<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325805#M1064275</link>
    <description>&lt;P&gt;Hi Quintin,&lt;/P&gt;
&lt;P&gt;I'm more concerned to know software version of your ASA because PBR is supported on cisco ASA with 9.4.1 and later.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As long as you have min required software version then here is my input on your query.&lt;/P&gt;
&lt;P&gt;- Since ASA is gateway of your guest network then there is no doubt that traffic for internet is reaching to the ASA.&lt;/P&gt;
&lt;P&gt;- As you mentioned that you have 2 internet facing interfaces on your ASA and wanted to route only guest LAN traffic through OUTSIDE-2 interface.&lt;/P&gt;
&lt;P&gt;- Looking into your configuration i can assume that you have 4 interfaces configured on you ASA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 1- LAN interface for all except guest interface (INSIDE)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 2- LAN interface of guest LAN (Vlan30, Company-Guest)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 3- &amp;nbsp;OUTSIDE interface for general traffic (OUTSIDE-1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 4- OUTSIDE interface for guest internet ( OUTSIDE-2 )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So first thing first, you should have &lt;STRONG&gt;ONLY &amp;nbsp;&lt;/STRONG&gt;a default route on your ASA for traffic coming from INSIDE and going through OUTSIDE-1&lt;/P&gt;
&lt;P&gt;Below route is not needed&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;route OUTSIDE-2 0.0.0.0 0.0.0.0 50.x.x.30 254&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Then NAT for INSIDE to OUTSIDE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network obj_any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (INSIDE,OUTSIDE-1) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming that you have correct ACL configured for INSIDE interface. But still you can share '' show run access-group'' here with me to review.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Till this point internet traffic from INSIDE to OUTSIDE should work without any issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now let's focus on your Guest requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you don't need these ACLs&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list ACL-OUTSIDE-IN extended permit ip any 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL-GUEST-IN extended deny ip any 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your interface configuration for ''Company-Guest'' and ''OUTSIDE-2'' is OK.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT for Guest&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network Company-Guest&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Subnet 10.x.x.0 255.255.255.0 &amp;lt;-- &lt;/STRONG&gt;subnet of guest vlan&lt;BR /&gt;&lt;STRONG&gt;nat (Company-Guest,OUTSIDE-1) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access-list for PBR&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list GUEST-INTERNET ext permit ip 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your need PBR&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;route-map guest_internet permit 10&lt;BR /&gt;match ip address GUEST-INTERNET&lt;BR /&gt;set ip next-hop 50.x.x.30&lt;BR /&gt;exit&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then apply the PBR on Guest interface&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/5.30&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-route route-map guest_network&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this will fix the issue you're facing and everything will work as per requirement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please remember to select a correct answer and rate helpful posts&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Feb 2018 07:29:53 GMT</pubDate>
    <dc:creator>salman abid</dc:creator>
    <dc:date>2018-02-06T07:29:53Z</dc:date>
    <item>
      <title>How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3323345#M1064271</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We had some routing issues and during our troubleshooting, we found that our wireless guest network is routing over our primary outbound interface. We have a backup outbound interface configured on the ASA, there are two outbound interfaces.&amp;nbsp; We would like to change the routing for the wireless guest network to go out our second outbound interface on the ASA. I believe using a route map should accomplish this? I am new to using route map and would like some direction on the configuration. I have wrote, what I think would do the routing to the second outbound interface below. Any assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configuration template&lt;/P&gt;
&lt;P&gt;(Config#) route-map guest_network permit 10&lt;BR /&gt;(Config-route-map#) match IP address guest_network&lt;BR /&gt;(Config-route-map#) set interface Outside-2&lt;BR /&gt;(Config-if) set ip next-hop&amp;nbsp; &amp;nbsp;x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list guest_network extended permit IP x.x.x.0 255.255.255.0 any&lt;BR /&gt;access-list guest_network extended permit IP any any&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3323345#M1064271</guid>
