<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asymmetric NAT rules matched for forward and reverse flows in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589238#M587275</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you will reach your Webserver with their public IP, which is located in your DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You must use DNS Doctoring to rewrite the DNS request:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_example09186a00807968c8.shtml"&gt;http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_example09186a00807968c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mfg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Dec 2010 14:20:31 GMT</pubDate>
    <dc:creator>Michael Wollner</dc:creator>
    <dc:date>2010-12-17T14:20:31Z</dc:date>
    <item>
      <title>Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589231#M587258</link>
      <description>&lt;P&gt;I have this configuration on my structure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 93.63.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; primary internet connection (WAN)&lt;/P&gt;&lt;P&gt;Outside2&amp;nbsp;&amp;nbsp;&amp;nbsp; 85.33.x.x&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; backup internet connection if primary down&lt;/P&gt;&lt;P&gt;inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200.1.1.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local network connection (LAN)&lt;/P&gt;&lt;P&gt;DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30.30.30.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security zone (mail server and http server location)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i try to go to my website (&lt;A href="http://www.lamaddalexxxxxxx.xx" target="_blank"&gt;www.lamaddalexxxxxxx.xx&lt;/A&gt;) from the machine that exit to internet using 200.1.1.3 the firewal make this error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flow; Connection protocol src interface_name:source_address/source_port destinterface_name:dest_address/dest_port&lt;/P&gt;&lt;P&gt;denied due NAT reverse path failure.&lt;/P&gt;&lt;P&gt;An attempt to connect to a mapped host using its actual address war reject.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in Detail the error is&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flows; connection for tcp src inside:(pc_name)/43799 dst DMZ:30.30.30.30/80 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;this is my running-config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;name 200.1.x.x yyyyy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside1&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 93.63.x.x 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 200.1.1.3 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 30.30.30.10 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; nameif outside2&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 85.33.x.x 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 90&lt;BR /&gt; ip address 10.0.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;regex domainlist1 "\.myspace\.com"&lt;BR /&gt;regex Youtube "\.youtube\.com"&lt;BR /&gt;regex myspace "\.myspace\.com"&lt;BR /&gt;regex facebook "\.facebook\.com"&lt;BR /&gt;regex applicationheader "application/.*"&lt;BR /&gt;regex contenttype "Content-Type"&lt;BR /&gt;boot system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns domain-lookup outside1&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup DMZ&lt;BR /&gt;dns domain-lookup outside2&lt;BR /&gt;dns domain-lookup management&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network obj-93.63.x.x&lt;BR /&gt;object-group network obj_any&lt;BR /&gt;object-group network obj_any-01&lt;BR /&gt;object-group network obj_any-02&lt;BR /&gt;object-group network obj-30.30.30.30-06&lt;BR /&gt;object-group network obj-30.30.30.30-07&lt;BR /&gt;object-group network obj_any-03&lt;BR /&gt;object-group network obj_any-04&lt;BR /&gt;object-group network obj_any-05&lt;BR /&gt;----&lt;BR /&gt;object-group service internet&lt;BR /&gt; service-object tcp-udp eq www &lt;BR /&gt; service-object tcp eq https &lt;BR /&gt; service-object tcp eq pop3 &lt;BR /&gt; service-object tcp eq smtp &lt;BR /&gt; service-object tcp eq 3389 &lt;BR /&gt; service-object tcp eq 32000 &lt;BR /&gt; service-object tcp eq imap4 &lt;BR /&gt; service-object tcp eq 2703 &lt;BR /&gt; service-object tcp eq domain &lt;BR /&gt; service-object tcp eq hostname &lt;BR /&gt; service-object tcp-udp eq 995 &lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service posta tcp&lt;BR /&gt; description posta&lt;BR /&gt; port-object eq pop3&lt;BR /&gt; port-object eq smtp&lt;BR /&gt; port-object eq 32000&lt;BR /&gt; port-object eq 995&lt;BR /&gt;object-group network Admin&lt;BR /&gt; ---&lt;BR /&gt;object-group network Amministrazione&lt;BR /&gt; description Pool ip amministrazione&lt;BR /&gt; network-object host XXX&lt;BR /&gt; ----&lt;BR /&gt; group-object Admin&lt;BR /&gt;-----&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object ip &lt;BR /&gt; group-object internet&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object ip &lt;BR /&gt; group-object internet&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt; service-object ip &lt;BR /&gt; group-object internet&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt; service-object ip &lt;BR /&gt; group-object internet&lt;BR /&gt;access-list DMZ_access_in extended permit object-group internet any any inactive &lt;BR /&gt;access-list DMZ_access_in extended permit ip host 30.30.30.30 any &lt;BR /&gt;access-list DMZ_access_in extended permit ip 200.1.0.0 255.255.0.0 host 30.30.30.30 &lt;BR /&gt;access-list DMZ_access_in extended permit ip host 30.30.30.20 any &lt;BR /&gt;access-list DMZ_access_in extended permit object-group internet 93.63.x.y 255.255.255.248 host 30.30.30.30 &lt;BR /&gt;access-list inside_mpc extended permit object-group TCPUDP any any eq www inactive &lt;BR /&gt;access-list outside1_mpc extended permit object-group TCPUDP any any eq www inactive &lt;BR /&gt;access-list inside_mpc_1 extended permit tcp object-group Amministrazione any eq www inactive &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 200.1.100.96 255.255.255.224 &lt;BR /&gt;access-list outside1_access_in remark Migration: End of expansion&lt;BR /&gt;access-list outside1_access_in extended permit object-group internet any host 93.63.x.x &lt;BR /&gt;access-list outside1_access_in remark Migration: End of expansion&lt;BR /&gt;access-list outside1_access_in extended permit object-group internet any object-group Amministrazione &lt;BR /&gt;access-list inside_access_in remark Migration: End of expansion&lt;BR /&gt;access-list inside_access_in extended permit ip object-group Amministrazione any &lt;BR /&gt;access-list inside_access_in remark Migration: End of expansion&lt;BR /&gt;access-list inside_access_in extended permit object-group internet object-group Amministrazione any &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_3 any host Prestano inactive &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any 93.63.x.y 255.255.255.248 &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 any 85.33.x.x 255.255.255.248 &lt;BR /&gt;access-list inside_access_in extended permit object-group internet any host 30.30.30.30 &lt;BR /&gt;access-list inside_access_in extended permit object-group internet host 30.30.30.30 200.1.0.0 255.255.0.0 &lt;BR /&gt;access-list inside_access_in extended permit object-group internet object-group Amministrazione host 30.30.30.30 &lt;BR /&gt;access-list inside_access_in extended permit ip 200.1.0.0 255.255.0.0 200.1.100.96 255.255.255.224 &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_4 host Prestano any inactive &lt;BR /&gt;access-list outside2_access_in remark Migration: End of expansion&lt;BR /&gt;access-list outside2_access_in extended permit object-group internet any host 85.33.x.x &lt;BR /&gt;access-list test standard permit 200.1.0.0 255.255.0.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside1 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu outside2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPNmedark 200.1.100.100-200.1.100.120 mask 255.255.0.0&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside1&lt;BR /&gt;asdm image disk0:/asdm-633.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside1) 101 interface&lt;BR /&gt;global (inside) 2 interface&lt;BR /&gt;global (DMZ) 1 30.30.30.30-30.30.30.50 netmask 255.0.0.0&lt;BR /&gt;global (outside2) 101 interface&lt;BR /&gt;nat (inside) 101 200.1.0.0 255.255.0.0&lt;BR /&gt;nat (DMZ) 101 30.30.30.20 255.255.255.255&lt;BR /&gt;nat (DMZ) 101 30.30.30.30 255.255.255.255&lt;BR /&gt;static (DMZ,outside1) tcp interface www 30.30.30.30 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface smtp 30.30.30.30 smtp netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface pop3 30.30.30.30 pop3 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface 32000 30.30.30.30 32000 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface imap4 30.30.30.30 imap4 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface 3389 30.30.30.30 3389 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface sip 30.30.30.30 sip netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ) 200.1.0.0 200.1.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (DMZ,inside) 93.63.167.220 30.30.30.30 netmask 255.255.255.255 &lt;BR /&gt;access-group outside1_access_in in interface outside1&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-group outside2_access_in in interface outside2&lt;BR /&gt;route outside1 0.0.0.0 0.0.0.0 93.63.x.y 1 track 1&lt;BR /&gt;route outside2 0.0.0.0 0.0.0.0 85.x.x.x 254&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.192.168 255.255.255.255 management&lt;BR /&gt;http 192.168.192.169 255.255.255.255 management&lt;BR /&gt;http Enia 255.255.255.255 inside&lt;BR /&gt;http La_Manno 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sla monitor 123&lt;BR /&gt; type echo protocol ipIcmpEcho 85.18.200.200 interface outside1&lt;BR /&gt; num-packets 3&lt;BR /&gt; frequency 10&lt;BR /&gt;sla monitor schedule 123 