From time to time when upgrading our ASA5520 firewalls, there is a change in how PMTU-D is handled by the ASA. When the ASAs were first installed it worked with no issue. After a certain upgrade the firewall started sending the ICMP DF bit set packets sourced from it's outside interface for VPN tunnel connected sites. I had to put in a NAT rule that said not to nat from the inside network to the ASA's outside interface IP address to make it work again.
Some time later after an upgrade, the ASA started sourcing the ICMP DF bit set packets from it's inside interface IP address, but it still said outside in the log messages. I had to change the NAT rule to not NAT to the outside but this time with the inside interface IP address.
Our latest upgrade 8.2(2) has broken PMTU-D again, but this time it is showing the same IP and interface in the log messages as the last version, but we are now getting NAT RPF error messages and the packets are dropped. Below are the log messages. I don't understand why the packets are not just sourced using the inside IP address and showing it as an inside interface. Has anyone else had this issue?
This packet was from server 192.168.2.9 on the inside to remote L2L VPN host 10.135.1.5 on the outside. 192.168.1.1 is the ASA inside interface IP address even though it shows as outside in the log messages which is why I had to put in the NAT statement in the previous ASA version.
Jul 19 2010 11:38:13: %ASA-6-602101: PMTU-D packet 1436 bytes greater than effective mtu 1406, dest_addr=10.135.1.5, src_addr=192.168.2.9, prot=UDP
Jul 19 2010 11:38:13: %ASA-7-609001: Built local-host outside:192.168.1.1
Jul 19 2010 11:38:13: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:192.168.1.1 dst inside:192.168.2.9 (type 3, code 4) denied due to NAT reverse path failure
Jul 19 2010 11:38:13: %ASA-7-609002: Teardown local-host outside:192.168.1.1 duration 0:00:00
This is the NAT command that worked before, but not after the upgrade. I removed this NAT rule hoping it would fix the issue, but it didn't.
access-list remote extended permit ip 192.168.2.0 255.255.248.0 host 192.168.1.1
nat (inside) 0 access-list remote
Any help is greatly appreciated.