<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA routing issue part 2 in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827934#M262067</link>
    <description>&lt;P&gt;Hi guys, not sure if you can still recall my previous post about routing issue, hehe. Anyways this one is new. When I inherited this Cisco ASA device from a previous Net Ad. I haven't modified much of his settings. BTW, Am I allowed to post ip addresses here for a more detailed explanation? Written in &lt;SPAN style="color: #0000ff;"&gt;BLUE&lt;/SPAN&gt; are &lt;SPAN style="color: #0000ff;"&gt;comments&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyways, here is the issue.&lt;/P&gt;
&lt;P&gt;device has static routes:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Below are local ip scopes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;192.168.130.x 255.255.255.0 192.168.130.x(virtual gateway)&lt;/P&gt;
&lt;P&gt;192.168.131.x 255.255.255.0 192.168.131.x(virtual gateway)&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Below are default routes to WAN(ISP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;0.0.0.0 0.0.0.0 x.x.x.x.ISP1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;0.0.0.0 0.0.0.0 x.x.x.xISP2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/0: inside security level 100 192.168.150.x 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/1 DMZ security level 50 172.16.x.x 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/2: Outside-ISP2 seucirty level 0 x.x.x.x 255.255.255.248&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/3: Outside-ISP1 security level 0 x.x.x.x 255.255.255.248&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Access Rules&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone DMZ&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp&amp;nbsp;&amp;nbsp;allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone inside&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone management&amp;nbsp; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="color: #0000ff;"&gt;//ignore this since management port is not being use as of the moment&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone Outside-ISP2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any x.x.x.x (one of ISP2 ip block useable ip) permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any x.x.x.x (another of ISP2 ip block useable ip) permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp and domain&amp;nbsp;permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone Outside-ISP1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any domain permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Lastly NAT rules&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;DMZ (2 static routes)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;1. Static x.x.x.x NAT'ed to ISP2 one of the useable ip&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;2. Static x.x.x.x NAT'ed to ISP2&amp;nbsp;second of the useable ip&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Inside (1 Exempt rules, 1 static rules, 2 dynamic rules)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;1. Exempt any vlan(of the virtual gateway)/24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;2. Static InsideNetwork /16 (all local ip's i.e 192.168.130.x 192.168.131.x, etc)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;3. Dynamic policy any (going to a different WAN IP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;4. Dynamic any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Here's the situation. Currently we're all being redirected to our ISP2 and since ISP1 is not being fully utilized, I was thinking if I could switch the others in ISP1. So far what I did&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;1. Create an object for my IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;2. Added an "Access Rule" in "inside" interface and moved it to the top and destination address is "ISP1"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;But I'm still getting the ISP2 WAN IP. So am I lacking something here?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Thanks in advance and good day!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Jeff&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Mar 2019 11:20:06 GMT</pubDate>
    <dc:creator>TECH-JEFF</dc:creator>
    <dc:date>2019-03-05T11:20:06Z</dc:date>
    <item>
      <title>Cisco ASA routing issue part 2</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827934#M262067</link>
      <description>&lt;P&gt;Hi guys, not sure if you can still recall my previous post about routing issue, hehe. Anyways this one is new. When I inherited this Cisco ASA device from a previous Net Ad. I haven't modified much of his settings. BTW, Am I allowed to post ip addresses here for a more detailed explanation? Written in &lt;SPAN style="color: #0000ff;"&gt;BLUE&lt;/SPAN&gt; are &lt;SPAN style="color: #0000ff;"&gt;comments&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Anyways, here is the issue.&lt;/P&gt;
&lt;P&gt;device has static routes:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Below are local ip scopes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;192.168.130.x 255.255.255.0 192.168.130.x(virtual gateway)&lt;/P&gt;
