<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5508-X PBR Wrong Interface Selection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714722#M12092</link>
    <description>&lt;P&gt;Ok so after further testing and some trail &amp;amp; error, by setting set interface ISP2 on the route-map it seems that packet-tracer shows the traffic leaving the correct interface.&lt;/P&gt;
&lt;P&gt;Thats good, however because of NAT it seems that the traffic doesn't actually move past the ASA.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;So it looks like its back to troubleshooting NAT and how I can NAT from the LAN interface, to the 2 ISP interfaces at the same time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently for&amp;nbsp;the&amp;nbsp;working ISP (default route) its just&lt;/P&gt;
&lt;PRE&gt;network object LAN
  nat (LAN,ISP1) dynamic interface&lt;/PRE&gt;
&lt;P&gt;But as it can only have 1 NAT rule, I cant do&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;network object LAN
  (LAN,ISP2) dynamic interface&lt;/PRE&gt;
&lt;P&gt;as then the first NAT rule is overwritten.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;How can I get 2 NAT rules so that traffic can leave either ISP interface?&lt;/P&gt;</description>
    <pubDate>Fri, 28 Sep 2018 01:43:33 GMT</pubDate>
    <dc:creator>LordBoBCUP</dc:creator>
    <dc:date>2018-09-28T01:43:33Z</dc:date>
    <item>
      <title>ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3713880#M12079</link>
      <description>&lt;P&gt;Hi, I have setup a PBR to route traffic matching an ACL to a second&amp;nbsp;interface. The problem I have is when running debug policy-map I get&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;pbr: First matching rule from ACL(9)
pbr: route map route-xxx, sequence 10, permit; proceed with policy routing
pbr: evaluating next-hop 203.78.115.123
pbr: no connected route to next-hop 203.78.115.123 found
pbr: policy based routing could not be applied; proceeding with normal route lookup&lt;/PRE&gt;
&lt;P&gt;or when I run&amp;nbsp;packet-tracer I get:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Phase: 1
Type: PBR-LOOKUP
Subtype: policy-route
Result: ALLOW
Config:
route-map route-xxx permit 10
 match ip address route-xxx
 set ip next-hop 203.78.115.123
Additional Information:
 Matched route-map route-xxx, sequence 10, permit

Phase: 2
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 120.1.2.3 using egress ifc  External-Internet&lt;/PRE&gt;
&lt;P&gt;203.78.115.123 is the gateway IP configured for the interface we want to send the traffic for, so its connected via 203.78.115.122. Even if I specify the next hop as 203.78.115.122 I get the exact same results in packet tracer and debug.&lt;BR /&gt;&lt;BR /&gt;I have a default route with a metric of 2 for the second interface, I also have a NAT rule allowing traffic out on that interface too.&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network LAN1
 nat (LAN,External-ISP2) dynamic interface
object network LAN
 nat (LAN,External-ISP1) dynamic interface

route External-ISP1 0.0.0.0 0.0.0.0 120.1.2.3 1
route External-ISP2 0.0.0.0 0.0.0.0 203.78.115.122 2&lt;/PRE&gt;
&lt;P&gt;I can clearly see the PBR is being evaulated so its correctly applied to the interface, its matching the traffic, so the ACL is configured correctly. The problem I have is its always picking the default route because it can't see the second interface as directly connected, yet the route table shows it..... Can anyone suggest where I've gone wrong?&lt;/P&gt;
&lt;PRE&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2, V - VPN
       i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
       ia - IS-IS inter area, * - candidate default, U - per-user static route
       o - ODR, P - periodic downloaded static route, + - replicated route
Gateway of last resort is 120.72.83.25 to network 0.0.0.0

S*       0.0.0.0 0.0.0.0 [1/0] via 120.72.83.25, External-Internet
C        120.1.2.0 255.255.255.248 is directly connected, External-Internet
L        120.1.2.3 255.255.255.255 is directly connected, External-Internet
C        192.168.20.0 255.255.255.0 is directly connected, LAN
L        192.168.20.254 255.255.255.255 is directly connected, LAN
C        202.78.115.120 255.255.255.248 is directly connected, External-VPN
L        202.78.115.123 255.255.255.255 is directly connected, External-VPN&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3713880#M12079</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2020-02-21T16:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3713896#M12080</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Can you post complete PBR related config? Have you applied PBR to correct interface?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;MS&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 01:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3713896#M12080</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2018-09-27T01:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3713899#M12081</link>
      <description>&lt;P&gt;Hi, As you can see from the policy-map debug, its evaluating the policy map, so it must be on the correct interface.&lt;/P&gt;
&lt;PRE&gt;!