life forever start-time now&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map esterna_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map esterna_map interface outside1&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto map management_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map management_map interface management&lt;BR /&gt;crypto ca server &lt;BR /&gt; shutdown&lt;BR /&gt; smtp from-address admin@ciscoasa.null&lt;BR /&gt;crypto isakmp enable outside1&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable management&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 123 reachability&lt;BR /&gt;telnet Garrincha 255.255.255.255 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh Enia 255.255.255.255 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access management&lt;BR /&gt;priority-queue DMZ&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec svc webvpn&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; svc ask enable default webvpn&lt;BR /&gt;group-policy Medarchiver internal&lt;BR /&gt;group-policy Medarchiver attributes&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; ipv6-vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value test&lt;BR /&gt; default-domain none&lt;BR /&gt; intercept-dhcp disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; msie-proxy pac-url none&lt;BR /&gt; vlan none&lt;BR /&gt; nac-settings none&lt;BR /&gt; address-pools value VPNmedark&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; port-forward disable &lt;BR /&gt;&amp;nbsp; http-proxy disable&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; svc dtls enable&lt;BR /&gt;&amp;nbsp; svc mtu 1406&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive 20&lt;BR /&gt;&amp;nbsp; svc compression none&lt;BR /&gt;&amp;nbsp; svc modules none&lt;BR /&gt;&amp;nbsp; svc ask enable default webvpn&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; user-storage none&lt;BR /&gt;&amp;nbsp; storage-objects value credentials,cookies&lt;BR /&gt;&amp;nbsp; storage-key none&lt;BR /&gt;&amp;nbsp; hidden-shares none&lt;BR /&gt;&amp;nbsp; smart-tunnel disable&lt;BR /&gt;&amp;nbsp; activex-relay enable&lt;BR /&gt;&amp;nbsp; file-entry enable&lt;BR /&gt;&amp;nbsp; file-browsing enable&lt;BR /&gt;&amp;nbsp; url-entry enable&lt;BR /&gt;&amp;nbsp; smart-tunnel auto-signon disable&lt;BR /&gt;&amp;nbsp; svc df-bit-ignore disable&lt;BR /&gt;&amp;nbsp; svc routing-filtering-ignore disable&lt;BR /&gt;---&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group LaMaddalena type remote-access&lt;BR /&gt;tunnel-group LaMaddalena general-attributes&lt;BR /&gt; address-pool VPNmedark&lt;BR /&gt;tunnel-group LaMaddalena ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group medarchiver type remote-access&lt;BR /&gt;tunnel-group medarchiver general-attributes&lt;BR /&gt; address-pool VPNmedark&lt;BR /&gt;tunnel-group medarchiver ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map FACEBOOK&lt;BR /&gt; match access-list outside1_mpc&lt;BR /&gt;class-map type regex match-any DomainBlockList&lt;BR /&gt; match regex facebook&lt;BR /&gt; match regex myspace&lt;BR /&gt; match regex Youtube&lt;BR /&gt;class-map rallenta&lt;BR /&gt; match access-list inside_mpc_1&lt;BR /&gt;class-map DMZ-class&lt;BR /&gt; match any&lt;BR /&gt;class-map type inspect http match-all BlockDomainClass&lt;BR /&gt; match request header host regex class DomainBlockList&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map type inspect http match-all AppHeaderClass&lt;BR /&gt; match request header regex contenttype regex applicationheader&lt;BR /&gt;class-map httptraffic&lt;BR /&gt; match access-list inside_mpc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http http_inspection_policy&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; match request method connect&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt; class AppHeaderClass&lt;BR /&gt;&amp;nbsp; drop-connection log&lt;BR /&gt; class BlockDomainClass&lt;BR /&gt;&amp;nbsp; reset log&lt;BR /&gt;policy-map type inspect http http_rallenta_siti&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action drop-connection&lt;BR /&gt; class BlockDomainClass&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;policy-map FACEBOOK&lt;BR /&gt; class FACEBOOK&lt;BR /&gt;&amp;nbsp; inspect http http_rallenta_siti &lt;BR /&gt;&amp;nbsp; police input 32000 1500&lt;BR /&gt;&amp;nbsp; police output 32000 1500&lt;BR /&gt;policy-map type inspect dns migrated_dns_map_1&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;policy-map inside-policy&lt;BR /&gt; class httptraffic&lt;BR /&gt;&amp;nbsp; inspect http http_rallenta_siti &lt;BR /&gt;&amp;nbsp; police input 32000 1500&lt;BR /&gt;&amp;nbsp; police output 32000 1500&lt;BR /&gt; class rallenta&lt;BR /&gt;&amp;nbsp; inspect http http_rallenta_siti &lt;BR /&gt;&amp;nbsp; police input 16000 1500&lt;BR /&gt;policy-map DMZ-policy&lt;BR /&gt; class DMZ-class&lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; priority&lt;BR /&gt;&amp;nbsp; set connection conn-max 256 per-client-max 50 &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy FACEBOOK interface outside1&lt;BR /&gt;service-policy inside-policy interface inside&lt;BR /&gt;service-policy DMZ-policy interface DMZ&lt;BR /&gt;prompt hostname context &lt;BR /&gt;service call-home&lt;BR /&gt;---&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt; profile profile0&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;---&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration export full&lt;BR /&gt;Cryptochecksum:f619d3adf0cfdda948a9f736818c7386&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589231#M587258</guid>
