<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, all! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813004#M159846</link>
    <description>&lt;P&gt;Hi, all!&lt;/P&gt;
&lt;P&gt;Yes, ASA starting with version 9.5(1) formally is able to separate table for management but it's not fully supported (example for 9.5(2)): 'copy' and '| redirect' go through different interfaces. Explanations are below.&lt;/P&gt;
&lt;P&gt;We had &lt;SPAN id="result_box" class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;something like&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;wiring&lt;/SPAN&gt; diagram for our ASA5525-X:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt; font-family: courier new,courier,monospace;"&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | Ext int&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +---+-------+&lt;BR /&gt;&amp;nbsp; Mgmt int |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; +------+ ASA5525-X |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +---+-------+&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | Int int&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;+--V----------V----+&lt;BR /&gt;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Router&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;+-^--^--^--^--^--^-+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +--------+&lt;BR /&gt;&amp;nbsp;&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; TFTP&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; +-------+ server |&lt;BR /&gt;&amp;nbsp; ...internal nets...&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +--------+&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt; font-family: courier new,courier,monospace;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;And I found that copy and redirect uses different interfaces for access to tftp-server on internal network:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;asa-mgmt# copy running-config tftp://tftp_server_ip/file&lt;/STRONG&gt; - uses ASA management interface (I see mgmt source ip on tftp server)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;asa-mgmt# sho running-config | redirect&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt; tftp://tftp_server_ip/file&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt; - uses ASA internal interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;T&lt;SPAN id="result_box" class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;hat is to say&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;that the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;appeared in ASA 9.5(1) separate routing table for management-only interfaces not brough to full vrf like in ASR routers.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Feb 2016 07:49:16 GMT</pubDate>
    <dc:creator>Sergei_Dubrov</dc:creator>
    <dc:date>2016-02-15T07:49:16Z</dc:date>
    <item>
      <title>ASA 5525-X management interface routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812995#M159837</link>
      <description>&lt;P&gt;I am setting up a new active/standby pair of ASA 5525-X appliances.&amp;nbsp; They are currently running 9.4(2) code.&amp;nbsp; I have a couple of other ASA failover pairs in production but I never bothered setting up the management interface for those.&lt;/P&gt;
&lt;P&gt;I thought I'd follow "best practices" and use the management interface this time but it seems the management interface uses the same routing table as the inside and outside firewalling/routing interfaces.&amp;nbsp; I kind of assumed this would be more like the management vrf setup used in switches but it's not even close.&lt;/P&gt;
&lt;P&gt;Is it possible to restrict the control-plane traffic to using management0/0 and have "inside" hosts route to some of the same destinations via the "outside" interface?&amp;nbsp; For example, I want the ASA clock to synch to my internal NTP servers via the man0/0 but I need the servers to synch to those same NTP servers via the "outside" interface gi0/0.&amp;nbsp; What sort of routing gynastics are needed, and where might they be documented?&lt;/P&gt;
&lt;P&gt;This installation is a little unusual as it i has no Internet connection.&amp;nbsp; It's just being used to segregate sensitive subnets from end-user and less sensitive (but "trusted") subnets.&amp;nbsp; OSPF is used throughout the network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:15:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812995#M159837</guid>
      <dc:creator>darthnul</dc:creator>
      <dc:date>2019-03-12T07:15:48Z</dc:date>
    </item>
    <item>
      <title>From what I understand the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812996#M159838</link>
      <description>&lt;P&gt;From what I understand the management table is separate. &amp;nbsp;There used to be a command in the ASAs "show route management-only" but I have not seen it lately in some of the newer codes.&lt;/P&gt;
&lt;P&gt;I also believe if the connection comes in on the management interface it will route back out that interface. &amp;nbsp;I am interested in this too because it seems like there was a change to this behavior at some point.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 19:29:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812996#M159838</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2016-02-09T19:29:53Z</dc:date>
    </item>
    <item>
      <title>Thanks for the reply!</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812997#M159839</link>
      <description>&lt;P&gt;Thanks for the reply!&lt;/P&gt;
&lt;P&gt;It looks like some 9.5 versions have a separate routing table for m0/0.&amp;nbsp; I'm beginning to wonder if there's any real benefit in bothering with the management interface at all with 9.4.&amp;nbsp; I'm not really interested in having the responses from my ASDM and SSH sessions getting routed back to me asymetrically.&amp;nbsp; It's been useful during my initial setup since I can verify my production AAA, logging, NTP functions, etc while keeping all the "inside" and "outside" interfaces in the lab, but I'm not sure I'd gain anything once it's all on the production network.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 20:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812997#M159839</guid>
      <dc:creator>darthnul</dc:creator>
      <dc:date>2016-02-09T20:09:43Z</dc:date>
    </item>
    <item>
      <title>Yeah, I confirmed on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812998#M159840</link>