interface GigabitEthernet1/3
 nameif LAN
 security-level 100
 ip address 192.168.20.254 255.255.255.0 
 policy-route route-map route-o365&lt;/PRE&gt;</description>
      <pubDate>Thu, 27 Sep 2018 01:25:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3713899#M12081</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-09-27T01:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714021#M12083</link>
      <description>&lt;P&gt;Which is your ASA-IP and which is the ISP IP?&lt;/P&gt;
&lt;P&gt;You need to have the default-route pointing to the ISP IP with a higher AD and the PBR next hop also pointing to the ISP IP. Your local ASA IP is never the next-hop of the PBR or routing-config on your ASA.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 08:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714021#M12083</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-09-27T08:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714154#M12086</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have incorrect config, you need to correct the next hop ip address. Instead of the next hop as&amp;nbsp;203.78.115.123, you need to define&amp;nbsp;203.78.115.122 which is your default gateway for the ASA interface. I see that you have the less preferred route for the secondary ISP which is fine.&lt;/P&gt;
&lt;P&gt;Looks like&amp;nbsp;&lt;SPAN&gt;203.78.115.123 is your ASA secondary ISP interface IP.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, ensure that ASA secondary ISP interface is UP.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Reference document:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/cli/general/asa-94-general-config/route-policy-based.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/cli/general/asa-94-general-config/route-policy-based.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;AJ&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 11:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714154#M12086</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-09-27T11:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714259#M12088</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;Your next hop ip by the looks of it&amp;nbsp; should be .122 not 123&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 12:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714259#M12088</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2018-09-27T12:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714632#M12090</link>
      <description>&lt;P&gt;Thanks for the suggestions!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have just changed the next-hop IP in the route-map back to the gateway IP. Believe me I have been trying many many things to get this to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have stripped out the ACL/route-map/policy-route and&amp;nbsp;the default route to the secondary ISP. I have slowly put everything back in place once piece at a time and its still NOT working.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet tracer still shows the PBR being&amp;nbsp;evaluated and matching the ACL/route-map however on the Route-Lookup step directly after its still choosing the default route with a metric of 1 even though its been told in the step before to use the default route with a metric of 2. Just to check I wasnt going insane I've even reloaded the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think I have nailed down the culprit and I think its bloody NAT. Its only allowing me to have one dynamic interface NAT rule for the LAN network object. So now I have to work out how I can NAT out both the ISP1 and ISP2 links depending on where the PBR sends the traffic all from the same /24 subnet. Has anyone got any pointers on this one?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 21:56:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714632#M12090</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-09-27T21:56:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714677#M12091</link>
      <description>&lt;P&gt;I have been reading the document you mentioned and I have found the following section:&lt;/P&gt;
&lt;PRE&gt;PBR Policies Not Applied for Output Route Look-up
Policy Based Routing is an ingress-only feature; that is, it is applied only to the first packet of a new incoming
connection, at which time the egress interface for the forward leg of the connection is selected. Note that PBR
will not be triggered if the incoming packet belongs to an existing connection, or if NAT is applied&lt;/PRE&gt;
