<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678500#M1093046</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1034099"&gt;@Asfandyar70754&lt;/a&gt; if you want to use both ISP circuits, then you can use IP SLA to track the primary ISP and failover to the secondary if required - example &lt;A href="https://integratingit.wordpress.com/2019/11/24/asa-dual-isp-using-ip-sla/" target="_self"&gt;here&lt;/A&gt;. Or use Policy Based Routing (PBR) - example &lt;A href="https://integratingit.wordpress.com/2020/03/01/asa-policy-based-routing/" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
    <pubDate>Tue, 30 Aug 2022 07:18:16 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-08-30T07:18:16Z</dc:date>
    <item>
      <title>Routing in ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678100#M1093043</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;So I am a bit new on ASA and was doing a basic lab, topology attached. I have vlan 10 &amp;amp; 20 in my inside network.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Following are the routes that I have configured on ASA, CoreSW &amp;amp; ISP-RTR&lt;/P&gt;
&lt;P&gt;Core SW route:&amp;nbsp; ip route 0.0.0.0 0.0.0.0 30.0.0.2&lt;/P&gt;
&lt;P&gt;ASA routes:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 40.0.0.2 1&lt;/P&gt;
&lt;P&gt;route inside 10.0.0.0 255.0.0.0 30.0.0.1 1&lt;/P&gt;
&lt;P&gt;route inside 20.0.0.0 255.0.0.0 30.0.0.1 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISP-RTR route:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip route 0.0.0.0 0.0.0.0 40.0.0.1&lt;/P&gt;
&lt;P&gt;Now I am not able to ping from my internal network to ISP-RTR's IP or it Loopback IP.&lt;/P&gt;
&lt;P&gt;What am I missing in m config?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 13:16:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678100#M1093043</guid>
      <dc:creator>Asfandyar70754</dc:creator>
      <dc:date>2022-08-29T13:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678107#M1093044</link>
      <description>&lt;P&gt;You need ICMP inspection&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.speaknetworks.com/enable-icmp-inspection-to-allow-ping-traffic-passing-asa/" target="_blank"&gt;https://www.speaknetworks.com/enable-icmp-inspection-to-allow-ping-traffic-passing-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 13:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678107#M1093044</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-29T13:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678473#M1093045</link>
      <description>&lt;P&gt;Thank you for your response.&lt;/P&gt;
&lt;P&gt;I also need to know incase there are 2 ISPs then can I use default routes for both ISPs.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;route outside 0.0.0.0 0.0.0.0 50.0.0.2 2(Making it a backup route using administrative distance 2)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 06:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678473#M1093045</guid>
      <dc:creator>Asfandyar70754</dc:creator>
      <dc:date>2022-08-30T06:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678500#M1093046</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1034099"&gt;@Asfandyar70754&lt;/a&gt; if you want to use both ISP circuits, then you can use IP SLA to track the primary ISP and failover to the secondary if required - example &lt;A href="https://integratingit.wordpress.com/2019/11/24/asa-dual-isp-using-ip-sla/" target="_self"&gt;here&lt;/A&gt;. Or use Policy Based Routing (PBR) - example &lt;A href="https://integratingit.wordpress.com/2020/03/01/asa-policy-based-routing/" target="_self"&gt;here&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 07:18:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678500#M1093046</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-08-30T07:18:16Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678501#M1093047</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;By default traffic from an asa outside interface (lower security level) isn’t allowed into the fw ( as such icmp reply’s will denied)&lt;BR /&gt;You could allow this two ways:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt;Access-list&lt;/U&gt;&lt;BR /&gt;&lt;EM&gt;access-list x extended permit icmp any any echo-reply&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;access-group x in interface outside&lt;BR /&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;U&gt;Service-policy inspection&lt;/U&gt;&lt;BR /&gt;&lt;EM&gt;policy-map global-policy&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;class insection_default&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;inspect icmp-error &amp;lt; hides internal addresing via traceroute&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;exit&lt;BR /&gt;&lt;BR /&gt;Lastly:&lt;BR /&gt;&lt;/EM&gt;&lt;U&gt;allow traffic between interfaces--- intervlan routing&lt;/U&gt;&lt;EM style="font-family: inherit;"&gt;&lt;BR /&gt;&lt;EM&gt;same-security-traffic permit inter-interface&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;U&gt;Allow traffic in/out same interface&lt;/U&gt;&lt;BR /&gt;&lt;EM style="font-family: inherit;"&gt;same-security-traffic&lt;/EM&gt; permit intra-interface&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 07:20:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678501#M1093047</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2022-08-30T07:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: Routing in ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678530#M1093049</link>
      <description>&lt;P&gt;Use "fixup protocol icmp" to start to inspect ICMP protocol&lt;/P&gt;</description>
      <pubDate>Tue, 30 Aug 2022 08:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-in-asa/m-p/4678530#M1093049</guid>
      <dc:creator>Khaled Douma</dc:creator>
      <dc:date>2022-08-30T08:29:18Z</dc:date>
    </item>
  </channel>
</rss>

