<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PBR with AnyConnect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272924#M1120139</link>
    <description>&lt;P&gt;I'll broach the DHCP question with management, but that's been a disagreeable approach in the past.&lt;/P&gt;&lt;P&gt;PBR isn't for traffic steering for different ISPs, it's just for traffic steering.&lt;/P&gt;&lt;P&gt;In my use case, I need to drop traffic into different VRFs, from the same AnyConnect "outside" IP.&amp;nbsp; Except the ASA doesn't support VRFs.&amp;nbsp; I'm using the ASA for AnyConnect, but the security team is a PA shop. I need to get the traffic to different zones on the PAFW, which are attached to different interfaces and ultimately bridge across into the VRFs on the other side of the PAFW.&lt;/P&gt;&lt;P&gt;We played with multi-contexting the ASAs, and that worked, but required a different "outside" address for each Anyconnect group. We tried context chaining so that one outside IP could be used and then drop the Anyconnect to a follow-on context, but that required over-riding the "tunneled default" route.&amp;nbsp; We then realized that if we want simply a single outside IP, there's no reason for multi-contexting.&lt;/P&gt;&lt;P&gt;We have an F5 load balancer, which would definitely work, but I'm trying to minimize the amount of different technologies I need to bring in.&lt;/P&gt;&lt;P&gt;It's possible I could place a Catalyst 9500 between the ASA and the PAFW, and use the PBR of the Catalyst 9500.&amp;nbsp; Management has indicated that's the preferred approach, but gave me some time to explore if I can avoid needing it through ASA-native approaches.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Mar 2025 10:14:20 GMT</pubDate>
    <dc:creator>weylin.piegorsch</dc:creator>
    <dc:date>2025-03-19T10:14:20Z</dc:date>
    <item>
      <title>PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272568#M1120111</link>
      <description>&lt;P&gt;I'm having trouble figuring this out from the configuration guide, and ChatGPT is giving me answer that I'm questioning.&lt;/P&gt;&lt;P&gt;I have an ASA (technically a FPR in ASA-only mode) on v9.20.&amp;nbsp; I'm running AnyConnect, but I want to have two groups that each forward all traffic out different interfaces per-group.&amp;nbsp; Is there a way to do this?&lt;/P&gt;&lt;P&gt;I'm not opposed to a NAT-based approach, but this sounds more like PBR.&amp;nbsp; Except I wasn't sure how either of those interact with AnyConnect.&lt;/P&gt;&lt;P&gt;I'd share config, but honestly I'm not even sure what to share.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 15:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272568#M1120111</guid>
      <dc:creator>weylin.piegorsch</dc:creator>
      <dc:date>2025-03-18T15:26:39Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272615#M1120115</link>
      <description>&lt;LI-CODE lang="markup"&gt;  I'm running AnyConnect, but I want to have two groups that each forward all traffic out different interfaces per-group.  Is there a way to do this?&lt;/LI-CODE&gt;
&lt;P&gt;Do you have example of that IP address Looks like ?&lt;/P&gt;
&lt;P&gt;if i assume, you have 2 RAVPN group each group get different IP subnet&amp;nbsp; ?&lt;/P&gt;
&lt;P&gt;you want to send out each subnet to different ISP ? like ISP1 and ISP2 ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 16:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272615#M1120115</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-18T16:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272670#M1120116</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;I think this is enough to highlight what I'm asking about.&amp;nbsp; Webvpn is enabled on outside. Anything VPN group "group2" (regardless of destination) should get a source address of group2-pool, and set next-hop address of 10.2.0.1 via inside-group2.&amp;nbsp; Anything VPN group "group3" (regardless of destination) should get a source address of group3-pool, and set next-hop address of 10.3.0.1 via inside-group3.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;PRE&gt;&lt;SPAN&gt;int Eth1/1&lt;BR /&gt;&lt;/SPAN&gt; nameif outside&lt;BR /&gt; ip add 10.0.0.2 255.255.255.254&lt;BR /&gt;!&lt;BR /&gt;int Eth1/2&lt;BR /&gt; nameif inside-group2&lt;BR /&gt; ip add 10.2.0.2 255.255.255.0&lt;BR /&gt;!&amp;nbsp;&lt;BR /&gt;int Eth1/3&lt;BR /&gt; nameif inside-group3&lt;BR /&gt; ip add 10.3.0.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.1&lt;BR /&gt;!&lt;BR /&gt;ip pool group2-pool 10.2.0.16-10.2.0.254&lt;BR /&gt;ip pool group3-pool 10.3.0.16-10.3.0.254&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 18 Mar 2025 18:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272670#M1120116</guid>
      <dc:creator>weylin.piegorsch</dc:creator>
      <dc:date>2025-03-18T18:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272773#M1120123</link>
      <description>&lt;P&gt;I think what you can try to do here is to configure DHCP under each group policy and specify the DHCP scope with the command "dhcp-network-scope &amp;lt; an IP address from the interested scope &amp;gt;", then, on the DHCP server you define the default gateway for each group.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/118084-configure-anyconnect-00.html" target="_blank"&gt;Anyconnect Client to ASA with Use of DHCP for Address Assignment - Cisco&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 23:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272773#M1120123</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-03-18T23:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272850#M1120129</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;suggested, it is best to play with the DHCP pool so it will contact the gateway and follow the route.&lt;/P&gt;
&lt;P&gt;What is the use case here? Since you have only one outgoing ISP, do you have any other filters for each group? (since I do not see any advantage you are mentioning PBR here - PBR you need only when you like to traffic steering different ISP and Failover use cases)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 07:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272850#M1120129</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-19T07:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272924#M1120139</link>