&lt;P&gt;So based on that, if I am doing NAT from my LAN to my WAN connection, PBR will never be evaluated and I cannot direct traffic over an different WAN connection than the default route for specific destinations because I am NATing the traffic? That could explain why my packet-tracers are showing the PBR applied but the Route-Lookup being the default route not the next-hop IP address?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 23:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714677#M12091</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-09-27T23:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714722#M12092</link>
      <description>&lt;P&gt;Ok so after further testing and some trail &amp;amp; error, by setting set interface ISP2 on the route-map it seems that packet-tracer shows the traffic leaving the correct interface.&lt;/P&gt;
&lt;P&gt;Thats good, however because of NAT it seems that the traffic doesn't actually move past the ASA.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;So it looks like its back to troubleshooting NAT and how I can NAT from the LAN interface, to the 2 ISP interfaces at the same time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently for&amp;nbsp;the&amp;nbsp;working ISP (default route) its just&lt;/P&gt;
&lt;PRE&gt;network object LAN
  nat (LAN,ISP1) dynamic interface&lt;/PRE&gt;
&lt;P&gt;But as it can only have 1 NAT rule, I cant do&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;network object LAN
  (LAN,ISP2) dynamic interface&lt;/PRE&gt;
&lt;P&gt;as then the first NAT rule is overwritten.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;How can I get 2 NAT rules so that traffic can leave either ISP interface?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 01:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714722#M12092</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-09-28T01:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714935#M12093</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You dont require to specify second default route for the PBR due to the fw having a connected interface towards it.&lt;BR /&gt;&lt;STRONG&gt;Nat&lt;/STRONG&gt;&lt;BR /&gt;nat (LAN,ISP1) source dynamic any interface&lt;BR /&gt;nat (LAN,ISP2) source dynamic any interface&lt;BR /&gt;&lt;BR /&gt;access-list 100 extended permit icmp any object LAN echo-reply&lt;BR /&gt;access-group 100 in interface ISP1&lt;BR /&gt;access-group 100 in interface ISP2&lt;BR /&gt;&lt;BR /&gt;route ISP1 0.0.0.0 0.0.0.0 x.x.x.x.x 1&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;PBR&lt;BR /&gt;&lt;/STRONG&gt;access-list pbr extended permit ip x.x.x.x. any&lt;BR /&gt;route-map PBR_rm permit 10&lt;BR /&gt;match ip address pbr&lt;BR /&gt;set ip next-hop x.x.x.x&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;int x/x&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;nameif LAN&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;policy-route route-map PBR_rm&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 10:50:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3714935#M12093</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2018-09-28T10:50:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3715668#M12094</link>
      <description>&lt;P&gt;Sorry for late reply. I would expect you have 2 NAT statements corresponding to each ISP without a destination keyword. This feature PBR is a source based routing and ideally, the NAT statement should not affect the routing judgement as long as we have a NAT for that particular Interface. If you look at the packet-tracer output in your initial post, it indicates that&amp;nbsp; PBR kicks in and needs a NAT statement for that chosen interface and a default route for traffic to be forwarded to the next hop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you can post the output packet-tracer command, we can see where this is failing. Next is captures, which can help identify the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;BR /&gt;AJ&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 30 Sep 2018 06:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3715668#M12094</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-09-30T06:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3715890#M12095</link>
      <description>&lt;P&gt;Thanks Paul. Its pretty much what I have except I had the secondary route in which I have since removed and still cant get this to go.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the problem is less that the PBR's configured wrong and more that the second ISP isn't working as expected. Up until now we've only used it exclusively for a VPN connection back to the central office. As that is barely used now in favour of 'the cloud', we want to utilise it to point our traffic to some cloud services onto it, hence the PBR (seemed quite simple in my head).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the reason the PBR isn't working is because connectivity out that interface is either a NAT problem (not entirely sure myself if it is or not) or an ISP problem (which I could be troubleshooting something wasting my time). I have sanitized my config and happy to post it, but its verging on over 450 lines which makes this comment look hideous. Let me know if its more appropriate to host it on pastebin etc and link.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Substituions applied are:&amp;nbsp;&lt;BR /&gt;ISP1 - Interface g1/1 - IP 100.0.0.1&lt;BR /&gt;ISP2 - Interface g1/2 - IP 200.0.0.1&lt;BR /&gt;LAN - interface g1/3 - 192.186.20.254&lt;/P&gt;
