Iam having an Asymmetric NAT rule problem between VPN client and DMZ on a ASA 8.2(5). We used to have a two ASAs one for client VPN and one for the main firewall. In the old config the VPN client ASA routed the CVPN traffic through the network out the main firewall so it would be filtered via a content engine. As you guess split tunneling is disabled in both old and new configs. I recently clustered these two in an HA pair, terminated the VPN client on the cluster with the main firewalling, and used the route inside 0.0.0.0 0.0.0.0 10.100.18.1 (core router) tunneled command so the traffic would be routed through the core so it can be filtered when using the internet on C-VPN. Nat 0 and rules are carried over fine. Everything else works fine access to all inside resources and internet connectivity
Mar 25 2012 20:06:23 : %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src Outside:10.100.120.29 dst DMZ:10.100.150.105 (type 8, code 0) denied due to NAT reverse path failure
routes:
route Outside 10.100.120.0 255.255.255.0 INTERNET-RTR-Gateway
route inside 0.0.0.0 0.0.0.0 10.100.18.1 tunneled
Route Outside 0.0.0.0 0.0.0.0 INTERNET-RTR-Gateway
Route inside 10.0.0.0 255.0.0.0 10.100.18.1
Since it is tunneled do I need 10.100.120.0 on the inside?
The weird thing is the traffic to the internet is not dropped due to nat fail.
Ip reverse-path verify is disabled on all interfaces.