<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5011373#M1108732</link>
    <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/237724"&gt;M02@rt37&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the delay but I have more info now:&lt;/P&gt;&lt;P&gt;So the router and asa will be new installs (no existing ones).&lt;/P&gt;&lt;P&gt;I have the router connected to the ASA and can ping it now. In my dummy config, in the ASA the router is configured on 192.168.1.1 (outside) and the ASA is on 192.168.2.1 (inside). The router is configured for internet access on ISP01 (I haven't tested on my home network to see if it works outside yet, but I plan to later).&lt;/P&gt;&lt;P&gt;I reserved interface 3 for the sdwan but haven't gotten to that yet but I will still need all internet traffic to route only over ISP01 on 192.168.1.1 and all other traffic (including VOIP most importantly, over one of the site to site tunnels over the sdwan which will be on interface 3). Could you please have a look at this config and let me know what you think? I also have the ACL's set to any any just because I was testing but I need to set those properly...I removed any non-relevant info from the config too (crypto, etc.)&lt;/P&gt;&lt;P&gt;Thank you so very, very much again!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.16(2)3&lt;BR /&gt;!&lt;BR /&gt;hostname test&lt;BR /&gt;domain-name test.local&lt;BR /&gt;enable password&lt;BR /&gt;service-module 1 keepalive-timeout 4&lt;BR /&gt;service-module 1 keepalive-counter 6&lt;BR /&gt;passwd&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;no switchport&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;no switchport&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;no switchport&lt;BR /&gt;nameif sdwan&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/5&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/6&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/7&lt;BR /&gt;switchport&lt;BR /&gt;power inline auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/8&lt;BR /&gt;switchport&lt;BR /&gt;power inline auto&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8 outside&lt;BR /&gt;name-server 8.8.4.4 outside&lt;BR /&gt;domain-name test.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside_subnet&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network router&lt;BR /&gt;host 192.168.1.1&lt;BR /&gt;object-group service www tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any&lt;BR /&gt;access-list outside_access_out extended permit tcp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu sdwan 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network inside_subnet&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.20.20 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.20.10-192.168.20.10 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password ***** pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map class_snmp&lt;BR /&gt;match port udp eq 4161&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;class class_snmp&lt;BR /&gt;inspect snmp&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Thank You, So Appreciated!&lt;/P&gt;&lt;P&gt;PJ&lt;/P&gt;</description>
    <pubDate>Thu, 01 Feb 2024 20:04:07 GMT</pubDate>
    <dc:creator>PJ123</dc:creator>
    <dc:date>2024-02-01T20:04:07Z</dc:date>
    <item>
      <title>Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006916#M1108473</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a new setup for a client, any insight would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Setup will be: ISP1, ISP2 (SD-WAN), New CB Series Router, New FPR-1000.&lt;/P&gt;&lt;P&gt;I'm basically looking for the best way to set this up with both ISP Links UP and PBR to send ONLY VOIP Traffic over the SD-WAN and 1 (of 2) Site to Site Tunnels.&lt;/P&gt;&lt;P&gt;If I cannot get the equipment tommorow, I will lab it up so that I will have a config to present.....I just wanted to get ahead of this.&lt;/P&gt;&lt;P&gt;Thank You Very Much in Advance!&lt;/P&gt;&lt;P&gt;PJ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 06:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006916#M1108473</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T06:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006923#M1108474</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1672085"&gt;@PJ123&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Set up the SD-WAN functionality on the CB Series Router. Define policies for load balancing and failover between ISP1 and ISP2.&lt;/P&gt;
&lt;P&gt;Configure QoS policies for prioritizing VOIP traffic.Implement PBR on the CB Series Router to route VOIP traffic over the SD-WAN link.&lt;/P&gt;
&lt;P&gt;Define an access list matching VOIP traffic and create a route map to match the access list and set the next hop for SD-WAN.&lt;/P&gt;
&lt;P&gt;As concerned site-2-site VPN configuraton on FPR-1000, set up the necessary VPN tunnels on the FPR for secure comunication and define interesting traffic for the VPN, including the specific site-2-site tunnel for VOIP traffic.&lt;/P&gt;
&lt;P&gt;Also, i&lt;SPAN&gt;mplement the security policies on the FPR to control traffic flow based on security requirements.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 07:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006923#M1108474</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-01-27T07:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006942#M1108476</link>
      <description>&lt;LI-CODE lang="markup"&gt;CB Series Router&lt;/LI-CODE&gt;
&lt;P&gt;what model of the Router ?&lt;/P&gt;
&lt;P&gt;ISP1 is normal Internet provider&lt;/P&gt;
&lt;P&gt;ISP2 is SD-WAN right ?&amp;nbsp; (if you says SD-WAN - they have their own router providing on site equipment) - or you configuring Sd-WAN on your routers ?&lt;/P&gt;
&lt;P&gt;Is the both the Links terminated to CB Router ? - there this where where the Route-Map take place based on the matching traffic to send which link. (you have not mentioned what if that link fails ?) - you looking to send traffic over other link or traffic will be black holed ?&lt;/P&gt;
&lt;P&gt;Can you draw a diagram how your network looks like to understand better.&lt;/P&gt;
