<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You know - VDCs are not so in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800638#M172814</link>
    <description>&lt;P&gt;You know - VDCs are not so difficult as you may think, anyway it's your network.&lt;/P&gt;
&lt;P&gt;If you will share your config, I could try to reproduce it in a lab environmnet to find the truth, since ver 9.4 in ASA, there is documented support for PBR.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Feb 2016 16:39:45 GMT</pubDate>
    <dc:creator>dukenuk96</dc:creator>
    <dc:date>2016-02-08T16:39:45Z</dc:date>
    <item>
      <title>ASA Policy Based Routing Question</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800632#M172801</link>
      <description>&lt;P&gt;Hi Cisco Profs,&lt;/P&gt;
&lt;P&gt;first, dont ask me why we have to use it that silly way... this is a specification from your partner. We have different access levels based on the source IP and Router.&lt;/P&gt;
&lt;P&gt;As you can see on the attached picture is have 2 internal networks, one routed and one as vlan layer 2. Both are translated (hide nat) on the ASA but they need to go over different routers to reach the same destinations. What i have tested so far, when i add 3 routes to the target networks over the 172.17.34.1 router, the 10.1.0.0/24 network can access this destinations&amp;nbsp;without a problem.&lt;/P&gt;
&lt;P&gt;I added a ACL for PBR with source 192.168.172.0/24 and as destination the target networks (192.168.46/49/50), next hop 172.17.223.1 and added this PBR to the interface of 192.168.172.1. After that i can ping router interface 172.17.223.1. but i cannot reach the target networks. When i do a packet trace with an IP out of 192.168.172.0/24 and destination 192.168.46.2.2, i can successful reach the target, when im doing it live i only get a "routing failed to locate next hop..."&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can somebody tell me where my fault here is? Do i need PBR on both internal interfaces?&lt;/P&gt;
&lt;P&gt;Config Snip:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1" style="font-family: 'courier new', courier, monospace;"&gt;interface TenGigabitEthernet0/8.823&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;vlan 823&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nameif LAN-PBR&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;security-level 50&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;ip address 192.168.172.1 255.255.255.0&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;policy-route route-map PBR&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1" style="font-family: 'courier new', courier, monospace;"&gt;route-map PBR&amp;nbsp;permit 1&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;match ip address&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;PBR-ACL&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;set ip next-hop 172.17.223.1&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;set interface Interface-172.17.223.2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;Thanks a lot!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800632#M172801</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-03-12T07:14:54Z</dc:date>
    </item>
    <item>
      <title>Hello!</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800633#M172804</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;
&lt;P&gt;1. Can you please share the full config of your ASA.&lt;/P&gt;
&lt;P&gt;2. Show full output of your packet-tracer tests.&lt;/P&gt;
&lt;P&gt;3. I would recommend to use PBR on both interfaces in your setup, so that there was no leaking to default routing&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 09:29:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800633#M172804</guid>
      <dc:creator>dukenuk96</dc:creator>
      <dc:date>2016-02-08T09:29:34Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800634#M172806</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i can provide this infos, but i need some time to get rid of the confidential infos in it.&lt;/P&gt;
&lt;P&gt;I think the problem is NAT. If i disable the Dynamic NAT statement which translates the 192.168.172.0/24 network to one IP out of 172.17.223.x network the PBR matches. The problem is, the package needs to be translated... so NAT is before routing... is there a way to get this scenario to work with the hide NAT and Policy-Based routing?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 09:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800634#M172806</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2016-02-08T09:42:06Z</dc:date>
    </item>
    <item>
      <title>Thougnt on your words a</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800635#M172808</link>
