<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic KS : You are awesome as in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414254#M857461</link>
    <description>&lt;P&gt;KS : You are awesome as always!!! keep up the good work!!&lt;/P&gt;</description>
    <pubDate>Tue, 11 Nov 2014 22:39:08 GMT</pubDate>
    <dc:creator>spkmparab124</dc:creator>
    <dc:date>2014-11-11T22:39:08Z</dc:date>
    <item>
      <title>Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414247#M857432</link>
      <description>&lt;P&gt;Hello list,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping someone could offer any suggestions on how to go about troubleshooting this particular issue further or maybe explain in details what this error message really means?&amp;nbsp; Please note that this setup has been working all along and there isn't anything special that I believe has been implemented on the ASA to complicate the setup or for that fact break it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Data path:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic scenario includes a Global-to-Local NAT on the ASA FW.&amp;nbsp; The client initiates a tcp connection to a routable IP which is a one-to-one NAT from the outside-to-inside interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the running-config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_access_in extended permit ip 10.24.14.0 255.255.255.0 host 10.84.14.121&lt;BR /&gt;static (inside,outside) 10.84.14.121 172.26.48.3 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat-control&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip 172.26.48.0 255.255.255.0 10.24.14.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW# &lt;STRONG&gt;show xlate detail interface outside debug global 10.84.14.121&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;NAT from inside:172.26.48.3&amp;nbsp; to outside:10.84.14.121 flags s idle 0:19:23 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Capturing traffic on the "outside" interface:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1: 04:45:57.481313 802.1Q vlan#111 P0 10.24.14.1.11919 &amp;gt; 10.84.14.121.30000: S 4092650306:4092650306(0) win 5840 &amp;lt;mss 1300,sackOK,timestamp 3923221967 0,nop,wscale 8,opt-33:1900145e8450f5070000&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 04:46:00.482122 802.1Q vlan#111 P0 10.24.14.1.11919 &amp;gt; 10.84.14.121.30000: S 4092650306:4092650306(0) win 5840 &amp;lt;mss 1300,sackOK,timestamp 3923224967 0,nop,wscale 8,opt-33:1900145e8450f5070000&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"show log" indicates:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;lt;165&amp;gt;:Jan 07 21:14:10 UTC: %ASA-session-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:10.24.14.1/11919 dst inside:10.84.14.121/30000 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the "packet-tracer" output from the FW:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW#&amp;nbsp; &lt;STRONG&gt;packet-tracer input outside tcp 10.24.14.1 1024 10.84.14.121 30000 detailed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT-EXEMPT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x1c4dbb78, priority=6, domain=nat-exempt-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=75, user_data=0x1c371e68, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip=10.24.14.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip=172.26.0.0, mask=255.255.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414247#M857432</guid>
      <dc:creator>seltser_michael</dc:creator>
      <dc:date>2019-03-11T16:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414248#M857437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Normal behavior: DNAT comes in. Return traffic is supposed to do SNAT out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, NAT exempt is explicitly denying the reverse SNAT when going back out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This causes the ASA to DNAT coming in, but it doesn't SNAT when leaving.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 08:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414248#M857437</guid>
      <dc:creator>bagga_ajeet</dc:creator>
      <dc:date>2010-01-08T08:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414249#M857442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you need the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound line 1 deny ip &lt;/STRONG&gt;host 172.26.48.3 host 10.24.14.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either the above or the host on the outside should talk to the inside host using its private address (172.26.48.3) and not the translated address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 13:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414249#M857442</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-08T13:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414250#M857446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the host 172.26.48.3, or the parent network, isn't in the NAT exempt allow, it is implicitly denied. Only if the aggregate network is in the exempt, would you explicitly need to deny it serially ahead of the allow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly, ASA doesn't seem to have a notion of state associated with NATs where assumed SNAT on reverse for a static DNAT forward, overrides exempt on the return.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd scream RFE to Cisco, unless the enhancement further breeds sloppiness.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jan 2010 17:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414250#M857446</guid>
      <dc:creator>bagga_ajeet</dc:creator>
      <dc:date>2010-01-08T17:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414251#M857450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;About statefullness of NAT, this was there in older ASA images, i think somehwere in 8.2 this got broken. but after CSCth72642 NAT is statefullness is fixed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Fadi.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Dec 2010 14:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414251#M857450</guid>