&lt;P&gt;Existing VPN connection Endpoint: 50.0.0.1&lt;BR /&gt;&lt;BR /&gt;Route-Map is route-o365 applied to the LAN interface g1/0 and access-list for it is route-o365&lt;BR /&gt;&lt;BR /&gt;Using packet Tracer I still get it picks up the PBR and apparently applies it but the second route-lookup always goes back to the primary ISP. Debugging the policy map always ends in&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;pbr: First matching rule from ACL(9)
pbr: route map route-xxx, sequence 10, permit; proceed with policy routing
pbr: evaluating next-hop 203.78.115.123
pbr: no connected route to next-hop 203.78.115.123 found
pbr: policy based routing could not be applied; proceeding with normal route lookup&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Phase: 1
Type: PBR-LOOKUP
Subtype: policy-route
Result: ALLOW
Config:
route-map route-o365 permit 10
match ip address route-o365
set ip next-hop 200.0.0.2
Additional Information:
Matched route-map route-o365, sequence 10, permit

Phase: 2
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
found next-hop 100.0.0.2 using egress ifc External-Internet&lt;/PRE&gt;
&lt;P&gt;Sanitized config is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;VNSGN-RTR-1(config)# show run&lt;BR /&gt;: Saved&lt;BR /&gt;&lt;BR /&gt;: &lt;BR /&gt;: Serial Number: JADxxxxxLM&lt;BR /&gt;: Hardware: ASA5508, 8192 MB RAM, CPU Atom C2000 series 2000 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(1) &lt;BR /&gt;!&lt;BR /&gt;hostname VNSGN-RTR-1&lt;BR /&gt;domain-name domain.com.vn&lt;BR /&gt;enable password lol&lt;BR /&gt;names&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif External-Internet&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 100.0.0.1 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif External-VPN&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 200.0.0.1 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; nameif LAN&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.20.254 255.255.255.0 &lt;BR /&gt; policy-route route-map route-o365&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; nameif Guest&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.10.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 49&lt;BR /&gt; ip address 172.27.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone ICT 7&lt;BR /&gt;dns domain-lookup LAN&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.20.2 &lt;BR /&gt; name-server 192.168.20.4 &lt;BR /&gt; domain-name domain.com.vn&lt;BR /&gt;object network AucklandLANSubnet&lt;BR /&gt; subnet 172.17.15.0 255.255.255.0&lt;BR /&gt; description Auckland LAN Subnet/24&lt;BR /&gt;object network AucklandDMZSubnet&lt;BR /&gt; subnet 172.17.18.0 255.255.255.0&lt;BR /&gt; description Auckland DMZ Subnet/24&lt;BR /&gt;object network PCAdmin&lt;BR /&gt; host 192.168.20.6&lt;BR /&gt; description PCAdmin&lt;BR /&gt;object network VNDC&lt;BR /&gt; host 192.168.20.2&lt;BR /&gt; description VNDC&lt;BR /&gt;object network NZAKL1-Office-Ext-Network&lt;BR /&gt; subnet 50.0.0.1 255.255.255.252&lt;BR /&gt;object service Windows-RDP&lt;BR /&gt; service tcp source eq 3389 destination eq 3389 &lt;BR /&gt;object network LAN&lt;BR /&gt; subnet 192.168.20.0 255.255.255.0&lt;BR /&gt;object network Guest_LAN&lt;BR /&gt; subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network vnhcm1-vpn-1&lt;BR /&gt; host 172.27.3.2&lt;BR /&gt;object service https&lt;BR /&gt; service udp source eq 443 destination eq 443 &lt;BR /&gt;object network VN-Time-Server&lt;BR /&gt; fqdn v4 vn.pool.ntp.org&lt;BR /&gt;object network ClientVPN-Network&lt;BR /&gt; subnet 172.27.3.0 255.255.255.0&lt;BR /&gt;object network ClientVPN_LAN&lt;BR /&gt; subnet 172.27.3.0 255.255.255.0&lt;BR /&gt;object network ClientVPN&lt;BR /&gt; host 172.27.3.2&lt;BR /&gt;object network LAN1&lt;BR /&gt; subnet 192.168.20.0 255.255.255.0&lt;BR /&gt;object network LAN-VPNInt&lt;BR /&gt; subnet 192.168.20.0 255.255.255.0&lt;BR /&gt;object network LAN-VPNI&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object AucklandDMZSubnet&lt;BR /&gt; network-object object AucklandLANSubnet&lt;BR /&gt;object-group network o365Rules&lt;BR /&gt; remark office 365 endpoints&lt;BR /&gt;access-list External-VPN_cryptomap extended permit ip 192.168.20.