&lt;P&gt;There are are different ways to achieve this but i would like to see your diagram and above asked questions input.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 08:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006942#M1108476</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-27T08:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006973#M1108487</link>
      <description>&lt;P&gt;Which one will face both ISP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FPR or CBS ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 10:33:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5006973#M1108487</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-27T10:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007124#M1108498</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/237724"&gt;M02@rt37&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for the quick response and info!&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will have to lab this up and see how it looks as nothing is onsite yet (brand new install, no current Router or Firewall in place) and the SDWAN Circuit will not be turned up until Monday. I will reply with the configs if I hit any blocks or need to get a bit more granular on this....&lt;/P&gt;&lt;P&gt;Very much appreciated, Thank You!&lt;/P&gt;&lt;P&gt;PJ&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 16:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007124#M1108498</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T16:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007131#M1108500</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;Thank you for the quick reply!&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;Router is going to be a C8200L&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;ISP1 is normal internet provider&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;ISP2 is going to be SD-WAN and I'm not sure yet but I think they will be putting in their own router, (circuit not getting turned up until Monday) but I would like to plan both ways in case they do not&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;This is a brand new install and there is no existing router or firewall onsite currently so I believe I will terminate both at the CB Router&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;I will send a map once I lab it out; there is also a wireless router onsite which I am planning on just putting in AP Mode and into the firewall&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;Thank you very much again, I will reply with more info as well....&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;PJ&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Sat, 27 Jan 2024 17:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007131#M1108500</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T17:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007134#M1108502</link>
      <description>&lt;P&gt;Hello MHM,&lt;/P&gt;&lt;P&gt;Since this is a brand new install with no existing router or firewall in place (just a wireless router as far as I know, probably ISP provided), I believe I will make it the CBS...&lt;/P&gt;&lt;P&gt;Thank you for the quick Reply!&lt;/P&gt;&lt;P&gt;PJ&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 17:18:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007134#M1108502</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T17:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007140#M1108503</link>
      <description>&lt;P&gt;You're so welcome &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1672085"&gt;@PJ123&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 17:37:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007140#M1108503</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2024-01-27T17:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007156#M1108505</link>
      <description>&lt;P&gt;CBS is full of bug&amp;nbsp;&lt;BR /&gt;put your FPR first then connect CBS behind&amp;nbsp;&lt;BR /&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 18:11:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007156#M1108505</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-27T18:11:30Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007161#M1108506</link>
      <description>&lt;P&gt;Sure you can test it - If you know the IP address then access list to match the traffic and use route-map to send SD-WAN Link.&lt;/P&gt;
&lt;P&gt;you can use IP SLA if that fails use other ISP link - you need to some testing failovers all working as expected.&lt;/P&gt;
&lt;P&gt;if you have any issues - post here the config community can help you.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 18:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007161#M1108506</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-27T18:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007203#M1108515</link>
      <description>&lt;P&gt;Appreciated! I was able to get the actual devices luckily...though, I am not onsite yet so I dummied the config. Here is my VERY BASIC Router Config ATM (also dealing with some new command syntax as I haven't had to do this from scratch in quite some time...ugh (any help from here would be appreciated, but I will work on the steps that you provided as well):&lt;/P&gt;
&lt;P&gt;version 17.11&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;! Call-home is enabled by Smart-Licensing.&lt;BR /&gt;service call-home&lt;BR /&gt;platform qfp utilization monitor load 80&lt;BR /&gt;platform punt-keepalive disable-kernel-core&lt;BR /&gt;!&lt;BR /&gt;hostname test&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;!&lt;BR /&gt;ip domain name test.local&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.2.1 192.168.2.10&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool LAN_SUBNET&lt;BR /&gt;network 192.168.2.0 255.255.255.0&lt;BR /&gt;default-router 192.168.2.1&lt;BR /&gt;dns-server 8.8.8.8&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;login on-success log&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;subscriber templating&lt;BR /&gt;multilink bundle-name authenticated&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;diagnostic bootup level minimal&lt;BR /&gt;!