<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic asa 5550 v8.25, asymmetric nat problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5550-v8-25-asymmetric-nat-problem/m-p/1915876#M458406</link>
    <description>&lt;P&gt;Hi all. This is complicated, I'll try to explain succinctly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA that is one end of an IPSEC tunnel. The IPSEC tunnel dumps traffic off onto the ASA, but instead of forwarding to the next hop, we see a log entry like the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar&amp;nbsp; 7 19:54:12 20.31.87.54 Mar&amp;nbsp; 8 00:54:12 %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:172.28.253.1/8080 dst inside:10.20.161.33/8080 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run a packet trace, the trace stops on an RPF check: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 3242&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0x24305f50, priority=0, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;hits=23428, user_data=0x24305ce0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally I would look at where the trace stopped and figure out the problem from there, in this case, the 'nat (inside) 0 0.0.0.0 0.0.0.0' statement; only problem is that statement doesn't show up in the config. Here are my actual NAT statements: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list nonat-outside-to-inside&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list nat-outside-to-inside&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-inside-to-outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list nat-inside-to-outside&lt;/P&gt;&lt;P&gt;nat (inside) 10 access-list nat-inside-to-client-priv&lt;/P&gt;&lt;P&gt;nat (inside) 15 access-list nat-inside-to-client-pub&lt;/P&gt;&lt;P&gt;nat (inside) 30 access-list nat-inside-to-inet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list 'nonat-outside-to-inside' has one relevant line concerning this specific traffic: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat-outside-to-inside line 11 extended permit ip 172.28.253.0 255.255.255.0 10.20.0.0 255.255.0.0 (hitcnt=0) 0xcba8a793 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And access-list nonat-inside-to-outside has nothing that matches both the source and destination. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I don't actually have a statement that matches the error shown in the packet trace. I'm kind of stuck. From my reading of the rpf literature, I guess its an anti-spoofing feature, which leads me to believe that the firewall is sending the traffic back into itself instead of forwarding it on to the next hop, and the RPF check says, nope, you already tried to send that thru me, so I'm going to kill it. Which it should -- but why isn't it forwarding it out to the legitimate next hop? Its like the traffic is getting lost in the middle of the firewall, and I'm thinking -- BUG! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kind of at a loss and considering opening a TAC case. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have any ideas? &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 22:39:25 GMT</pubDate>
    <dc:creator>wilkess</dc:creator>
    <dc:date>2019-03-11T22:39:25Z</dc:date>
    <item>
      <title>asa 5550 v8.25, asymmetric nat problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5550-v8-25-asymmetric-nat-problem/m-p/1915876#M458406</link>
      <description>&lt;P&gt;Hi all. This is complicated, I'll try to explain succinctly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA that is one end of an IPSEC tunnel. The IPSEC tunnel dumps traffic off onto the ASA, but instead of forwarding to the next hop, we see a log entry like the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar&amp;nbsp; 7 19:54:12 20.31.87.54 Mar&amp;nbsp; 8 00:54:12 %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:172.28.253.1/8080 dst inside:10.20.161.33/8080 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I run a packet trace, the trace stops on an RPF check: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 3242&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0x24305f50, priority=0, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;hits=23428, user_data=0x24305ce0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally I would look at where the trace stopped and figure out the problem from there, in this case, the 'nat (inside) 0 0.0.0.0 0.0.0.0' statement; only problem is that statement doesn't show up in the config. Here are my actual NAT statements: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list nonat-outside-to-inside&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list nat-outside-to-inside&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat-inside-to-outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list nat-inside-to-outside&lt;/P&gt;&lt;P&gt;nat (inside) 10 access-list nat-inside-to-client-priv&lt;/P&gt;&lt;P&gt;nat (inside) 15 access-list nat-inside-to-client-pub&lt;/P&gt;&lt;P&gt;nat (inside) 30 access-list nat-inside-to-inet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access list 'nonat-outside-to-inside' has one relevant line concerning this specific traffic: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat-outside-to-inside line 11 extended permit ip 172.28.253.0 255.255.255.0 10.20.0.0 255.255.0.0 (hitcnt=0) 0xcba8a793 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And access-list nonat-inside-to-outside has nothing that matches both the source and destination. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I don't actually have a statement that matches the error shown in the packet trace. I'm kind of stuck. From my reading of the rpf literature, I guess its an anti-spoofing feature, which leads me to believe that the firewall is sending the traffic back into itself instead of forwarding it on to the next hop, and the RPF check says, nope, you already tried to send that thru me, so I'm going to kill it. Which it should -- but why isn't it forwarding it out to the legitimate next hop? Its like the traffic is getting lost in the middle of the firewall, and I'm thinking -- BUG! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm kind of at a loss and considering opening a TAC case. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anybody have any ideas? &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5550-v8-25-asymmetric-nat-problem/m-p/1915876#M458406</guid>
      <dc:creator>wilkess</dc:creator>
      <dc:date>2019-03-11T22:39:25Z</dc:date>
    </item>
    <item>
      <title>asa 5550 v8.25, asymmetric nat problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5550-v8-25-asymmetric-nat-problem/m-p/1915877#M458407</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;adding the following static resolved this particular error: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.20.0.0 10.20.0.0 netmask 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why the implementor neglected to include a static allowing access from outside to interfaces i'll leave y'all to think about! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2012 16:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5550-v8-25-asymmetric-nat-problem/m-p/1915877#M458407</guid>
      <dc:creator>wilkess</dc:creator>
      <dc:date>2012-03-08T16:07:41Z</dc:date>
    </item>
  </channel>
</rss>

