;P&gt;asa# packet-tracer input outside tcp 5.6.129.90 50565 10.0.0.240 8080 detailed &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9eb6d70, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt; hits=23728394646, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object someserver object-group DM_INLINE_TCP_2 log disable &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; group-object http&lt;/P&gt;&lt;P&gt; port-object eq 8080&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xca788920, priority=13, domain=permit, deny=false&lt;/P&gt;&lt;P&gt; hits=1, user_data=0xc7d9dcb0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=10.0.0.240, mask=255.255.255.255, port=8080, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9eb94d0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=526056144, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9f4a2a0, priority=20, domain=lu, deny=false&lt;/P&gt;&lt;P&gt; hits=31373932, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xccdb1760, priority=18, domain=flow-export, deny=false&lt;/P&gt;&lt;P&gt; hits=16814247, user_data=0xcbc65ed8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xca5e1990, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;/P&gt;&lt;P&gt; hits=82465316, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;access-group inside_access_out out interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit tcp any host 10.0.0.240 object-group DM_INLINE_TCP_5 &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_5 tcp&lt;/P&gt;&lt;P&gt; group-object http&lt;/P&gt;&lt;P&gt; port-object eq 8080&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xcc043d10, priority=13, domain=permit, deny=false&lt;/P&gt;&lt;P&gt; hits=1, user_data=0xc7d9d1c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=10.0.0.240, mask=255.255.255.255, port=8080, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=any, output_ifc=inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network someserver&lt;/P&gt;&lt;P&gt; nat (inside,outside) static ext-ip service tcp 8080 8080 &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0xcc1e3190, priority=6, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0xcc77b7c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=10.0.0.240, mask=255.255.255.255, port=8080, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:16:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186348#M359897</guid>
      <dc:creator>3moloz123</dc:creator>
      <dc:date>2019-03-12T01:16:08Z</dc:date>
    </item>
    <item>
      <title>ASA rpf-check DROP</title>
      <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186349#M359898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are coming from public network to your local LAN then the destination IP address of the "packet-tracer" cant be a private IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please use the Mapped IP address as the destination of the "packet-tracer" command and copy/paste the output here again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see the inbound direction of the "packet-tracer" test goes through without any sort of NAT phase. Yet when it checks the reverse direction for the private IP address that you used it will naturally hit the Static PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally the configuration that breaks other NAT configurations on the new ASA 8.3+ software is done in the Section 1 as Twice NAT / Manual NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually do all Static PAT and Static NAT and Object Network NAT in Section 2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 10:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186349#M359898</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-19T10:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA rpf-check DROP</title>
      <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186350#M359899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I thought I was supposed to use it like that because the ACLs are written not using the actual (public) IP but the mapped IP even on the external interface. A packet-tracer against the public IP and the port just gives a deny:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa# packet-tracer input outside tcp 5.6.129.90 50565 201.201.28.20 8080 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9eb6d70, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt; hits=23767585144, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 201.201.28.16&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.248 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xc9fb59e8, priority=11, domain=permit, deny=true&lt;/P&gt;&lt;P&gt; hits=27734438, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Btw, the "show run nat show no hits" in my first post was not masked correctly. It's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;# show run nat show no hits&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;1 (inside) to (outside) source static someserver ext-ip service tcp 8080 8080&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 22:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186350#M359899</guid>
      <dc:creator>3moloz123</dc:creator>
      <dc:date>2013-03-19T22:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA rpf-check DROP</title>
      <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186351#M359900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service TEST&lt;/P&gt;&lt;P&gt;service tcp source eq 8080&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static someserver network-ext-ip service TEST TEST&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 permit tcp any host 10.0.0.240 eq 8080&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run the packet tracer again and post the result &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Mar 2013 23:12:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186351#M359900</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-03-19T23:12:38Z</dc:date>
    </item>
    <item>
      <title>ASA rpf-check DROP</title>
      <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186352#M359901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The packet-tracer worked, also works for real. Can you offer an explanation, surely I must have done something wrong that I can learn from?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Mar 2013 13:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186352#M359901</guid>
      <dc:creator>3moloz123</dc:creator>
      <dc:date>2013-03-22T13:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA rpf-check DROP</title>
      <link>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186353#M359902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically to my understanding you first did your configuration with Network Object NAT and it worked and then after some NAT changes stopped working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far we havent seen the whole configuration when the problem was on so we can only guess what happened&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you added Julios suggested NAT configuration then the problem has been an added Section 1 NAT rule that broke the Network Object NAT rules originally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julios suggested Static PAT configuration that is inserted in line "1" of Section 1 would therefore override the problematic Section 1 rule that originally broke the Network Object NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this doesnt really correct the problematic configuration, just goes around it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally this might happen if you use "any" parameter in the NAT configurations of Section 1 or possibly leave the "destination" configuration of Section 1 NAT blank.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again I can only guess.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wrote a document on NAT 8.3+ if you&amp;nbsp; want a better explanation about the new NAT format and operation, check it out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-31116" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Mar 2013 14:04:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-rpf-check-drop/m-p/2186353#M359902</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-22T14:04:56Z</dc:date>
    </item>
  </channel>
</rss>

