<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problems with &amp;quot;Asymmetric NAT rules matched for forward in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786953#M493466</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check that on the tunnel group, if you have a DHCP server or the pool assign to it. Also, you need to check what method is being used. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run all | inc vpn-addr-assign &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Nov 2011 21:16:03 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-11-14T21:16:03Z</dc:date>
    <item>
      <title>Problems with "Asymmetric NAT rules matched for forward and reverse flows- denied due to NAT reverse path failure"</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786950#M493459</link>
      <description>&lt;P&gt;Using 8.2.5&lt;/P&gt;&lt;P&gt;I have a AnyConnect VPN that is not functioning. I'm able to connect but not able to access anything on the LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm getting the following errrors in ASDM.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;5&lt;/TD&gt;&lt;TD&gt;Nov 13 2011&lt;/TD&gt;&lt;TD&gt;20:41:05&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;192.168.0.5&lt;/TD&gt;&lt;TD&gt;3389&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;&lt;/TD&gt;&lt;TD&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:&lt;STRONG&gt;192.168.0.42&lt;/STRONG&gt;/1513 dst inside:&lt;STRONG&gt;192.168.0.5&lt;/STRONG&gt;/3389 denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My sanitized configuration is included&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Totally confused with the Nat Transversal issue.&amp;nbsp; I would appreciate some assistance.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SHO ACCESS-L is below&lt;/P&gt;&lt;P&gt;sh access-l&lt;/P&gt;&lt;P&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound; 1 elements; name hash: 0x467c8ce4&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound line 1 extended permit ip 192.168.0.0 255.255.255.0 VPNNet 255.255.255.0 (hitcnt=0) 0x330c9a6d&lt;/P&gt;&lt;P&gt;access-list outside_access; 8 elements; name hash: 0xee117655&lt;/P&gt;&lt;P&gt;access-list outside_access line 1 extended permit tcp any host OutsideDMZWeb eq www (hitcnt=1172) 0xd20993c1&lt;/P&gt;&lt;P&gt;access-list outside_access line 2 extended permit tcp any host OutsideMailServer eq smtp (hitcnt=219) 0x4f13736b&lt;/P&gt;&lt;P&gt;access-list outside_access line 3 extended permit tcp any host OutsideMailServer eq www (hitcnt=1) 0x93c66598&lt;/P&gt;&lt;P&gt;access-list outside_access line 4 extended permit tcp any host OutsideMailServer eq https (hitcnt=253) 0x04017f02&lt;/P&gt;&lt;P&gt;access-list outside_access line 5 extended permit tcp any host OutsideSQL object-group ts 0xe3b6a426&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access line 5 extended permit tcp any host OutsideSQL eq 3389 (hitcnt=4) 0x8dc511ee&lt;/P&gt;&lt;P&gt;access-list outside_access line 6 extended permit tcp any host OutsideMailServer object-group ts 0x4b6801cf&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access line 6 extended permit tcp any host OutsideMailServer eq 3389 (hitcnt=5) 0x67b35434&lt;/P&gt;&lt;P&gt;access-list outside_access line 7 extended permit tcp any host OutsideDMZWeb object-group ts 0xf2df7313&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside_access line 7 extended permit tcp any host OutsideDMZWeb eq 3389 (hitcnt=244) 0x87a8e911&lt;/P&gt;&lt;P&gt;access-list outside_access line 8 extended permit tcp any host OutsideDMZWeb eq https (hitcnt=0) 0x51043a7b&lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound; 2 elements; name hash: 0xb64b365a&lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound line 1 extended permit ip any VPNNet 255.255.255.0 (hitcnt=0) 0x503e0af3&lt;/P&gt;&lt;P&gt;access-list inside_nat_outbound line 2 extended permit ip 192.168.0.0 255.255.255.0 VPNNet 255.255.255.0 (hitcnt=0) 0x72590365&lt;/P&gt;&lt;P&gt;access-list argen01_splitTunnelAcl; 1 elements; name hash: 0x2895c8be&lt;/P&gt;&lt;P&gt;access-list argen01_splitTunnelAcl line 1 standard permit 192.168.0.0 255.255.255.0 (hitcnt=0) 0xd35fe9fd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh nat&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 outside VPNNet 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 inside VPNNet 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 dmz VPNNet 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.0.0 255.255.255.0 management VPNNet 255.255.255.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside host InsideMailServer outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to OutsideMailServer&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 38454, untranslate_hits = 47764&lt;BR /&gt;&amp;nbsp; match ip inside host InsideSQL outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to OutsideSQL&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 93, untranslate_hits = 2982&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (12.12.12.12 [Interface PAT])&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 352039, untranslate_hits = 12431&lt;BR /&gt;&amp;nbsp; match ip inside any inside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any management any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 101 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;BR /&gt;&amp;nbsp; match ip inside any dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;P&gt;NAT policies on Interface dmz:&lt;BR /&gt;&amp;nbsp; match ip dmz host InsideDMZWeb outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to OutsideDMZWeb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 1267, untranslate_hits = 5840&lt;BR /&gt;&amp;nbsp; match ip dmz any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (12.12.12.15)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 139, untranslate_hits = 30&lt;BR /&gt;&amp;nbsp; match ip dmz any dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;&amp;nbsp; match ip dmz any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;&lt;P&gt;NAT policies on Interface management:&lt;BR /&gt;&amp;nbsp; match ip management any outside any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;BR /&gt;&amp;nbsp; match ip management any dmz any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no translation group, implicit deny&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; policy_hits = 0&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786950#M493459</guid>
      <dc:creator>tbrooks</dc:creator>
      <dc:date>2019-03-11T21:49:52Z</dc:date>
    </item>
    <item>
      <title>Problems with "Asymmetric NAT rules matched for forward and reve</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786951#M493461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just a quick question, 192.168.0.42 and 192.168.0.45 seems to be on the same network (inside), why 192.168.0.42 IP address is coming from the outside? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally these error messages are referred as problem with NAT&amp;nbsp; (it enters with the real IP and then going out the packet gets natted). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 19:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786951#M493461</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-11-14T19:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with "Asymmetric NAT rules matched for forward</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786952#M493462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like the VPN is picking up an ip address from dhcp.  Instead of the "ippool"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from my iPad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 21:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786952#M493462</guid>
      <dc:creator>tbrooks</dc:creator>
      <dc:date>2011-11-14T21:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with "Asymmetric NAT rules matched for forward</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786953#M493466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can check that on the tunnel group, if you have a DHCP server or the pool assign to it. Also, you need to check what method is being used. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run all | inc vpn-addr-assign &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2011 21:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-quot-asymmetric-nat-rules-matched-for-forward-and/m-p/1786953#M493466</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-11-14T21:16:03Z</dc:date>
    </item>
  </channel>
</rss>