&lt;BR /&gt;license udi pid C8200L-1N-4T sn FJC273916BY&lt;BR /&gt;memory free low-watermark processor 62864&lt;BR /&gt;!&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;enable secret 9 X.X.X&lt;BR /&gt;!&lt;BR /&gt;username cisco secret 9 X.X.X&lt;BR /&gt;!&lt;BR /&gt;redundancy&lt;BR /&gt;mode none&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/0&lt;BR /&gt;ip address 12.34.56.2 255.255.255.0&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip access-group OUTSIDE_FILTER in&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/1&lt;BR /&gt;ip address 12.34.66.2 255.255.255.0&lt;BR /&gt;ip nat outside&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/2&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0/3&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;negotiation auto&lt;BR /&gt;!&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;ip http server&lt;BR /&gt;ip http authentication local&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source list INTERNET_ACCESS interface GigabitEthernet0/0/0 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 12.34.56.1&lt;BR /&gt;ip ssh bulk-mode 131072&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard VTY_FILTER&lt;BR /&gt;10 permit 192.168.2.0&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended INTERNET_ACL&lt;BR /&gt;10 permit ip 192.168.2.0 0.0.0.255 any&lt;BR /&gt;ip access-list extended OUTSIDE_FILTER&lt;BR /&gt;10 permit icmp any host 12.34.56.0 echo-reply&lt;BR /&gt;20 permit udp any eq domain host 12.34.56.0&lt;BR /&gt;30 permit tcp any host 12.34.56.0 established&lt;BR /&gt;40 permit icmp any host 12.34.66.1 echo-reply&lt;BR /&gt;50 permit udp any eq domain host 12.34.56.1&lt;BR /&gt;60 permit tcp any host 12.34.66.1 established&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;control-plane&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;stopbits 1&lt;BR /&gt;line aux 0&lt;BR /&gt;line vty 0&lt;BR /&gt;access-class VTY_FILTER in&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 1 4&lt;BR /&gt;transport input ssh&lt;BR /&gt;line vty 5 14&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2024 01:51:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007203#M1108515</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-28T01:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007204#M1108516</link>
      <description>&lt;P&gt;Looks like my reply may have not gone through, maybe because I pasted the dummy config and didn't attach? Anyway, I will attach my VERY BASIC router config here...I have the physical devices now, but am not onsite....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank You!!!&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 22:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007204#M1108516</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T22:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007205#M1108517</link>
      <description>&lt;P&gt;here is the example of route-map&lt;/P&gt;
&lt;P&gt;i have used both ACL same to route both the ISP - your case match 2 ACL different to match the traffic to go to each ISP.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.balajibandi.com/?p=1982" target="_blank"&gt;https://www.balajibandi.com/?p=1982&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Let us know if that works for you ?&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 22:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007205#M1108517</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-01-27T22:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007208#M1108518</link>
      <description>&lt;P&gt;Very Helpful, Thank You! I have the actual devices now (but not onsite). I have attached my super basic router config so I will work on implementing that now as I continue to work on this....Thanks, appreciated!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 22:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007208#M1108518</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T22:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007213#M1108520</link>
      <description>&lt;P&gt;Ugh, just looked at the router....I can only do Outside Interface and Inside Interface on this guy (2 Ethernet Interfaces, no cards).....sorry, fixing now.... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 23:08:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007213#M1108520</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T23:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007215#M1108521</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Ugh, just looked at the router....I can only do Outside Interface and Inside Interface on this guy (2 Ethernet Interfaces, no cards).....sorry, fixing now....&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 23:11:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007215#M1108521</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T23:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007217#M1108522</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Ugh, just looked at the router....I can only do Outside Interface and Inside Interface on this guy (2 Ethernet Interfaces, no cards).....sorry, fixing now.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jan 2024 23:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5007217#M1108522</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-01-27T23:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5011373#M1108732</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/237724"&gt;M02@rt37&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the delay but I have more info now:&lt;/P&gt;&lt;P&gt;So the router and asa will be new installs (no existing ones).&lt;/P&gt;&lt;P&gt;I have the router connected to the ASA and can ping it now. In my dummy config, in the ASA the router is configured on 192.168.1.1 (outside) and the ASA is on 192.168.2.1 (inside). The router is configured for internet access on ISP01 (I haven't tested on my home network to see if it works outside yet, but I plan to later).