      <dc:creator>Quintin.Mayo</dc:creator>
      <dc:date>2020-02-21T15:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3323443#M1064272</link>
      <description>&lt;P&gt;Couple of things you are missing:&lt;/P&gt;
&lt;P&gt;- if you put permit ip any any in your acl all the traffic will be using that route map, if you have a guest wireless interface dedicated that should not be a problem&lt;/P&gt;
&lt;P&gt;- set ip next-hop should be in the route-map&lt;/P&gt;
&lt;P&gt;- you have to apply the route map to the inside wireless interface (in my example G0/0)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ciscoasa(config)# access-list guest_network_acl extended permit ip x.x.x.0 255.255.255.0 any&lt;BR /&gt;ciscoasa(config)# route-map guest_network permit 10&lt;BR /&gt;ciscoasa(config-route-map)# match ip address guest_network_acl&lt;BR /&gt;ciscoasa(config-route-map)# set interface Outside-2&lt;BR /&gt;ciscoasa(config-route-map)# set ip next-hop x.x.x.x&lt;BR /&gt;ciscoasa(config-route-map)# exit&lt;BR /&gt;ciscoasa(config)# interface GigabitEthernet0/0&lt;BR /&gt;ciscoasa(config-if)# policy-route route-map guest_network&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 15:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3323443#M1064272</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-02-01T15:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325402#M1064273</link>
      <description>&lt;P&gt;I configured the route map without any success, it actually stopped the guest networking from routing and had to back out the changes. I have appended everything in the running config for the guest network, hopefully you can identify why the routing didn't forward the guest network traffic out the secondary interface (OUTSIDE-2). I did find the guest network utilizing dynamic nat, I changed the statement to the outside-2 interface still no success. Any suggestions will help greatly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configuration on FW for guest network&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object network Company-Guest&lt;BR /&gt;subnet 10.253.30.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;access-list ACL-OUTSIDE-IN extended permit ip any 10.x.x.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;access-list ACL-GUEST-IN extended deny ip any 10.x.x.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/5.30&lt;BR /&gt;vlan 30&lt;BR /&gt;nameif Company-Guest&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 10.x.x.1 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;mtu Company-Guest 1500&lt;BR /&gt;&lt;BR /&gt;object network Company-Guest&lt;BR /&gt;nat (Company-Guest,OUTSIDE-1) dynamic interface&lt;BR /&gt;&lt;BR /&gt;dhcpd address 10.x.x.2-10.x.x.254 Company-Guest&lt;BR /&gt;&lt;BR /&gt;dhcpd dns 8.8.8.8 interface Company-Guest&lt;BR /&gt;&lt;BR /&gt;dhcpd enable Company-Guest&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (INSIDE,OUTSIDE-1) dynamic interface&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description OUTSIDE COMCAST ISP INTERNET&lt;BR /&gt;speed 1000&lt;BR /&gt;duplex full&lt;BR /&gt;nameif OUTSIDE-2&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 50.x.x.29 255.255.255.240 standby 50.x.x.28&lt;BR /&gt;&lt;BR /&gt;route OUTSIDE-2 0.0.0.0 0.0.0.0 50.x.x.30 254&lt;BR /&gt;&lt;BR /&gt;mtu OUTSIDE-2 1500&lt;BR /&gt;icmp permit any echo OUTSIDE-2&lt;BR /&gt;icmp permit any echo-reply OUTSIDE-2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Configuration changes that didn't work to route the traffic out the OUTSIDE-2 interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(Config#) route-map Company_Guest permit 10&lt;BR /&gt;(Config-route-map#) match IP address Company_Guest&lt;BR /&gt;(Config-route-map#) set ip next-hop 50.x.x.30&lt;BR /&gt;(Config)# interaface gi0/5.30 (Dedicated guest interaface)&lt;BR /&gt;(Config-if) policy-route route-map Company_Guest&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list Company_Guest extended permit IP 10.x.x.0 255.255.255.0 any&lt;/P&gt;
&lt;P&gt;object network Company_Guest&lt;BR /&gt;nat (Company_Guest, OUTSIDE-2) dynamic interaface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 16:14:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325402#M1064273</guid>
      <dc:creator>Quintin.Mayo</dc:creator>
      <dc:date>2018-02-05T16:14:36Z</dc:date>
    </item>
    <item>
      <title>Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325802#M1064274</link>
      <description>&lt;P&gt;Hi Quintin,&lt;/P&gt;
&lt;P&gt;I'm more concerned to know software version of your ASA because PBR is supported on cisco ASA with 9.4.1 and later. Refer the link for software limitation&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://blog.webernetz.net/policy-based-routing-on-a-cisco-asa/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://blog.webernetz.net/policy-based-routing-on-a-cisco-asa/&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As long as you have min required software version then here is my input on your query.&lt;/P&gt;
&lt;P&gt;- Since ASA is gateway of your guest network then there is no doubt that traffic for internet is reaching to the ASA.&lt;/P&gt;