      <description>&lt;P&gt;I'll broach the DHCP question with management, but that's been a disagreeable approach in the past.&lt;/P&gt;&lt;P&gt;PBR isn't for traffic steering for different ISPs, it's just for traffic steering.&lt;/P&gt;&lt;P&gt;In my use case, I need to drop traffic into different VRFs, from the same AnyConnect "outside" IP.&amp;nbsp; Except the ASA doesn't support VRFs.&amp;nbsp; I'm using the ASA for AnyConnect, but the security team is a PA shop. I need to get the traffic to different zones on the PAFW, which are attached to different interfaces and ultimately bridge across into the VRFs on the other side of the PAFW.&lt;/P&gt;&lt;P&gt;We played with multi-contexting the ASAs, and that worked, but required a different "outside" address for each Anyconnect group. We tried context chaining so that one outside IP could be used and then drop the Anyconnect to a follow-on context, but that required over-riding the "tunneled default" route.&amp;nbsp; We then realized that if we want simply a single outside IP, there's no reason for multi-contexting.&lt;/P&gt;&lt;P&gt;We have an F5 load balancer, which would definitely work, but I'm trying to minimize the amount of different technologies I need to bring in.&lt;/P&gt;&lt;P&gt;It's possible I could place a Catalyst 9500 between the ASA and the PAFW, and use the PBR of the Catalyst 9500.&amp;nbsp; Management has indicated that's the preferred approach, but gave me some time to explore if I can avoid needing it through ASA-native approaches.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 10:14:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272924#M1120139</guid>
      <dc:creator>weylin.piegorsch</dc:creator>
      <dc:date>2025-03-19T10:14:20Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272927#M1120140</link>
      <description>&lt;P&gt;I'll broach the DHCP question with management, but externalizing the address assignment has been a disagreeable approach in the past.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Mar 2025 10:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5272927#M1120140</guid>
      <dc:creator>weylin.piegorsch</dc:creator>
      <dc:date>2025-03-19T10:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5275822#M1120308</link>
      <description>&lt;P&gt;I proposed 4 options to management:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Attempt to prototype PBR on the outside interface of the ASA, with several inside subinterfaces (1 per VPN group)&lt;/LI&gt;&lt;LI&gt;Continue with prototyping PBR on the Catalyst that attaches to the ASA&lt;/LI&gt;&lt;LI&gt;Investigate DHCP as discussed in this thread&lt;/LI&gt;&lt;LI&gt;Multi-context the ASA, and put an F5 load balancer in front of the ASAs&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;It was pointed out that managing use of the VPN pool requires the ASA to natively (without&amp;nbsp;DHCP) assign addresses, so that when someone disconnect then the address gets added right back to the pool.&amp;nbsp; Using DHCP, it takes too long to add the address back to the available pool (even with short leases).&lt;/P&gt;&lt;P&gt;I was also told that fronting a series of ASAs with an F5 would probably "work," but won't be allocated for this effort.&lt;/P&gt;&lt;P&gt;PBR implemented on failover-enabled ASA.... Note that PBR works on the interface whereby the packet enters the platform.&amp;nbsp; For AnyConnect, the encrypted packet enters the ASA by the outside interface, but the unencrypted packet enters via... which interface?&amp;nbsp; Documentation is unclear, it's likely that the Adaptive Security Algorithm treats the unencrypted packet as entering the same interface as the encrypted packet, therefor PBR on the outside interface would would.&lt;/P&gt;&lt;P&gt;But given that PBR on the StackWise-Virtual Catalyst 9500 is MUCH easier and MUCH more straight-forward than PBR on the ASA, therefor the way we're prototyping this is by using VPN pools taken from the subnet of the inside interface, and applying PBR on the VLAN interface of the Catalyst 9500 that attaches that subnet.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Mar 2025 15:39:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5275822#M1120308</guid>
      <dc:creator>weylin.piegorsch</dc:creator>
      <dc:date>2025-03-27T15:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: PBR with AnyConnect</title>
      <link>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5302184#M1121440</link>
      <description>&lt;P&gt;What we ended up doing was.... well, first we realized the failover-enabled ASAs are attached to a VSS-connected pair of Catalyst 9500s, with routing enabled - one ASA on each Cat9500. Scenario 2 here:&amp;nbsp;&lt;A title="CLI Book 1: Cisco Secure Firewall ASA General Operations CLI Configuration Guide, 9.20; Chapter: Failover for High Availability" href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa920/configuration/general/asa-920-general-config/ha-failover.html" target="_blank" rel="noopener"&gt;ASA Failover Configuration&lt;/A&gt;, with failover via our OOB network.&lt;/P&gt;&lt;P&gt;Even though they're several miles apart, they're on the same logical switch, so if we do "failover standby" on the ASA interface then only the active ASA will be up - and on the Catalyst side, we can do it with a "mode on" port-channel to only have one virtual interface to apply PBR. We've successfully done this trick with PA firewalls for years.&lt;/P&gt;&lt;P&gt;Then, the ASA inside interface has one subnet on it, which is large enough to contain all the VPN pool IPs.&amp;nbsp; We put a PBR policy on the Catalyst port-channel of the inside interface, which directs traffic based on the various VPN pool address ranges in the "source address" of the IP header. Since it's an attached subnet and the ASA GARPs the IP when a user connects, the ARP and MAC tables direct return traffic back to the ASA.&lt;/P&gt;&lt;P&gt;And, Bob's your uncle it worked!&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 01:27:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-with-anyconnect/m-p/5302184#M1121440</guid>
      <dc:creator>weylin.piegorsch</dc:creator>
      <dc:date>2025-06-25T01:27:41Z</dc:date>
    </item>
  </channel>
</rss>

