<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Routing on mgmt interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3334647#M1040301</link>
    <description>&lt;P&gt;Hello ,&lt;/P&gt;
&lt;P&gt;I'm setting up a pair of A/P failover asa 5525-X with v9.8. &lt;/P&gt;
&lt;P&gt;I learned that the mgmt interface uses another routing table (from a post elsewhere).&lt;/P&gt;
&lt;P&gt;I also have SFR module using this same interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is:&lt;/P&gt;
&lt;P&gt;Can I use this mgmt interface to route inside or outside traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;eg. route management 10.1.20.0 255.255.255.0 10.1.16.254&lt;/P&gt;
&lt;P&gt;interface management0/0&lt;/P&gt;
&lt;P&gt;nameif management&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip add 10.1.16.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;interface g0/1&lt;/P&gt;
&lt;P&gt;nameif dmz&lt;/P&gt;
&lt;P&gt;security-level 50&lt;/P&gt;
&lt;P&gt;ip add 10.1.14.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(10.1.16.254 = GW of management vlan)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:23:12 GMT</pubDate>
    <dc:creator>h.dam</dc:creator>
    <dc:date>2020-02-21T15:23:12Z</dc:date>
    <item>
      <title>Routing on mgmt interface</title>
      <link>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3334647#M1040301</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;
&lt;P&gt;I'm setting up a pair of A/P failover asa 5525-X with v9.8. &lt;/P&gt;
&lt;P&gt;I learned that the mgmt interface uses another routing table (from a post elsewhere).&lt;/P&gt;
&lt;P&gt;I also have SFR module using this same interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question is:&lt;/P&gt;
&lt;P&gt;Can I use this mgmt interface to route inside or outside traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;eg. route management 10.1.20.0 255.255.255.0 10.1.16.254&lt;/P&gt;
&lt;P&gt;interface management0/0&lt;/P&gt;
&lt;P&gt;nameif management&lt;/P&gt;
&lt;P&gt;security-level 100&lt;/P&gt;
&lt;P&gt;ip add 10.1.16.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;interface g0/1&lt;/P&gt;
&lt;P&gt;nameif dmz&lt;/P&gt;
&lt;P&gt;security-level 50&lt;/P&gt;
&lt;P&gt;ip add 10.1.14.1 255.255.255.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(10.1.16.254 = GW of management vlan)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3334647#M1040301</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2020-02-21T15:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Routing on mgmt interface</title>
      <link>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3334671#M1040302</link>
      <description>ASA cannot use the management interface if the SFR is being used.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;The quick start guide for the 5525-x explains how the interfaces behave quite well I found:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/5500X/5500x_quick_start.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/quick_start/5500X/5500x_quick_start.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Go through the doc but a snip from it:&lt;BR /&gt;&lt;BR /&gt;    Management 0/0 belongs to the ASA FirePOWER module. The interface is Up, but otherwise unconfigured on the ASA. The ASA FirePOWER module can then use this interface to access the ASA inside network and use the inside interface as the gateway to the Internet.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Note: Do not configure an IP address for this interface in the ASA configuration. Only configure an IP address in the FirePOWER configuration. You should consider this interface as completely separate from the ASA in terms of routing.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;    ASDM access on the inside interface&lt;BR /&gt;&lt;BR /&gt;    NAT : Interface PAT for all traffic from inside and management to outside.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Note: If you want to deploy a separate router on the inside network, then you can route between management and inside. In this case, you can manage both the ASA and ASA FirePOWER module on Management 0/0 with the appropriate configuration changes.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Treat the SFR as a 'separate' appliance that uses the management port to connect (for SFR management). Once you get Firepower configured you can add routes in the firepower interface (ASDM or FMC or the SFR CLI)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you are NOT going to use the SFR module then you CAN use the management interface in the ASA configuration.&lt;BR /&gt;&lt;BR /&gt;You should also disable the SFR  module in the config see &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/modules-sfr.html#pgfId-1486644" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/firewall/asa-firewall-cli/modules-sfr.html#pgfId-1486644&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;correct for showing management routes,  "show route management-only" always takes me a few tries of show route x.x.x.x before I remember.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;</description>
      <pubDate>Tue, 20 Feb 2018 22:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3334671#M1040302</guid>
      <dc:creator>John Telford</dc:creator>
      <dc:date>2018-02-20T22:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: Routing on mgmt interface</title>
      <link>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3336129#M1040303</link>
      <description>&lt;P&gt;Its clear in the explanation. I keep mgmt interface only for SFR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks very much.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 18:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-on-mgmt-interface/m-p/3336129#M1040303</guid>
      <dc:creator>h.dam</dc:creator>
      <dc:date>2018-02-22T18:37:29Z</dc:date>
    </item>
  </channel>
</rss>