&lt;P&gt;- As you mentioned that you have 2 internet facing interfaces on your ASA and wanted to route only guest LAN traffic through OUTSIDE-2 interface.&lt;/P&gt;
&lt;P&gt;- Looking into your configuration i can assume that you have 4 interfaces configured on you ASA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 1- LAN interface for all except guest interface (INSIDE)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 2- LAN interface of guest LAN (Vlan30, Company-Guest)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 3- &amp;nbsp;OUTSIDE interface for general traffic (OUTSIDE-1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 4- OUTSIDE interface for guest internet ( OUTSIDE-2 )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So first thing first, you should have &lt;STRONG&gt;ONLY &amp;nbsp;&lt;/STRONG&gt;a default route on your ASA for traffic coming from INSIDE and going through OUTSIDE-1&lt;/P&gt;
&lt;P&gt;Below route is not needed&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;route OUTSIDE-2 0.0.0.0 0.0.0.0 50.x.x.30 254&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Then NAT for INSIDE to OUTSIDE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network obj_any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (INSIDE,OUTSIDE-1) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming that you have correct ACL configured for INSIDE interface. But still you can share '' show run access-group'' here with me to review.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Till this point internet traffic from INSIDE to OUTSIDE should work without any issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now let's focus on your Guest requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you don't need these ACLs&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list ACL-OUTSIDE-IN extended permit ip any 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL-GUEST-IN extended deny ip any 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your interface configuration for ''Company-Guest'' and ''OUTSIDE-2'' is OK.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT for Guest&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network Company-Guest&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Subnet 10.x.x.0 255.255.255.0 &amp;lt;-- &lt;/STRONG&gt;subnet of guest vlan&lt;BR /&gt;&lt;STRONG&gt;nat (Company-Guest,OUTSIDE-1) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access-list for PBR&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list GUEST-INTERNET ext permit ip 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your need PBR&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;route-map guest_internet permit 10&lt;BR /&gt;match ip address GUEST-INTERNET&lt;BR /&gt;set ip next-hop 50.x.x.30&lt;BR /&gt;exit&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then apply the PBR on Guest interface&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/5.30&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-route route-map guest_network&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this will fix the issue you're facing and everything will work as per requirement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please remember to select a correct answer and rate helpful posts&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 07:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325802#M1064274</guid>
      <dc:creator>salman abid</dc:creator>
      <dc:date>2018-02-06T07:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325805#M1064275</link>
      <description>&lt;P&gt;Hi Quintin,&lt;/P&gt;
&lt;P&gt;I'm more concerned to know software version of your ASA because PBR is supported on cisco ASA with 9.4.1 and later.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As long as you have min required software version then here is my input on your query.&lt;/P&gt;
&lt;P&gt;- Since ASA is gateway of your guest network then there is no doubt that traffic for internet is reaching to the ASA.&lt;/P&gt;
&lt;P&gt;- As you mentioned that you have 2 internet facing interfaces on your ASA and wanted to route only guest LAN traffic through OUTSIDE-2 interface.&lt;/P&gt;
&lt;P&gt;- Looking into your configuration i can assume that you have 4 interfaces configured on you ASA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 1- LAN interface for all except guest interface (INSIDE)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 2- LAN interface of guest LAN (Vlan30, Company-Guest)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 3- &amp;nbsp;OUTSIDE interface for general traffic (OUTSIDE-1)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; 4- OUTSIDE interface for guest internet ( OUTSIDE-2 )&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So first thing first, you should have &lt;STRONG&gt;ONLY &amp;nbsp;&lt;/STRONG&gt;a default route on your ASA for traffic coming from INSIDE and going through OUTSIDE-1&lt;/P&gt;