      <description>&lt;P&gt;Thougnt on your words a little more. Let's see in my packet-tracer:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;ASA/vdc-1/act# packet-tracer input inside tcp 192.168.168.168 9000 8.8.8.8 90 detailed&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 via x.x.x.x, outside&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group AL-Inside-In in interface inside&lt;BR /&gt;access-list AL-Inside-In extended permit ip object-group OGN-Internal-Hosts any&lt;BR /&gt;object-group network OGN-Internal-Hosts&lt;BR /&gt; network-object 192.168.0.0 255.255.0.0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7ffed50b67c0, priority=13, domain=permit, deny=false&lt;BR /&gt; hits=7, user_data=0x7ffecbf42340, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=192.168.0.0, mask=255.255.0.0, port=0, tag=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=any&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) after-auto source dynamic OGN-Internal-Hosts pat-pool ON-PAT-to-Addrs extended flat include-reserve round-robin description "Internal hosts PAT to Internet"&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.168.168/9000 to y.y.y.y/9000&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7ffed5d602a0, priority=6, domain=nat, deny=false&lt;BR /&gt; hits=6, user_data=0x7ffed5d5dec0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip/id=192.168.0.0, mask=255.255.0.0, port=0, tag=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=outside&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;So, ASA makes NAT &lt;STRONG&gt;after&lt;/STRONG&gt; routing. But this is my case, I have no PBR enabled, version&amp;nbsp;9.2(4).&lt;/P&gt;
&lt;P&gt;And,&amp;nbsp;which version of software asre you running? There is big changes between 8.x and 9.x for ASA in routing.&lt;/P&gt;
&lt;P&gt;There is easier way to do it even without PBR - migrate to multiple context and you will get simple configs with a few static routes and NATs.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 10:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800635#M172808</guid>
      <dc:creator>dukenuk96</dc:creator>
      <dc:date>2016-02-08T10:25:03Z</dc:date>
    </item>
    <item>
      <title>Then try it again with PBR</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800636#M172810</link>
      <description>&lt;P&gt;Then try it again with PBR activated. As soon as NAT is activated, the PBR is ignored.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NAT enabled&lt;/STRONG&gt; (ngTARGET is a Group of Objects which includes the 192.168.46/49/50):&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: static&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nat (INSIDE,OUTSIDE) source dynamic INSIDE interface destination static ngTARGET ngTARGET&amp;nbsp;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;NAT divert to egress interface OUTSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Untranslate 192.168.46.33/0 to 192.168.46.33/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;found next-hop 192.168.172.22 using egress ifc INSIDE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: log&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;.....&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nat (INSIDE,OUTISDE) source dynamic INSIDE interface destination static ngTARGET ngTARGET&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Dynamic translate 192.168.172.22/0 to 172.17.223.2/36187&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;NAT disabled:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: PBR-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: policy-route&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;route-map PBR permit 10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; match ip address ACL-LAN-PBR&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; set ip next-hop 172.17.223.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; set interface OUTSIDE&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; Matched route-map PBR, sequence 10, permit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; Found next-hop 172.17.223.1 using egress ifc OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: ROUTE-LOOKUP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: Resolve Egress Interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;found next-hop 192.168.172.22 using egress ifc INSIDE&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 13:30:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800636#M172810</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2016-02-08T13:30:28Z</dc:date>
    </item>
    <item>
      <title>I'm certainly not migrating</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800637#M172812</link>
      <description>&lt;P&gt;I'm&amp;nbsp;certainly not migrating to multiple context because of this &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; But thanks.&lt;BR /&gt;I think the only way is to let the Router RT2 do the NAT after i do the PBR.&lt;/P&gt;
&lt;P&gt;We dont have access to this router but i'm sure the company who maintains this router can do this for us.&lt;/P&gt;
&lt;P&gt;PS: Still open for suggestion, if i'm on the wrong path here!&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 13:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800637#M172812</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2016-02-08T13:34:22Z</dc:date>
    </item>
    <item>
      <title>You know - VDCs are not so</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800638#M172814</link>
      <description>&lt;P&gt;You know - VDCs are not so difficult as you may think, anyway it's your network.&lt;/P&gt;
&lt;P&gt;If you will share your config, I could try to reproduce it in a lab environmnet to find the truth, since ver 9.4 in ASA, there is documented support for PBR.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2016 16:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-question/m-p/2800638#M172814</guid>
      <dc:creator>dukenuk96</dc:creator>
      <dc:date>2016-02-08T16:39:45Z</dc:date>
    </item>
  </channel>
</rss>

