<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PBR config questions on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4097255#M1070714</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After reviewing your question, this is all the config you need for PBR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;--Create ACL for interesting traffic::

access-list PBR_ACL extended permit ip 10.192.172.0 255.255.252.0 any

--Create route-map
Route-maps are similar to access list but unlike access-lists, route-map has the “set” actions that change the packet

ciscoasa(config)# route-map PBR_ROUTE_MAP permit 10
ciscoasa(config-route-map)# match ip address PBR_ACL
ciscaasa(config-route-map)# set ip next-hop 206.XXX.XXX.1

--Attach route-map to INSIDE interface or the Guest where ever the source is

ciscoasa(config)# interface GigabitEthernet0/3
ciscoasa(config-if)#nameif Guest
ciscoasa(config-if)#ip address 10.192.172.1 255.255.255.0
ciscoasa(config-if)#policy-route route-map PBR_ROUTE_MAP

--

route outside1 0.0.0.0 0.0.0.0 165.XXX.XXX.129
route outside2 0.0.0.0 0.0.0.0 206.XXX.XXX.1 50&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;Rest of the traffic will automatically take 165.XXX.XXX.129 as the next hope because that's the default route.&lt;/P&gt;
&lt;P&gt;Note we have set the distance metric of 50 for route via outside2 so that default traffic does not take that route.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jun 2020 01:26:16 GMT</pubDate>
    <dc:creator>Chakshu Piplani</dc:creator>
    <dc:date>2020-06-04T01:26:16Z</dc:date>
    <item>
      <title>PBR config questions on ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4096289#M1070666</link>
      <description>&lt;P&gt;I'm about to implement PBR on our ASA to route guest network traffic out of our secondary WAN connection. I do have a couple questions about the configuration though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Primary WAN Gateway: 165.XXX.XXX.129&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Secondary WAN Gateway: 206.XXX.XXX.1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Guest Network: 10.192.172.0/22&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what the config will look like:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;ciscoasa(config)# access-list acl-1 permit ip 10.15.0.0 255.255.0.0 
ciscoasa(config)# access-list acl-2 permit ip 10.21.0.0 255.255.0.0
ciscoasa(config)# access-list acl-3 permit ip 192.168.0.0 255.255.0.0
ciscoasa(config)# access-list acl-4 permit ip 172.0.0.0 255.0.0.0
ciscoasa(config)# access-list acl-5 permit ip 10.192.172.0 255.255.252.0

ciscoasa(config)# route-map PBR-1 permit 5
ciscoasa(config-route-map)# match ip address acl-1
ciscoasa(config-route-map)# set ip next-hop 165.XXX.XXX.129

ciscoasa(config)# route-map PBR-1 permit 10
ciscoasa(config-route-map)# match ip address acl-2
ciscoasa(config-route-map)# set ip next-hop 165.XXX.XXX.129

ciscoasa(config)# route-map PBR-1 permit 15
ciscoasa(config-route-map)# match ip address acl-3
ciscoasa(config-route-map)# set ip next-hop 165.XXX.XXX.129

ciscoasa(config)# route-map PBR-1 permit 20
ciscoasa(config-route-map)# match ip address acl-4
ciscoasa(config-route-map)# set ip next-hop 165.XXX.XXX.129

ciscoasa(config)# route-map PBR-1 permit 25
ciscoasa(config-route-map)# match ip address acl-5
ciscoasa(config-route-map)# set ip next-hop 206.XXX.XXX.1

ciscoasa(config)# route-map PBR-1 permit 30
ciscoasa(config-route-map)# set ip interface Null0

ciscoasa(config)# interface GigabitEthernet1/2 
ciscoasa(config-if)# policy-route route-map PBR-1&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I guess the first question is does this configuration look good?&lt;BR /&gt;&lt;BR /&gt;Second, doesn't the&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;set ip next-hop&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;override the routes in the routing table? Are those routes even needed anymore after implementing PBR?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Third, and just out of curiosity, what does&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;set ip interface Null0&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;do and why is it needed?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2020 18:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4096289#M1070666</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2020-06-02T18:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: PBR config questions on ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4097255#M1070714</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After reviewing your question, this is all the config you need for PBR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;--Create ACL for interesting traffic::

access-list PBR_ACL extended permit ip 10.192.172.0 255.255.252.0 any

--Create route-map
Route-maps are similar to access list but unlike access-lists, route-map has the “set” actions that change the packet

ciscoasa(config)# route-map PBR_ROUTE_MAP permit 10
ciscoasa(config-route-map)# match ip address PBR_ACL
ciscaasa(config-route-map)# set ip next-hop 206.XXX.XXX.1

--Attach route-map to INSIDE interface or the Guest where ever the source is

ciscoasa(config)# interface GigabitEthernet0/3
ciscoasa(config-if)#nameif Guest
ciscoasa(config-if)#ip address 10.192.172.1 255.255.255.0
ciscoasa(config-if)#policy-route route-map PBR_ROUTE_MAP

--

route outside1 0.0.0.0 0.0.0.0 165.XXX.XXX.129
route outside2 0.0.0.0 0.0.0.0 206.XXX.XXX.1 50&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;Rest of the traffic will automatically take 165.XXX.XXX.129 as the next hope because that's the default route.&lt;/P&gt;
&lt;P&gt;Note we have set the distance metric of 50 for route via outside2 so that default traffic does not take that route.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Chakshu&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 01:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4097255#M1070714</guid>
      <dc:creator>Chakshu Piplani</dc:creator>
      <dc:date>2020-06-04T01:26:16Z</dc:date>
    </item>
    <item>
      <title>Re: PBR config questions on ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4099360#M1070861</link>
      <description>Thank you! I was hoping I wouldn't have to define all the VLANS and could just do the one I wanted to route outside differently.</description>
      <pubDate>Mon, 08 Jun 2020 13:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-config-questions-on-asa/m-p/4099360#M1070861</guid>
      <dc:creator>tim829</dc:creator>
      <dc:date>2020-06-08T13:38:40Z</dc:date>
    </item>
  </channel>
</rss>

