cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4488
Views
0
Helpful
4
Replies

(acl-drop) Flow is denied by configured rule

mahesh18
Level 6
Level 6

Hi,

ACL is configured.

Below is result of packet tracer

packet-tracer input outside udp 172.24.93.24 1024 192.168.80.1 4223

Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:

Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
class-map inspection_default
match default-inspection-traffic
policy-map global_policy
class inspection_default
inspect http
service-policy global_policy global
Additional Information:

Phase: 6
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional Information:

Phase: 7
Type: NAT
Subtype: rpf-check
Result: DROP
Config:
nat (inside) 1 0.0.0.0 0.0.0.0
match ip inside any outside any
dynamic translation to pool 1 (10.61.31.22)
translate_hits = 57990, untranslate_hits = 972
Additional Information:


Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule

Regards

MAhesh

2 Accepted Solutions

Accepted Solutions

what does destination of 10.61.x.x in your NAT 0 have to do with this traffic you are testing:

packet-tracer input outside udp 172.24.93.24 1024 192.168.80.1 4223

a valid NAT 0 for this traffic would have 192.168.80.1 as the destination

View solution in original post

Hi Mahesh,

Can you please create additional entry in the nat 0 acl so the nat looks like

access-list name extended permit ip any 10.61.x.x mask

access-list name extended permit ip 10.61.x.x mask any

Please test and let me know how it fares.

Regards,
Dinesh Moudgil

P.S. Please rate helpful posts.

Cisco Network Security Channel - https://www.youtube.com/c/CiscoNetSec/

View solution in original post

4 Replies 4

ryancisco01
Level 1
Level 1

I don't know your setup, however it appears this is VPN traffic, and you would usually not want to nat vpn traffic. I would suggest creating a "NAT 0" statement for your VPN traffic and try again.

yes it is vpn traffic and we have nat 0 acl.

nat 0 acl has source as any and destination is 10.61.x.x

Regards

MAhesh

what does destination of 10.61.x.x in your NAT 0 have to do with this traffic you are testing:

packet-tracer input outside udp 172.24.93.24 1024 192.168.80.1 4223

a valid NAT 0 for this traffic would have 192.168.80.1 as the destination

Hi Mahesh,

Can you please create additional entry in the nat 0 acl so the nat looks like

access-list name extended permit ip any 10.61.x.x mask

access-list name extended permit ip 10.61.x.x mask any

Please test and let me know how it fares.

Regards,
Dinesh Moudgil

P.S. Please rate helpful posts.

Cisco Network Security Channel - https://www.youtube.com/c/CiscoNetSec/
Review Cisco Networking for a $25 gift card