&lt;P&gt;192.168.131.x 255.255.255.0 192.168.131.x(virtual gateway)&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Below are default routes to WAN(ISP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;0.0.0.0 0.0.0.0 x.x.x.x.ISP1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;0.0.0.0 0.0.0.0 x.x.x.xISP2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Interface&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/0: inside security level 100 192.168.150.x 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/1 DMZ security level 50 172.16.x.x 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/2: Outside-ISP2 seucirty level 0 x.x.x.x 255.255.255.248&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;G0/3: Outside-ISP1 security level 0 x.x.x.x 255.255.255.248&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Access Rules&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone DMZ&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp&amp;nbsp;&amp;nbsp;allow&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone inside&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone management&amp;nbsp; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #000000;"&gt;&lt;SPAN style="color: #0000ff;"&gt;//ignore this since management port is not being use as of the moment&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone Outside-ISP2&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any x.x.x.x (one of ISP2 ip block useable ip) permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any x.x.x.x (another of ISP2 ip block useable ip) permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any icmp and domain&amp;nbsp;permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Zone Outside-ISP1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any domain permit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;any any ip deny implicit rule&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;//Lastly NAT rules&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;DMZ (2 static routes)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;1. Static x.x.x.x NAT'ed to ISP2 one of the useable ip&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;2. Static x.x.x.x NAT'ed to ISP2&amp;nbsp;second of the useable ip&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #000000;"&gt;Inside (1 Exempt rules, 1 static rules, 2 dynamic rules)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;1. Exempt any vlan(of the virtual gateway)/24&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;2. Static InsideNetwork /16 (all local ip's i.e 192.168.130.x 192.168.131.x, etc)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;3. Dynamic policy any (going to a different WAN IP)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;4. Dynamic any&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Here's the situation. Currently we're all being redirected to our ISP2 and since ISP1 is not being fully utilized, I was thinking if I could switch the others in ISP1. So far what I did&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;1. Create an object for my IP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;2. Added an "Access Rule" in "inside" interface and moved it to the top and destination address is "ISP1"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;But I'm still getting the ISP2 WAN IP. So am I lacking something here?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Thanks in advance and good day!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;Jeff&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 11:20:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827934#M262067</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2019-03-05T11:20:06Z</dc:date>
    </item>
    <item>
      <title>Hi Jeff,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827935#M262068</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;
&lt;P&gt;What version of ASA code are you running? You will basically need to create a dynamic NAT from the inside interface to the ISP1. Assuming you are running ASA 8.3+ code you will do the following:&lt;/P&gt;
&lt;P&gt;object network inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp; subnet 10.10.10.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp; nat (inside,ISP1) dynamic interface&lt;/P&gt;
&lt;P&gt;This takes the inside subnet and will NAT/PAT it to the ISP1 interface. You will need to either move this rule below your current dynamic rule or remove your dynamic rule from ISP2.&lt;/P&gt;
&lt;P&gt;Also, what metrics do you have set for your default routes? I would look at that if the above snippet doesn't work.&lt;/P&gt;
&lt;P&gt;Josh&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 04:14:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827935#M262068</guid>
      <dc:creator>josh000014</dc:creator>
      <dc:date>2016-02-14T04:14:06Z</dc:date>
    </item>
    <item>
      <title>Hi Josh,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827936#M262069</link>
      <description>&lt;P&gt;Hi Josh,&lt;/P&gt;
&lt;P&gt;Our Cisco ASA is using version 8.2(4)&lt;/P&gt;
&lt;P&gt;I need to set it to 255.255.255.255 subnet since as of the moment for testing purposes just my pc will switch over to ISP1&lt;/P&gt;
&lt;P&gt;nat (inside) 1 Test-Jefferson 255.255.255.255&lt;/P&gt;
&lt;P&gt;This is the Dynamic NAT rule I've created but once applied this NAT rule, my internet just shuts down.&lt;/P&gt;
&lt;P&gt;Our metrics are:&lt;/P&gt;
&lt;P&gt;0.0.0.0 0.0.0.0 ISP2 metric 1&lt;/P&gt;
&lt;P&gt;0.0.0.0 0.0.0.0 ISP2 metric 5&lt;/P&gt;
&lt;P&gt;I think this is the reason why I'm still redirected to ISP2&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 01:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827936#M262069</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-02-15T01:11:34Z</dc:date>
    </item>
    <item>
      <title>Hi Jeff,</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827937#M262070</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;
&lt;P&gt;Try with this&lt;/P&gt;
&lt;P&gt;global (ISP2) 2 interface&lt;/P&gt;
&lt;P&gt;nat (inside) 2 Test-Jefferson 255.255.255.255&lt;/P&gt;
&lt;P&gt;Also you may need to do a deny in the nat ACL for the nat (inside) 1 for the host Test-Jefferson.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Josh&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 01:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-asa-routing-issue-part-2/m-p/2827937#M262070</guid>
      <dc:creator>josh000014</dc:creator>
      <dc:date>2016-02-15T01:19:18Z</dc:date>
    </item>
  </channel>
</rss>