      <dc:creator>elettrico75</dc:creator>
      <dc:date>2019-03-11T19:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589232#M587261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have a lot of overlapping ip addresses configured on your translation statement:&lt;/P&gt;&lt;P&gt;IP Address of 30.30.30.30 is used more than once which is incorrect:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 30.30.30.30-30.30.30.50 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 30.30.30.30 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 93.63.167.220 30.30.30.30 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are you actually trying to configure?&lt;/P&gt;&lt;P&gt;30.30.30.30 can't be configured as a NAT statement as well as global statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please kindly advise what ip address is your source traffic, and what destination ip address you are trying to reach to understand the traffic flow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 10:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589232#M587261</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-16T10:18:59Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589233#M587263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have web and mail server 30.30.30.30 in DMZ&lt;/P&gt;&lt;P&gt;cisco can nat the external IP to this host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What should i do for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 11:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589233#M587263</guid>
      <dc:creator>elettrico75</dc:creator>
      <dc:date>2010-12-16T11:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589234#M587266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need the following 2 for sure:&lt;/P&gt;&lt;P&gt;global (DMZ) 1 30.30.30.30-30.30.30.50 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 30.30.30.30 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remove the above 2 lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is also incorrect:&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 93.63.167.220 30.30.30.30 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;(--&amp;gt; can you please advise what you are trying to achieve with this line?)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After removing the above, please kindly "clear xlate"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 11:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589234#M587266</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-16T11:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589235#M587268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;this is now the situation&lt;/P&gt;&lt;P&gt;global (outside1) 101 interface&lt;BR /&gt;global (inside) 2 interface&lt;BR /&gt;global (outside2) 101 interface&lt;BR /&gt;nat (inside) 101 200.1.0.0 255.255.0.0&lt;BR /&gt;nat (DMZ) 101 30.30.30.20 255.255.255.255&lt;BR /&gt;static (DMZ,outside1) tcp interface www 30.30.30.30 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface smtp 30.30.30.30 smtp netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface pop3 30.30.30.30 pop3 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface 32000 30.30.30.30 32000 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface imap4 30.30.30.30 imap4 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface 3389 30.30.30.30 3389 netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside1) tcp interface sip 30.30.30.30 sip netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ) 200.1.0.0 200.1.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is access rules&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit object-group internet any any inactive &lt;BR /&gt;access-list DMZ_access_in extended permit ip host 30.30.30.30 any &lt;BR /&gt;access-list DMZ_access_in extended permit ip 200.1.0.0 255.255.0.0 host 30.30.30.30 &lt;BR /&gt;access-list DMZ_access_in extended permit ip host 30.30.30.20 any &lt;BR /&gt;access-list DMZ_access_in extended permit object-group internet 93.63.167.216 255.255.255.248 host 30.30.30.30 &lt;BR /&gt;access-list inside_mpc extended permit object-group TCPUDP any any eq www inactive &lt;BR /&gt;access-list outside1_mpc extended permit object-group TCPUDP any any eq www inactive &lt;BR /&gt;access-list inside_mpc_1 extended permit tcp object-group Amministrazione any eq www inactive &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 200.1.100.96 255.255.255.224 &lt;BR /&gt;access-list outside1_access_in remark Migration: End of expansion&lt;BR /&gt;access-list outside1_access_in extended permit object-group internet any host 93.63.167.220 &lt;BR /&gt;access-list outside1_access_in remark Migration: End of expansion&lt;BR /&gt;access-list outside1_access_in extended permit object-group internet any object-group Amministrazione &lt;BR /&gt;access-list inside_access_in remark Migration: End of expansion&lt;BR /&gt;access-list inside_access_in extended permit ip object-group Amministrazione any &lt;BR /&gt;access-list inside_access_in remark Migration: End of expansion&lt;BR /&gt;access-list inside_access_in extended permit object-group internet object-group Amministrazione any &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_3 any host Prestano inactive &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any 93.63.167.216 255.255.255.248 &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 any 85.33.214.152 255.255.255.248 &lt;BR /&gt;access-list inside_access_in extended permit object-group internet any host 30.30.30.30 &lt;BR /&gt;access-list inside_access_in extended permit object-group internet host 30.30.30.30 200.1.0.0 255.255.0.0 &lt;BR /&gt;access-list inside_access_in extended permit object-group internet object-group Amministrazione host 30.30.30.30 &lt;BR /&gt;access-list inside_access_in extended permit ip 200.1.0.0 255.255.0.0 200.1.100.96 255.255.255.224 &lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_4 host Prestano any inactive &lt;BR /&gt;access-list outside2_access_in remark Migration: End of expansion&lt;BR /&gt;access-list outside2_access_in extended permit object-group internet any host 85.33.214.154 &lt;BR /&gt;access-list test standard permit 200.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;and this is the message &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-710003: {TCP|UDP} access denied by ACL from &lt;BR /&gt;source_IP/source_port to interface_name:dest_IP/service&lt;BR /&gt;The adaptive security appliance denied an attempt to connect to the interface service. For example, the adaptive security appliance received an SNMP request from an unauthorized SNMP management station. If this message appears frequently, it can indicate an attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp; Dec 16 2010&amp;nbsp;&amp;nbsp;&amp;nbsp; 12:38:54&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Garrincha&amp;nbsp;&amp;nbsp;&amp;nbsp; 48937&amp;nbsp;&amp;nbsp;&amp;nbsp; 93.63.167.220&amp;nbsp;&amp;nbsp;&amp;nbsp; 80&amp;nbsp;&amp;nbsp;&amp;nbsp; TCP access denied by ACL from Garrincha/48937 to inside:93.63.167.220/80&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 11:50:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589235#M587268</guid>
      <dc:creator>elettrico75</dc:creator>
      <dc:date>2010-12-16T11:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589236#M587270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, can you please explain what is supposed to be the source ip address, and the destination ip address that you are trying to access? and are you trying to NAT anything at all? or you are trying to access its real ip address?&lt;/P&gt;&lt;P&gt;Further to that, can you please advise what ip address you have named "Garrincha"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Dec 2010 10:42:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589236#M587270</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-12-17T10:42:38Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589237#M587273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The external internet can nat in dmz for http smtp and other services (see the pictures)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;200.1.1.3 is the gateway from selected IP (like garrincha).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i can't resolve and go to dmz from internal ethernet lan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Dec 2010 13:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589237#M587273</guid>
      <dc:creator>elettrico75</dc:creator>
      <dc:date>2010-12-17T13:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric NAT rules matched for forward and reverse flows</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589238#M587275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you will reach your Webserver with their public IP, which is located in your DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You must use DNS Doctoring to rewrite the DNS request:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_example09186a00807968c8.shtml"&gt;http://www.cisco.com/en/US/partner/products/ps6120/products_configuration_example09186a00807968c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mfg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Dec 2010 14:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-nat-rules-matched-for-forward-and-reverse-flows/m-p/1589238#M587275</guid>
      <dc:creator>Michael Wollner</dc:creator>
      <dc:date>2010-12-17T14:20:31Z</dc:date>
    </item>
  </channel>
</rss>