&lt;/P&gt;&lt;P&gt;I reserved interface 3 for the sdwan but haven't gotten to that yet but I will still need all internet traffic to route only over ISP01 on 192.168.1.1 and all other traffic (including VOIP most importantly, over one of the site to site tunnels over the sdwan which will be on interface 3). Could you please have a look at this config and let me know what you think? I also have the ACL's set to any any just because I was testing but I need to set those properly...I removed any non-relevant info from the config too (crypto, etc.)&lt;/P&gt;&lt;P&gt;Thank you so very, very much again!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.16(2)3&lt;BR /&gt;!&lt;BR /&gt;hostname test&lt;BR /&gt;domain-name test.local&lt;BR /&gt;enable password&lt;BR /&gt;service-module 1 keepalive-timeout 4&lt;BR /&gt;service-module 1 keepalive-counter 6&lt;BR /&gt;passwd&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;no switchport&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;no switchport&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;no switchport&lt;BR /&gt;nameif sdwan&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/5&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/6&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/7&lt;BR /&gt;switchport&lt;BR /&gt;power inline auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/8&lt;BR /&gt;switchport&lt;BR /&gt;power inline auto&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8 outside&lt;BR /&gt;name-server 8.8.4.4 outside&lt;BR /&gt;domain-name test.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside_subnet&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network router&lt;BR /&gt;host 192.168.1.1&lt;BR /&gt;object-group service www tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any&lt;BR /&gt;access-list outside_access_out extended permit tcp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu sdwan 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network inside_subnet&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.20.20 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.20.10-192.168.20.10 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password ***** pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map class_snmp&lt;BR /&gt;match port udp eq 4161&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;class class_snmp&lt;BR /&gt;inspect snmp&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Thank You, So Appreciated!&lt;/P&gt;&lt;P&gt;PJ&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 20:04:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5011373#M1108732</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-02-01T20:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISP, Router, FPR ASA and PBR Routing for VOIP</title>
      <link>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5011462#M1108734</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the delay but I have more info now:&lt;/P&gt;&lt;P&gt;So the router and asa will be new installs (no existing ones).&lt;/P&gt;&lt;P&gt;I have the router connected to the ASA and can ping it now. In my dummy config, in the ASA the router is configured on 192.168.1.1 (outside) and the ASA is on 192.168.2.1 (inside). The router is configured for internet access on ISP01 (I haven't tested on my home network to see if it works outside yet, but I plan to later).&lt;/P&gt;&lt;P&gt;I reserved interface 3 for the sdwan but haven't gotten to that yet but I will still need all internet traffic to route only over ISP01 on 192.168.1.1 and all other traffic (including VOIP most importantly, over one of the site to site tunnels over the sdwan which will be on interface 3). Could you please have a look at this config and let me know what you think? I also have the ACL's set to any any just because I was testing but I need to set those properly...I removed any non-relevant info from the config too (crypto, etc.)&lt;/P&gt;&lt;P&gt;Thank you so very, very much again!!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.16(2)3&lt;BR /&gt;!&lt;BR /&gt;hostname test&lt;BR /&gt;domain-name test.local&lt;BR /&gt;enable password&lt;BR /&gt;service-module 1 keepalive-timeout 4&lt;BR /&gt;service-module 1 keepalive-counter 6&lt;BR /&gt;passwd&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;no switchport&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/2&lt;BR /&gt;no switchport&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/3&lt;BR /&gt;no switchport&lt;BR /&gt;nameif sdwan&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/4&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/5&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/6&lt;BR /&gt;switchport&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/7&lt;BR /&gt;switchport&lt;BR /&gt;power inline auto&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1/8&lt;BR /&gt;switchport&lt;BR /&gt;power inline auto&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8 outside&lt;BR /&gt;name-server 8.8.4.4 outside&lt;BR /&gt;domain-name test.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside_subnet&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network router&lt;BR /&gt;host 192.168.1.1&lt;BR /&gt;object-group service www tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;port-object eq https&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit tcp any any&lt;BR /&gt;access-list outside_access_out extended permit tcp any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu sdwan 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network inside_subnet&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group global_access global&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.20.20 255.255.255.255 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.20.10-192.168.20.10 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username admin password ***** pbkdf2 privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map class_snmp&lt;BR /&gt;match port udp eq 4161&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;class class_snmp&lt;BR /&gt;inspect snmp&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Thank You, So Appreciated!&lt;/P&gt;&lt;P&gt;PJ&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 02 Feb 2024 00:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dual-isp-router-fpr-asa-and-pbr-routing-for-voip/m-p/5011462#M1108734</guid>
      <dc:creator>PJ123</dc:creator>
      <dc:date>2024-02-02T00:15:10Z</dc:date>
    </item>
  </channel>
</rss>