&lt;P&gt;Below route is not needed&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;route OUTSIDE-2 0.0.0.0 0.0.0.0 50.x.x.30 254&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Then NAT for INSIDE to OUTSIDE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network obj_any&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;subnet 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (INSIDE,OUTSIDE-1) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Assuming that you have correct ACL configured for INSIDE interface. But still you can share '' show run access-group'' here with me to review.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Till this point internet traffic from INSIDE to OUTSIDE should work without any issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now let's focus on your Guest requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you don't need these ACLs&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list ACL-OUTSIDE-IN extended permit ip any 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list ACL-GUEST-IN extended deny ip any 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your interface configuration for ''Company-Guest'' and ''OUTSIDE-2'' is OK.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT for Guest&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network Company-Guest&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Subnet 10.x.x.0 255.255.255.0 &amp;lt;-- &lt;/STRONG&gt;subnet of guest vlan&lt;BR /&gt;&lt;STRONG&gt;nat (Company-Guest,OUTSIDE-1) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access-list for PBR&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list GUEST-INTERNET ext permit ip 10.x.x.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your need PBR&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;route-map guest_internet permit 10&lt;BR /&gt;match ip address GUEST-INTERNET&lt;BR /&gt;set ip next-hop 50.x.x.30&lt;BR /&gt;exit&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then apply the PBR on Guest interface&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/5.30&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;policy-route route-map guest_network&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this will fix the issue you're facing and everything will work as per requirement.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please remember to select a correct answer and rate helpful posts&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2018 07:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325805#M1064275</guid>
      <dc:creator>salman abid</dc:creator>
      <dc:date>2018-02-06T07:29:53Z</dc:date>
    </item>
    <item>
      <title>Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325943#M1064276</link>
      <description>Final draft of configuration and thank you very much for your time!&lt;BR /&gt;&lt;BR /&gt;NAT For Guest Network&lt;BR /&gt;object network Company-Guest&lt;BR /&gt;subnet 10.x.x.0 255.255.255.0&lt;BR /&gt;nat (Company-Guest, OUTSIDE-2) dynamic interface&lt;BR /&gt;&lt;BR /&gt;PBR For Guest Network&lt;BR /&gt;(Config#) route-map Company-Guest permit 10&lt;BR /&gt;(Config-route-map#) match IP address Company-Guest-ACL&lt;BR /&gt;(Config-route-map#) set ip next-hop 50.x.x.x&lt;BR /&gt;&lt;BR /&gt;Apply PBR To Guest Interface&lt;BR /&gt;(Config)# interaface gi0/5.30 (Dedicated guest interaface)&lt;BR /&gt;(Config-if) policy-route policy route-map Company-Guest&lt;BR /&gt;&lt;BR /&gt;Access-list For PBR&lt;BR /&gt;access-list Company-Guest-ACL extended permit IP 10.x.x.0 255.255.255.0 any&lt;BR /&gt;access-group Company-Guest-ACL out interface OUTSIDE-2&lt;BR /&gt;&lt;BR /&gt;Test at this point&lt;BR /&gt;-----------------------------------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;STATIC NAT For New Host (Please review)&lt;BR /&gt;&lt;BR /&gt;(config#)object network webex&lt;BR /&gt;(config-network-object)# host 10.x.x.x&lt;BR /&gt;(config-network-object)# nat (inside,outside) static 40.x.x.x&lt;BR /&gt;&lt;BR /&gt;access-list OutsideToInside permit IP any host 10.x.x.x&lt;BR /&gt;access-group OutsideToInside in interaface OUTSIDE-1&lt;BR /&gt;&lt;BR /&gt;done.................&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 06 Feb 2018 13:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3325943#M1064276</guid>
      <dc:creator>Quintin.Mayo</dc:creator>
      <dc:date>2018-02-06T13:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: How To Route Traffic From Guest Network To Second Outbound Interface On ASA Routing Using (Route Map)</title>
      <link>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3326609#M1064277</link>
      <description>&lt;P&gt;Your final drapt is OK and you don't need this command ''&lt;STRONG&gt;access-group Company-Guest-ACL out interface OUTSIDE-2&lt;/STRONG&gt;''&lt;/P&gt;
&lt;P&gt;As &lt;STRONG&gt;Company-Guest-ACL &lt;/STRONG&gt;is already applied in your PBR and it is not needed to be applied anywhere else&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Please remember to select a correct answer and rate helpful posts&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 12:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-route-traffic-from-guest-network-to-second-outbound/m-p/3326609#M1064277</guid>
      <dc:creator>salman abid</dc:creator>
      <dc:date>2018-02-07T12:15:17Z</dc:date>
    </item>
  </channel>
</rss>

