<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011179#M147012</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also added the following lines&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route outside1 0.0.0.0 0.0.0.0 &amp;lt;ISP1 Gw&amp;gt;&amp;nbsp;1&lt;BR /&gt;route outside2 0.0.0.0 0.0.0.0 &amp;lt;ISP2 Gw&amp;gt; 2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Feb 2017 04:43:46 GMT</pubDate>
    <dc:creator>manemaren</dc:creator>
    <dc:date>2017-02-02T04:43:46Z</dc:date>
    <item>
      <title>ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011176#M147007</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am trying to configure my ASA 5515x with Policy Based Routing. I have 2 inside network which need to access internet via 2 different outside interface.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network OBJ-NET-INSIDE25&lt;BR /&gt; subnet 172.25.1.0 255.255.255.0&lt;BR /&gt;object network OBJ-NET-INSIDE26&lt;BR /&gt; subnet 172.26.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object network OBJ-NET-INSIDE25&lt;BR /&gt; nat (inside25,outside1) dynamic interface&lt;BR /&gt;object network OBJ-NET-INSIDE26&lt;BR /&gt; nat (inside26,outside2) dynamic interface&lt;/P&gt;
&lt;P&gt;access-list ACL-OUTSIDE1 permit 172.25.1.0 255.255.255.0&lt;BR /&gt;access-list ACL-OUTSIDE2 permit 172.26.1.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;route-map PBR-MAP permit 10&lt;BR /&gt; match ip address ACL-OUTSIDE1&lt;BR /&gt; set interface OUTSIDE1&lt;BR /&gt;route-map PBR-MAP permit 20&lt;BR /&gt; match ip address ACL-OUTSIDE2&lt;BR /&gt; set interface OUTSIDE2&lt;BR /&gt;route-map PBR-MAP permit 30&lt;BR /&gt; set interface null0&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt; policy-route route-map PBR-MAP&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt; policy-route route-map PBR-MAP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It does not work. The PC in the inside26 network did not get internet access. I did a debug as follows :&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;pbr: policy based route lookup called for x.x.x.77/138 to x.x.x.255/138 proto 17 sub_proto 0 received on interface outside2&lt;BR /&gt;pbr: First matching rule from ACL(-1)&lt;BR /&gt;pbr: route map PBR-MAP, sequence 30, permit; proceed with policy routing&lt;BR /&gt;pbr: evaluating interface Null0&lt;BR /&gt;pbr: policy based routing applied; packet is dropped&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Something is not right with the Access-List? It matches to sequence 30. Since the PC is in inside26, it should match sequence 20 but it didn't.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any idea? Please assist.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011176#M147007</guid>
      <dc:creator>manemaren</dc:creator>
      <dc:date>2019-03-12T08:52:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011177#M147008</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;A couple of issues:&lt;/P&gt;
&lt;P&gt;You need to configure extended ACLs to match under the route-map&lt;/P&gt;
&lt;P&gt;access-list ACL-OUTSIDE2 extended permit 172.26.1.0 255.255.255.0 any&lt;/P&gt;
&lt;P&gt;access-list ACL-OUTSIDE1 extended permit 172.25.1.0 255.255.255.0 any&lt;/P&gt;
&lt;P&gt;Secondly, it seems you applied the PRB on your outbound interfaces but it needs to be configured with an inbound direction. Remove it from Gi0/0 and gi0/1 an apply it to the inside25, inside26 defined interfaces.&lt;/P&gt;
&lt;P&gt;Make sure that you have a second default route with a higher metric for the outside2 interface&lt;/P&gt;
&lt;P&gt;route outside1 0 0 &amp;lt;ISP 1&amp;gt; 1&lt;/P&gt;
&lt;P&gt;route outside2 0 0 &amp;lt;ISP 2&amp;gt; 2&lt;/P&gt;
&lt;P&gt;As a recommendation, we prefer to use the set ip next-hop instead of the set interface on the route-map clause. &lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Pablo&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 02:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011177#M147008</guid>
      <dc:creator>Pablo</dc:creator>
      <dc:date>2017-02-02T02:36:32Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011178#M147010</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I made the amendments and the PBR is now working.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, my dhcp is not working. Initially it was working.&lt;/P&gt;
&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;dhcpd lease 86400&lt;BR /&gt;dhcpd address 172.25.1.50-172.25.1.200 inside25&lt;BR /&gt;dhcpd enable inside25&lt;BR /&gt;dhcpd address 172.26.1.50-172.26.1.200 inside26&lt;BR /&gt;dhcpd enable inside26&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also could not ping from inside segment to any outside&amp;nbsp;public ip.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I did the following :&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt; policy-route route-map PBR-MAP&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/3&lt;BR /&gt; policy-route route-map PBR-MAP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list ACL-OUTSIDE1 extended permit ip 172.25.1.0 255.255.255.0 any4&lt;BR /&gt;access-list ACL-OUTSIDE2 extended permit ip 172.26.1.0 255.255.255.0 any4&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route-map PBR-MAP permit 10&lt;BR /&gt; match ip address ACL-OUTSIDE1&lt;BR /&gt; set ip next-hop&amp;nbsp;&amp;lt;isp1 gw&amp;gt;&lt;BR /&gt;route-map PBR-MAP permit 20&lt;BR /&gt; match ip address ACL-OUTSIDE2&lt;BR /&gt; set ip next-hop&amp;nbsp;&amp;lt;isp2 gw&amp;gt;&lt;BR /&gt;route-map PBR-MAP permit 30&lt;BR /&gt; set interface null0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please advice.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 04:40:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011178#M147010</guid>
      <dc:creator>manemaren</dc:creator>
      <dc:date>2017-02-02T04:40:06Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011179#M147012</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also added the following lines&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route outside1 0.0.0.0 0.0.0.0 &amp;lt;ISP1 Gw&amp;gt;&amp;nbsp;1&lt;BR /&gt;route outside2 0.0.0.0 0.0.0.0 &amp;lt;ISP2 Gw&amp;gt; 2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 04:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011179#M147012</guid>
      <dc:creator>manemaren</dc:creator>
      <dc:date>2017-02-02T04:43:46Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011180#M147013</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The problem is that you're blackholing the DHCP requests on the clause 30 of your route-maps. You can either remove this clause or create a clause on top of that and match a new ACL that permits traffic from 0.0.0.0 to 255.255.255.255 although this might not work due to &lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCux16427/?reffering_site=dumpcr"&gt;CSCux16427&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Pablo&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 18:13:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3011180#M147013</guid>
      <dc:creator>Pablo</dc:creator>
      <dc:date>2017-02-02T18:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3306978#M147015</link>
      <description>&lt;P&gt;Hello Cisco Community!,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to accomplish the same objective. I now have two ISP links and I need to only provide access to the new link to one subnet. I have reviewed the "Policy Base Routing" doc for ASA in which I already entered the needed commands based on this documents. My concern is that all LAN traffic is entering the ASA 5515-X through one interface, "inside", if when I apply the "route-map" for the specific subnet that I configured that all subnets will not traverse through. I believe I am looking at this like a trunk port. Would implementing the route-map for the specific subnet in the "inside" interface could drop the traffic of the other subnets?&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jan 2018 20:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-pbr/m-p/3306978#M147015</guid>
      <dc:creator>gustavo-suarez</dc:creator>
      <dc:date>2018-01-05T20:50:28Z</dc:date>
    </item>
  </channel>
</rss>