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 &lt;BR /&gt;access-list LAN_access_in extended permit icmp 192.168.20.0 255.255.255.0 any &lt;BR /&gt;access-list LAN_access_in extended deny ip 192.168.20.0 255.255.255.0 object-group BLOCKED-SERVICES &lt;BR /&gt;access-list LAN_access_in extended permit udp object-group DNS-Servers any eq domain &lt;BR /&gt;access-list LAN_access_in extended permit ip host 192.168.20.6 any &lt;BR /&gt;access-list LAN_access_in extended permit tcp object-group VNSGN1-Infra-Servers any object-group ExternalWebAccess &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 any object-group ExternalWebAccess &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object-group NZAKL1-All-Subnets eq 3389 &lt;BR /&gt;access-list LAN_access_in extended permit ip object PCAdmin object NADA &lt;BR /&gt;access-list LAN_access_in extended permit tcp object VNDEV08 object-group Calqtech-RDP-Servers eq 3389 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 172.17.15.0 255.255.255.0 object-group LynchFileTransferServiceGroup &lt;BR /&gt;access-list LAN_access_in extended permit ip 192.168.20.0 255.255.255.0 object ZEUS &lt;BR /&gt;access-list LAN_access_in extended permit ip 192.168.20.0 255.255.255.0 object LyncServer02 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object AucklandLANSubnet object-group ExternalWebAccess &lt;BR /&gt;access-list LAN_access_in extended permit object-group SIPServiceGroup 192.168.20.0 255.255.255.0 object AucklandLANSubnet &lt;BR /&gt;access-list LAN_access_in extended permit ip 192.168.20.0 255.255.255.0 object SCCM &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object-group AzureSQLDatabase object-group AzureSQL &lt;BR /&gt;access-list LAN_access_in extended permit object-group TCP-UDP 192.168.20.0 255.255.255.0 object-group Merlot-Aero-Azure-VMs object-group Merlot-Aero-AzureVM-PortGroup &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object AUGENTFS03 eq 8080 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object NADA eq 8080 &lt;BR /&gt;access-list LAN_access_in extended permit tcp object PCAdmin any eq ftp &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object-group NZVMCHL-Servers eq 3389 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 object-group NZVMCHL-Servers eq 135 &lt;BR /&gt;access-list LAN_access_in extended permit tcp object-group DM_INLINE_NETWORK_6 object softtech-logserver.database.windows.net object-group AzureSQL &lt;BR /&gt;access-list LAN_access_in extended permit object-group DM_INLINE_SERVICE_3 192.168.20.0 255.255.255.0 object NZAKL1IIS001 &lt;BR /&gt;access-list LAN_access_in extended permit ip 192.168.20.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list LAN_access_in extended permit tcp 192.168.20.0 255.255.255.0 host 172.17.15.9 eq ftp &lt;BR /&gt;access-list LAN_access_in extended permit ip 192.168.20.0 255.255.255.0 object NZAKL1SQ001 &lt;BR /&gt;access-list LAN_access_in extended permit tcp object-group Allow-GoRentals-UAT object-group GoRentals-Azure-Resources object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list LAN_access_in extended permit udp object-group ESXi-Server-Group object VN-Time-Server eq ntp &lt;BR /&gt;access-list LAN_access_in extended permit object-group PPTPGroup object-group DM_INLINE_NETWORK_5 object DRCT-VPNEndpoint &lt;BR /&gt;access-list LAN_access_in extended permit tcp object-group DM_INLINE_NETWORK_2 object dp-dev.database.windows.net object-group AzureSQL &lt;BR /&gt;access-list Allow_All extended permit ip any any &lt;BR /&gt;access-list External-VPN_access_in_controlplane extended permit tcp object AucklandLANSubnet any object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list External-VPN_access_in_controlplane extended permit tcp object NZAKL1-Office-Ext-Network any object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list External-Internet_access_in extended permit tcp object NZAKL1-Office-Ext-Network object PCAdmin eq 3389 &lt;BR /&gt;access-list External-Internet_access_in extended permit icmp any any time-exceeded &lt;BR /&gt;access-list External-Internet_access_in extended permit udp any object vnhcm1-vpn-1 eq 1194 &lt;BR /&gt;access-list External-Internet_access_in extended permit icmp any any unreachable &lt;BR /&gt;access-list Guest_access_in extended permit ip host 192.168.10.253 host 192.168.20.6 &lt;BR /&gt;access-list Guest_access_in extended permit tcp 192.168.10.0 255.255.255.0 any object-group ExternalWebAccess &lt;BR /&gt;access-list Guest_access_in extended permit icmp 192.168.10.0 255.255.255.0 any &lt;BR /&gt;access-list Guest_access_in extended permit udp 192.168.10.0 255.255.255.0 any eq domain &lt;BR /&gt;access-list Guest_access_in extended permit tcp 192.168.10.0 255.255.255.0 