      <dc:creator>fadlouni</dc:creator>
      <dc:date>2010-12-10T14:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414252#M857453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Totally Agree with Sankar, you are hitting one Nat statement (the static) and then in the return, as per the NAT order of operations, it wont use the Existing Xlate, it will use the NAT 0 statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try the workaround from Sankar, it will work for your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 05:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414252#M857453</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-01-30T05:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Denied due to NAT reverse path failure</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414253#M857457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have posted on this thread as I am having the exact same problem, but have not been able to resolve it by following the suggestions provided. I should point out that I have limited experience with this gear, so please bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have established a VPN between two ASA 5520 units, one of which has a public IP address on the outside interface and the other is behind a DSL modem that has a public IP on the outside, but has a 192.168.2.1 address on the inside, which gives my second ASA a 192.168.2.2 address on it's outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside networks of each ASA are 192.168.49.0 and 192.168.6.0. Each end can successfully connect to other systems on the Internet, but the issue of using remote desktop on from the inside to the inside is where I am getting the dreaded "Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:192.168.6.100/61013 dst inside:192.168.49.100/3389 denied due to NAT reverse path failure" message. Note that the ASA with the 192.168.6.0 network is fine when connecting to several ASA's with 192.168.X.0 networks on the inside, and it is only this one that is causing issue for me, so I don't think I need to change the configuration on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe I understand why it is happening based on the explanations provided; when the packets try to go back to the 192.168.6.0 network, my rule that says anything going over the tunnel should be exempt from NAT, so they end up lost in the 192.168.2.0 network between the ASA and the DSL modem. As stated above, I can see that the IPSec tunnel is successfully established, so I really just need to figure out what is happening with the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further complicating matters is the fact that I do not have CLI access to the ASA, and must use the ASDM. I have copied the lines that I believe are relevant from the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list inside_access_in extended permit ip any object 192.168.6.0
&lt;SPAN&gt;access-list outside_access_in extended permit ip object-group 192.168.6.0&lt;/SPAN&gt; any&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list outside_1_cryptomap extended permit ip 192.168.49.0 255.255.255.0 192.168.6.0 255.255.255.0
&lt;SPAN&gt;&lt;PRE&gt;nat (inside,outside) source static 192.168.49.0 destination static 192.168.6.0&lt;/PRE&gt;
&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Clue? I noticed that the translate/untranslate hits are 0 for this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help gratly appreciated,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hib &lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Mar 2011 12:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414253#M857457</guid>
      <dc:creator>hibbert.miller</dc:creator>
      <dc:date>2011-03-21T12:55:28Z</dc:date>
    </item>
    <item>
      <title>KS : You are awesome as</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414254#M857461</link>
      <description>&lt;P&gt;KS : You are awesome as always!!! keep up the good work!!&lt;/P&gt;</description>
      <pubDate>Tue, 11 Nov 2014 22:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414254#M857461</guid>
      <dc:creator>spkmparab124</dc:creator>
      <dc:date>2014-11-11T22:39:08Z</dc:date>
    </item>
    <item>
      <title>Hi we came across the same</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414255#M857465</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we came across the same error message of Asymmetric Nat deny rules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;to resolve this&amp;nbsp;I added a new NAT rule in the ASDM GUI, above the default NAT which sends all traffic out on the outbound interface IP. the rule was as shown below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/anyconnect_0.png" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hope this helps people out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Carl.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Dec 2014 15:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414255#M857465</guid>
      <dc:creator>Network Team - LCC</dc:creator>
      <dc:date>2014-12-02T15:57:37Z</dc:date>
    </item>
    <item>
      <title>Worked like a charm! thank</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414256#M857484</link>
      <description>&lt;P&gt;Worked like a charm! thank you sir !&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 15:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414256#M857484</guid>
      <dc:creator>Neil Preeper</dc:creator>
      <dc:date>2016-02-03T15:10:09Z</dc:date>
    </item>
    <item>
      <title>This helped me also!  -</title>
      <link>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414257#M857485</link>
      <description>&lt;P&gt;This helped me also! &amp;nbsp;- Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2016 15:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/denied-due-to-nat-reverse-path-failure/m-p/1414257#M857485</guid>
      <dc:creator>robertramsey</dc:creator>
      <dc:date>2016-09-19T15:32:23Z</dc:date>
    </item>
  </channel>
</rss>