      <description>&lt;P&gt;Yeah, I confirmed on an ASA with 9.5(1) that it has a separate table for management. &amp;nbsp;Another one I have with 9.3 does not. &amp;nbsp;For some reason I thought I had saw the command on older ones but probably not.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 20:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812998#M159840</guid>
      <dc:creator>cmlozano8</dc:creator>
      <dc:date>2016-02-09T20:28:47Z</dc:date>
    </item>
    <item>
      <title>Yes that was a long-awaited</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812999#M159841</link>
      <description>&lt;P&gt;Yes that was a long-awaited featured just introduced last fall in 9.5(1).&lt;/P&gt;
&lt;P&gt;Before that, the management interface was useful primarily in two use cases (post initial setup):&lt;/P&gt;
&lt;P&gt;a. Organizations with a true out of band management network&lt;/P&gt;
&lt;P&gt;b. For the software modules (ips, cxsc and sfr) that used that physical interface as their communications path for configurations or communications back to their respective management platform (ips = IME or CSM, cxsc = Prime Security Manager, sfr = FireSIGHT / FirePOWER Management Center&lt;/P&gt;</description>
      <pubDate>Tue, 09 Feb 2016 23:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2812999#M159841</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-09T23:55:59Z</dc:date>
    </item>
    <item>
      <title>I've got the Firepower/sight</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813000#M159842</link>
      <description>&lt;P&gt;I've got the Firepower/sight bundle so there's a good chance it'll be enabled in the near future.&amp;nbsp; I've never done that with an ASA but I've been managing Sourcefire stuff going on ten years now.&lt;/P&gt;
&lt;P&gt;Have you been running 9.5(1)?&amp;nbsp; Has it been stable?&amp;nbsp; This new ASA pair won't be in production for another week so I still have time to upgrade.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2016 15:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813000#M159842</guid>
      <dc:creator>darthnul</dc:creator>
      <dc:date>2016-02-10T15:19:27Z</dc:date>
    </item>
    <item>
      <title>Actually we're running 9.5(2)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813001#M159843</link>
      <description>&lt;P&gt;Actually we're running 9.5(2) here at the office.&lt;/P&gt;
&lt;P&gt;I've deployed it at a couple of customer sites as well and it seems fine so far.&lt;/P&gt;
&lt;P&gt;The current recommended versions that also supports the FirePOWER module would be the latest 9.4(2) interim build 6.&lt;/P&gt;
&lt;P&gt;The module will use the physical management interface but the ASA software does not need to so the separate routing table for the base ASA isn't a critical path item there.&lt;/P&gt;
&lt;P&gt;Think of it like two VMs on a hypervisor - the base ASA is one and the FirePOWER module is the other. The FirePOWER module is always mapped to the management interface. The ASA software is always mapped to all of the interfaces but you don't need to use them all.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2016 15:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813001#M159843</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-10T15:24:33Z</dc:date>
    </item>
    <item>
      <title>So the Firepower module uses</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813002#M159844</link>
      <description>&lt;P&gt;So the Firepower module uses its own routing table instead of the ASA's?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 60px;"&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2016 15:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813002#M159844</guid>
      <dc:creator>darthnul</dc:creator>
      <dc:date>2016-02-10T15:43:49Z</dc:date>
    </item>
    <item>
      <title>That's correct. It's just a</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813003#M159845</link>
      <description>&lt;P&gt;That's correct. It's just a default gateway for the Linux kernel really - not a full fledged routing table.&lt;/P&gt;
&lt;P&gt;The only thing the sfr module uses it for are management plane communications - to ASDM, FirePOWER Manager or to the cloud for things like URL categorization and sha-256 hash lookup for AMP file policies.&lt;/P&gt;
&lt;P&gt;All data plane communications are via the internal backplane interface to the parent ASA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2016 15:48:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813003#M159845</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-10T15:48:12Z</dc:date>
    </item>
    <item>
      <title>Hi, all!</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813004#M159846</link>
      <description>&lt;P&gt;Hi, all!&lt;/P&gt;
&lt;P&gt;Yes, ASA starting with version 9.5(1) formally is able to separate table for management but it's not fully supported (example for 9.5(2)): 'copy' and '| redirect' go through different interfaces. Explanations are below.&lt;/P&gt;
&lt;P&gt;We had &lt;SPAN id="result_box" class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;something like&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;a&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;wiring&lt;/SPAN&gt; diagram for our ASA5525-X:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt; font-family: courier new,courier,monospace;"&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | Ext int&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +---+-------+&lt;BR /&gt;&amp;nbsp; Mgmt int |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; +------+ ASA5525-X |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +---+-------+&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | Int int&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;+--V----------V----+&lt;BR /&gt;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Router&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;+-^--^--^--^--^--^-+&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +--------+&lt;BR /&gt;&amp;nbsp;&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; TFTP&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; |&amp;nbsp; +-------+ server |&lt;BR /&gt;&amp;nbsp; ...internal nets...&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; +--------+&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 14pt; font-family: courier new,courier,monospace;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;And I found that copy and redirect uses different interfaces for access to tftp-server on internal network:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;asa-mgmt# copy running-config tftp://tftp_server_ip/file&lt;/STRONG&gt; - uses ASA management interface (I see mgmt source ip on tftp server)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;asa-mgmt# sho running-config | redirect&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt; tftp://tftp_server_ip/file&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt; - uses ASA internal interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial,helvetica,sans-serif;"&gt;T&lt;SPAN id="result_box" class="short_text" lang="en"&gt;&lt;SPAN class="hps"&gt;hat is to say&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;that the&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;appeared in ASA 9.5(1) separate routing table for management-only interfaces not brough to full vrf like in ASR routers.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 07:49:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813004#M159846</guid>
