<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Subtype: rpf-check - drop on NAT ASA 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755785#M531616</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Its use of the NATTED (Translated) IP Address that does this, I had this very problem today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="http://www.petenetlive.com/KB/Article/0000904.htm"&gt;Packet-Tracer Fails Phase 7 Subtype: rpf-check Result: DROP&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Jan 2014 09:13:04 GMT</pubDate>
    <dc:creator>Peter Long</dc:creator>
    <dc:date>2014-01-14T09:13:04Z</dc:date>
    <item>
      <title>Subtype: rpf-check - drop on NAT ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755783#M531609</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have following static PAT configured on ASA (ver 8.4), we can telnet from outside to the nated local ip address, however when we do the packet-trace from outside interface it got drop at the NAT rule level (see bellow), however when we do the packet-trace from inside it allowed every steps. Also we cant telnet from one of the outside ip address which is in the same subnet of outside interface, however we can telnet from anywhere outside (from the internet). &lt;/P&gt;&lt;P&gt;below is the nat/acl configuraiton&lt;/P&gt;&lt;P&gt;--------------------------------------------&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network inside-net2&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network ue&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp telnet telnet &lt;/P&gt;&lt;P&gt;object network ue-ssh&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ssh ssh &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host 172.20.4.187 log &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the packet-tracer output&lt;/P&gt;&lt;P&gt;---------------------------------------------&lt;/P&gt;&lt;P&gt;XXX-SA5550-CORP-INT-F03# packet-tracer input outside tcp 78.101.207.81 telnet 172.20.4.187 telnet detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.20.4.184&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.248 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any host 172.20.4.187 log &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x242d17c8, priority=13, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=140, user_data=0x1d9ef140, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.20.4.187, mask=255.255.255.255, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x2485deb0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=21884, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x24a6d280, priority=20, domain=lu, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=139, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network ue&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp telnet telnet &lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; out id=0x242d87d0, priority=6, domain=nat-reverse, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=101, user_data=0x254e8d58, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=172.20.4.187, mask=255.255.255.255, port=23, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is show xlate outuput&lt;/P&gt;&lt;P&gt;--------------------------------------&lt;/P&gt;&lt;P&gt; XXXX-ASA5550-CORP-INT-F03# sh xlate &lt;/P&gt;&lt;P&gt;3 in use, 114 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;/P&gt;&lt;P&gt;TCP PAT from inside:172.20.4.187 23-23 to outside:78.100.72.220 23-23&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:00:42 timeout 0:00:00&lt;/P&gt;&lt;P&gt;TCP PAT from inside:172.20.4.187 22-22 to outside:78.100.72.220 22-22&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:13:03 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my questions again are:&lt;/P&gt;&lt;P&gt;why is the packet tracer failed even I can telent from outside to inside nated ip..?&lt;/P&gt;&lt;P&gt;why im not able to telnet from the same subnet of ASA outside interface, it shouldn't i considered as one of the outside IPs?.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate if some one can advise on this please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755783#M531609</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2019-03-11T21:21:30Z</dc:date>
    </item>
    <item>
      <title>Subtype: rpf-check - drop on NAT ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755784#M531611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We figured out the packet-tracer drop issue, that was actualy due to our destination IP address. We used the real ip instead of Nated IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However with the same static PAT I cant still telnet from a source as with the same subnet IP address.?.&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;object network ue&lt;/P&gt;&lt;P style="border-collapse: collapse; list-style-type: none;"&gt;nat (inside,outside) static interface service tcp telnet telnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;** assume outside interface ip is 10.10.10.220 and I'm tring to telnet from a source ip as 10.10.10.218. If the ACL is allowed as "access-list outside extended permit ip any host 172.20.4.187" why can't I telnet with the source ip from the same subnet from outside interface ip address..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Sep 2011 21:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755784#M531611</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2011-09-07T21:03:52Z</dc:date>
    </item>
    <item>
      <title>Subtype: rpf-check - drop on NAT ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755785#M531616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes Its use of the NATTED (Translated) IP Address that does this, I had this very problem today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A href="http://www.petenetlive.com/KB/Article/0000904.htm"&gt;Packet-Tracer Fails Phase 7 Subtype: rpf-check Result: DROP&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pete&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 09:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755785#M531616</guid>
      <dc:creator>Peter Long</dc:creator>
      <dc:date>2014-01-14T09:13:04Z</dc:date>
    </item>
    <item>
      <title>Subtype: rpf-check - drop on NAT ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755786#M531622</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default , you are not allowed to telnet the lowest security interface of ASA. That's the security feature of ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Prateek Verma&lt;/P&gt;&lt;DIV id="__tbSetup"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 14:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/subtype-rpf-check-drop-on-nat-asa-8-4/m-p/1755786#M531622</guid>
      <dc:creator>prateeve</dc:creator>
      <dc:date>2014-01-14T14:13:34Z</dc:date>
    </item>
  </channel>
</rss>

