<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re:Deny TCP/ICMP Reverse Path Check on interface inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107625#M394663</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can it be that after enabling IP routing , the default -gateway configurations are not relavant anymore , that I lost access from outside ?&amp;nbsp; But even after disabling IP routing I am not able to restore access &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anup&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Dec 2012 11:48:27 GMT</pubDate>
    <dc:creator>Anup Sasikumar</dc:creator>
    <dc:date>2012-12-12T11:48:27Z</dc:date>
    <item>
      <title>Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107619#M394653</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/1/5/117512-Sim2.png" alt="Sim2.png" class="jive-image-thumbnail jive-image" height="403" onclick="" width="488" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was trying to take access of a Switch at the remote site from outside using interface VLAN 10 IP Y.Y.Y.Y&lt;/P&gt;&lt;P&gt;The public IP at my location is X.X.X.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I could see logs on PIX on remote site mentioning that &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #993300;"&gt;Deny TCP/ICMP Reverse Path Check from X.X.X.X to Y.Y.Y.Y on interface inside &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #993300;"&gt;Deny TCP/ICMP Reverse Path Check from Y.Y.Y.Y to X.X.X.X on interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I am not able to get connected. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Upon searching the configuration , it was found that reverse path verifcation is enabled on both outside and inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also it was noted from the ARP table that ARP entry exists for Y.Y.Y.Y and is learned on the outside interface of PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue started happening when IP routing was enabled on SW2. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Being a Web Server /DB Server environment , Is it safe to disable Reverse path verification on inside interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or should I be checking in detail the routes configured on PIX ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anup&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107619#M394653</guid>
      <dc:creator>Anup Sasikumar</dc:creator>
      <dc:date>2019-03-12T00:33:22Z</dc:date>
    </item>
    <item>
      <title>Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107620#M394654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;reverse path checking explains itself, if the ASA recevies a packet on and interface and the ASA's routing table has that subnet/route on another interface - reverse path checking will drop it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check all of your routing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 12:07:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107620#M394654</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-12-06T12:07:09Z</dc:date>
    </item>
    <item>
      <title>Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107621#M394657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anup.&lt;/P&gt;&lt;P&gt;I would suggest the following:&lt;/P&gt;&lt;P&gt;-Do not disable Reverse path verification.&lt;/P&gt;&lt;P&gt;-Disable 'ip routing' on switch SW2 by using 'no ip routing' command. (I presume SW1 has its routing diabled).&lt;/P&gt;&lt;P&gt;-Configure the following on SW2:&lt;/P&gt;&lt;P&gt;interface vlan 10&lt;/P&gt;&lt;P&gt; ip add Y.Y.Y.Y m.m.m.m.m (where Y.Y.Y.Y is as the same subnet as 1.1.1.1, and m.m.m.m is the mask)&lt;/P&gt;&lt;P&gt; no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip default-gateway 1.1.1.1&lt;/P&gt;&lt;PRE style="font-size: 10px; color: #000000; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;Now you should be able to connect. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 13:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107621#M394657</guid>
      <dc:creator>reachabdulla</dc:creator>
      <dc:date>2012-12-06T13:02:35Z</dc:date>
    </item>
    <item>
      <title>Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107622#M394660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anup,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can disable the reverse path command from the interface if you know is trsuted but at the end it is better to fix your routing problem to avoid problems in the future.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 13:07:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107622#M394660</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2012-12-06T13:07:08Z</dc:date>
    </item>
    <item>
      <title>Re:Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107623#M394661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have lost access to the switch using VLAN IP from outside after enabling IP routing . Can it be because of the Reverse path check is denying the traffic? I tried disabling the ip routing ,but still I am unable to restore connectivity to the swutch from outside. Would reconfiguring the interface VLAN IP work ?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2012 13:49:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107623#M394661</guid>
      <dc:creator>Anup Sasikumar</dc:creator>
      <dc:date>2012-12-11T13:49:13Z</dc:date>
    </item>
    <item>
      <title>Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107624#M394662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want it to remain secure, don't add an external IP to the switches. They should have an internal IP and be accessed via firewall NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2012 21:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107624#M394662</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2012-12-11T21:36:34Z</dc:date>
    </item>
    <item>
      <title>Re:Deny TCP/ICMP Reverse Path Check on interface inside</title>
      <link>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107625#M394663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can it be that after enabling IP routing , the default -gateway configurations are not relavant anymore , that I lost access from outside ?&amp;nbsp; But even after disabling IP routing I am not able to restore access &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anup&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 11:48:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/deny-tcp-icmp-reverse-path-check-on-interface-inside/m-p/2107625#M394663</guid>
      <dc:creator>Anup Sasikumar</dc:creator>
      <dc:date>2012-12-12T11:48:27Z</dc:date>
    </item>
  </channel>
</rss>