      <dc:creator>Sergei_Dubrov</dc:creator>
      <dc:date>2016-02-15T07:49:16Z</dc:date>
    </item>
    <item>
      <title>I saw a similar post</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813005#M159847</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;I saw a similar post regarding upgrades from a pair of older 5500 series to a pair of 5525X and think I've avoided most of the "gotchas" for deployment. I don't think we'll ever need to use the MGMT interfaces unless we install FireSIGHT / FirePOWER on a separate server. We considered doing a cluster, but we're going back to the primary / failover scenario for the implementation since that's how the current system is configured.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Please let me know if you see any issues with this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;ASA5525, 8192 MB RAM, CPU Lynnfield 2394 MHz, 1 CPU (4 cores)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;ASA Version 9.4(2)11 (most stable per Cisco)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Device Manager Version 7.2(2)1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Licensed features for this platform:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Maximum Physical Interfaces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Maximum VLANs&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Inside Hosts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Unlimited&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Failover&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Active/Active&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Encryption-DES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Encryption-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Security Contexts&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;GTP/GPRS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;AnyConnect Premium Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;AnyConnect Essentials&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Other VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 750&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Total VPN Peers&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 750&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Shared License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;AnyConnect for Mobile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;AnyConnect for Cisco VPN Phone&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Advanced Endpoint Assessment&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Total UC Proxy Sessions&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Botnet Traffic Filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;IPS Module&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Disabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Cluster&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;Cluster Members&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; perpetual&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: terminal,monaco,monospace;"&gt;This platform has an ASA5525 VPN Premium license.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;We have a valid "Running Permanent Activation Key"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Apr 2016 16:52:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813005#M159847</guid>
      <dc:creator>Peter Marshall</dc:creator>
      <dc:date>2016-04-05T16:52:07Z</dc:date>
    </item>
    <item>
      <title>Peter,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813006#M159848</link>
      <description>&lt;P&gt;Peter,&lt;/P&gt;
&lt;P&gt;That looks fine as long as you aren't running any SSL VPN client (e.g AnyConnect-based or clientless) remote access VPNs.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 02:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813006#M159848</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-04-06T02:08:58Z</dc:date>
    </item>
    <item>
      <title>After the ASAs are on-line,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813007#M159849</link>
      <description>&lt;P&gt;After the ASAs are on-line, we plan to register AnyConnect. We plan to contact Cisco if we run into any issues since we already paid for the licensing.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2016 15:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813007#M159849</guid>
      <dc:creator>Peter Marshall</dc:creator>
      <dc:date>2016-04-20T15:31:51Z</dc:date>
    </item>
    <item>
      <title>Does this apply ONLY to the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813008#M159850</link>
      <description>&lt;P&gt;Does this apply ONLY to the Management0/0 interface or for any interface configured with 'management-only'?&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 09:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813008#M159850</guid>
      <dc:creator>andrew.butterworth</dc:creator>
      <dc:date>2016-10-06T09:40:05Z</dc:date>
    </item>
    <item>
      <title>Andy,</title>
      <link>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813009#M159851</link>
      <description>&lt;P&gt;Andy,&lt;/P&gt;
&lt;P&gt;I don't have one handy to confirm, but the configuration guide indicates that "management-only" will put the interface under the separate management routing table (if you have configured one).&lt;/P&gt;
&lt;P&gt;I am looking at the statement "&lt;SPAN&gt;An interface configured with management-only is considered a management interface.&lt;/SPAN&gt;" found here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/route-overview.html#concept_40C0C8DE2C1247319250B9F7706C54A5&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2016 11:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5525-x-management-interface-routing/m-p/2813009#M159851</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-10-06T11:22:23Z</dc:date>
    </item>
  </channel>
</rss>