object app.ss-prophet.com eq 3389 &lt;BR /&gt;access-list Guest_access_in extended permit ip 192.168.10.0 255.255.255.0 object secure.domain.com &lt;BR /&gt;access-list Guest_access_in extended permit tcp object vnhcm1-vpn-1 object-group DM_INLINE_NETWORK_3 eq ldap &lt;BR /&gt;access-list global_mpc extended permit ip any any &lt;BR /&gt;access-list ClientVPN_access_in extended permit ip object vnhcm1-vpn-1 any &lt;BR /&gt;access-list ClientVPN_access_in extended permit tcp object vnhcm1-vpn-1 object-group DM_INLINE_NETWORK_4 eq ldap &lt;BR /&gt;access-list ClientVPN_access_in extended permit object-group DM_INLINE_SERVICE_1 object VPN-Network 192.168.20.0 255.255.255.0 &lt;BR /&gt;access-list route-o365 extended permit ip any object-group o365Rules &lt;BR /&gt;pager lines 50&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;no logging hide username&lt;BR /&gt;logging standby&lt;BR /&gt;logging list SysLogList level informational&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging mail critical&lt;BR /&gt;logging device-id hostname&lt;BR /&gt;logging host LAN 192.168.20.22&lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;flow-export destination LAN 192.168.20.6 5002&lt;BR /&gt;flow-export template timeout-rate 1&lt;BR /&gt;flow-export delay flow-create 30&lt;BR /&gt;mtu External-Internet 1500&lt;BR /&gt;mtu External-VPN 1500&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu Guest 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any echo LAN&lt;BR /&gt;icmp permit any echo-reply LAN&lt;BR /&gt;icmp permit any echo Guest&lt;BR /&gt;icmp permit any echo-reply Guest&lt;BR /&gt;asdm image disk0:/asdm-781.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (LAN,Guest) source static LAN LAN destination static Guest Guest&lt;BR /&gt;nat (LAN,External-VPN) source static LAN LAN destination static NZAKL1-All-Subnets NZAKL1-All-Subnets no-proxy-arp route-lookup&lt;BR /&gt;nat (LAN,External-VPN) source dynamic any interface&lt;BR /&gt;nat (LAN,External-Internet) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;object network PCAdmin&lt;BR /&gt; nat (LAN,External-Internet) static interface service tcp 3389 1337 &lt;BR /&gt;object network Guest_LAN&lt;BR /&gt; nat (Guest,External-Internet) dynamic interface&lt;BR /&gt;object network vnhcm1-vpn-1&lt;BR /&gt; nat (DMZ,External-Internet) static 100.0.0.2 service udp 1194 1194 &lt;BR /&gt;object network ClientVPN_LAN&lt;BR /&gt; nat (DMZ,External-Internet) dynamic interface&lt;BR /&gt;access-group External-Internet_access_in in interface External-Internet&lt;BR /&gt;access-group External-VPN_access_in_controlplane in interface External-VPN control-plane&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group Guest_access_in in interface Guest&lt;BR /&gt;access-group ClientVPN_access_in in interface DMZ&lt;BR /&gt;!&lt;BR /&gt;route-map route-o365 permit 10&lt;BR /&gt; match ip address route-o365&lt;BR /&gt; set interface External-VPN&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;route External-Internet 0.0.0.0 0.0.0.0 100.0.0.2 1&lt;BR /&gt;route External-VPN 50.0.0.1 255.255.255.255 200.0.0.2 1&lt;BR /&gt;route External-VPN 172.17.15.0 255.255.255.0 200.0.0.2 1&lt;BR /&gt;route External-VPN 172.17.18.0 255.255.255.0 200.0.0.2 1&lt;BR /&gt;route DMZ 172.27.5.0 255.255.255.0 172.27.3.2 1&lt;BR /&gt;route Guest 192.168.21.0 255.255.255.0 192.168.10.253 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authorization http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.20.6 255.255.255.255 LAN&lt;BR /&gt;http 172.17.15.0 255.255.255.0 LAN&lt;BR /&gt;snmp-server host LAN 192.168.20.6 community ***** version 2c&lt;BR /&gt;snmp-server location HCMC&lt;BR /&gt;snmp-server contact Admin&lt;BR /&gt;sysopt noproxyarp LAN&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set AES256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map External-VPN_map5 1 match address External-VPN_cryptomap&lt;BR /&gt;crypto map External-VPN_map5 1 set pfs &lt;BR /&gt;crypto map External-VPN_map5 1 set peer 50.0.0.1 &lt;BR /&gt;crypto map External-VPN_map5 1 set ikev1 phase1-mode aggressive &lt;BR /&gt;crypto map External-VPN_map5 1 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map External-VPN_map5 1 set security-association lifetime seconds 86400&lt;BR /&gt;crypto map External-VPN_map5 1 set security-association lifetime kilobytes unlimited&lt;BR /&gt;crypto map External-VPN_map5 1 set nat-t-disable&lt;BR /&gt;crypto map External-VPN_map5 interface External-VPN&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt; no validation-usage&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt; certificate ca xxxx&lt;BR /&gt; quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable External-VPN&lt;BR /&gt;crypto ikev1 enable External-VPN&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 50.0.0.1 255.255.255.252 External-Internet&lt;BR /&gt;ssh 50.0.0.1 255.255.255.252 External-VPN&lt;BR /&gt;ssh 192.168.20.6 255.255.255.255 LAN&lt;BR /&gt;ssh 172.17.15.0 255.255.255.0 LAN&lt;BR /&gt;ssh timeout 10&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access LAN&lt;BR /&gt;&lt;BR /&gt;dhcpd auto_config External-Internet&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 150.101.254.110&lt;BR /&gt;group-policy AugenVPNGroupPolicy internal&lt;BR /&gt;group-policy AugenVPNGroupPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;tunnel-group 50.0.0.