<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic question about policy based routing on ASA 5500x series in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-policy-based-routing-on-asa-5500x-series/m-p/3675748#M13196</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know if PBR on the new ASAs to solve the following scenario? Or is there a better option?&lt;/P&gt;
&lt;P&gt;I need to send outbound SMTP traffic out to a separate physical port from the main one.&lt;/P&gt;
&lt;P&gt;I have a stateless security device that filters inbound and outbound traffic between our legacy ASA and our internet link. We utilize an online spam service that has it's IP whitelisted on the security device,and our MX record points to that service. However outbound SMTP traffic goes through the security device and is subsequently blocked to certain geographic areas. I can't whitelist all destination mail servers, so I'd like to send all SMTP traffic out an alternate port on the new 5516x that will bypass the security device.&lt;/P&gt;
&lt;P&gt;I don't want other traffic to bypass the security device, only SMTP traffic.&lt;/P&gt;
&lt;P&gt;What's the best was of doing this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;B&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:01:29 GMT</pubDate>
    <dc:creator>Brad Hodgins</dc:creator>
    <dc:date>2020-02-21T16:01:29Z</dc:date>
    <item>
      <title>question about policy based routing on ASA 5500x series</title>
      <link>https://community.cisco.com/t5/network-security/question-about-policy-based-routing-on-asa-5500x-series/m-p/3675748#M13196</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know if PBR on the new ASAs to solve the following scenario? Or is there a better option?&lt;/P&gt;
&lt;P&gt;I need to send outbound SMTP traffic out to a separate physical port from the main one.&lt;/P&gt;
&lt;P&gt;I have a stateless security device that filters inbound and outbound traffic between our legacy ASA and our internet link. We utilize an online spam service that has it's IP whitelisted on the security device,and our MX record points to that service. However outbound SMTP traffic goes through the security device and is subsequently blocked to certain geographic areas. I can't whitelist all destination mail servers, so I'd like to send all SMTP traffic out an alternate port on the new 5516x that will bypass the security device.&lt;/P&gt;
&lt;P&gt;I don't want other traffic to bypass the security device, only SMTP traffic.&lt;/P&gt;
&lt;P&gt;What's the best was of doing this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;B&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-policy-based-routing-on-asa-5500x-series/m-p/3675748#M13196</guid>
      <dc:creator>Brad Hodgins</dc:creator>
      <dc:date>2020-02-21T16:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: question about policy based routing on ASA 5500x series</title>
      <link>https://community.cisco.com/t5/network-security/question-about-policy-based-routing-on-asa-5500x-series/m-p/3675894#M13197</link>
      <description>&lt;P&gt;You need to create the access list for interesting traffic that will perform PBR based on the protocol.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# access-list Interesting extended permit tcp any any eq smtp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="crayon-5b5a5eeadd72d837536514-7" class="crayon-line"&gt;&lt;SPAN&gt;ciscoasa(config)#&amp;nbsp;&lt;/SPAN&gt;route-map map-pbr permit 10&lt;/DIV&gt;
&lt;DIV id="crayon-5b5a5eeadd72d837536514-8" class="crayon-line crayon-striped-line"&gt;&lt;SPAN&gt;ciscoasa(config-route-map)#&amp;nbsp;&lt;/SPAN&gt;match ip address&amp;nbsp;Interesting&lt;/DIV&gt;
&lt;DIV id="crayon-5b5a5eeadd72d837536514-9" class="crayon-line"&gt;&lt;SPAN&gt;ciscoasa(config-route-map)#&lt;/SPAN&gt;set ip next-hop&amp;nbsp;&lt;EM&gt;ip-of-next-hope-for-smtp-traffic&lt;/EM&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;apply the PBR on the inside interface&lt;/P&gt;
&lt;DIV class="crayon-line"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="crayon-5b5a5eeadd72d837536514-5" class="crayon-line"&gt;&lt;SPAN&gt;ciscoasa(config)#&lt;/SPAN&gt;interface GigabitEthernet1/3
&lt;DIV id="crayon-5b5a5eeadd72d837536514-2" class="crayon-line crayon-striped-line"&gt;&lt;SPAN&gt;ciscoasa(config-if)#&lt;/SPAN&gt;policy-route route-map map-pbr&lt;/DIV&gt;
&lt;DIV class="crayon-line crayon-striped-line"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="crayon-line crayon-striped-line"&gt;Regards&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 26 Jul 2018 23:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-policy-based-routing-on-asa-5500x-series/m-p/3675894#M13197</guid>
      <dc:creator>epoceros1</dc:creator>
      <dc:date>2018-07-26T23:57:10Z</dc:date>
    </item>
  </channel>
</rss>