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 50.0.0.1 general-attributes&lt;BR /&gt; default-group-policy AugenVPNGroupPolicy&lt;BR /&gt;tunnel-group 50.0.0.1 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key ********&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt; match access-list global_mpc&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt; no tcp-inspection&lt;BR /&gt;policy-map route-o365&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt; inspect pptp &lt;BR /&gt; class global-class&lt;BR /&gt; flow-export event-type all destination 192.168.20.6&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:xxxxx&lt;BR /&gt;: end &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 01:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3715890#M12095</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-10-01T01:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3715976#M12096</link>
      <description>&lt;PRE&gt;object-group network o365Rules&lt;BR /&gt; remark office 365 endpoints&lt;/PRE&gt;
&lt;PRE&gt;access-list route-o365 extended permit ip any object-group o365Rules&lt;/PRE&gt;
&lt;PRE&gt;route-map route-o365 permit 10&lt;BR /&gt; match ip address route-o365&lt;BR /&gt; set interface External-VPN&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;Is the object-group network o365Rules a copy paste error?&amp;nbsp; it only has a remark.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 06:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3715976#M12096</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-10-01T06:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3716859#M12097</link>
      <description>&lt;P&gt;Hi Marius, not an error, but removed to make the config as small as possible, it has ~150 rules in it and you can see by packet tracer output earlier in the post it is&amp;nbsp;matching against it.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 19:45:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3716859#M12097</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-10-01T19:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3717566#M12098</link>
      <description>&lt;P&gt;I don't see an interface within the 203.78.115.123 subnet configured on your ASA.&amp;nbsp; As the error message states, you need an interface that is directly connected to the second ISP or use a directly connected subnet that is in the path to the second ISP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif External-Internet&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 100.0.0.1 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif External-VPN&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 200.0.0.1 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; nameif LAN&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.20.254 255.255.255.0 &lt;BR /&gt; policy-route route-map route-o365&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; nameif Guest&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.10.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 49&lt;BR /&gt; ip address 172.27.3.1 255.255.255.0&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 16:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3717566#M12098</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-10-02T16:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X PBR Wrong Interface Selection</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3718787#M12099</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;It appears that the configuration was 90% correct in the original deployment. The major problem was the gateway IP was incorrect so the suggestions did help get me on the right track there. The rest of the issues were caused by an ISP problem which they have now acknowledged and fixed for us.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you all for your assistance.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 21:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-pbr-wrong-interface-selection/m-p/3718787#M12099</guid>
      <dc:creator>LordBoBCUP</dc:creator>
      <dc:date>2018-10-03T21:58:23Z</dc:date>
    </item>
  </channel>
</rss>

