<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic If you're diligent about in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791849#M173988</link>
    <description>&lt;P&gt;If you're diligent about watching the Security Advisories and keeping your ASA reasonably secured, management from outside can be done safely.&lt;/P&gt;
&lt;P&gt;As far as the asymmetric routing, this has been a challenge for many an ASA admin. Are you aware that ASA 9.5 finally introduced a separate routing table (like a VRF) for the management interface to use? That may help you.&lt;/P&gt;
&lt;P&gt;I have also seen implementations that dual home the management servers.Put their default route on the non-restricted subnet.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Dec 2015 03:23:36 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2015-12-16T03:23:36Z</dc:date>
    <item>
      <title>routes on cisco asa</title>
      <link>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791848#M173987</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a question on routes on a cisco asa. I setup a firewall for internet for IT users. The firewall has a management interface that we use to manage it from specific jump servers.&lt;/P&gt;
&lt;P&gt;The issue is that the IT Users need to access the mgmt(jump) servers.. But, they need to go through the firewall to the outside interface and then access the mgmt servers. But, the routes on the cisco asa are sending the traffic for the mgmt servers out the management interface to the mgmt servers causing asymmetric routing. The routes are needed for when you are on a mgmt server for the return traffic. Any way to get around this?&lt;/P&gt;
&lt;P&gt;Is it bad mojo to use the outside(public ip space) to manage a cisco asa?&lt;/P&gt;
&lt;P&gt;outside&lt;BR /&gt;I&lt;BR /&gt;I&lt;BR /&gt;Firewall &amp;lt;--- mgmt servers&lt;BR /&gt;I&lt;BR /&gt;I&lt;BR /&gt;IT Users&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791848#M173987</guid>
      <dc:creator>cstpierre4</dc:creator>
      <dc:date>2019-03-12T07:02:31Z</dc:date>
    </item>
    <item>
      <title>If you're diligent about</title>
      <link>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791849#M173988</link>
      <description>&lt;P&gt;If you're diligent about watching the Security Advisories and keeping your ASA reasonably secured, management from outside can be done safely.&lt;/P&gt;
&lt;P&gt;As far as the asymmetric routing, this has been a challenge for many an ASA admin. Are you aware that ASA 9.5 finally introduced a separate routing table (like a VRF) for the management interface to use? That may help you.&lt;/P&gt;
&lt;P&gt;I have also seen implementations that dual home the management servers.Put their default route on the non-restricted subnet.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 03:23:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791849#M173988</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2015-12-16T03:23:36Z</dc:date>
    </item>
    <item>
      <title>Ah thank you for the response</title>
      <link>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791850#M173990</link>
      <description>&lt;P&gt;Ah thank you for the response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interesting about the 9.5 update. Thanks&lt;/P&gt;
&lt;P&gt;I think I will look into the outside interface and investigate the 9.5 code upgrade.&lt;/P&gt;
&lt;P&gt;Im running&amp;nbsp;Version 8.6(1)2 and its a&amp;nbsp;ASA5525. What version is recommended for this model?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 15:26:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791850#M173990</guid>
      <dc:creator>cstpierre4</dc:creator>
      <dc:date>2015-12-16T15:26:43Z</dc:date>
    </item>
    <item>
      <title>Are you aware that ASA 9.5</title>
      <link>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791851#M173993</link>
      <description>&lt;P&gt;&lt;EM&gt;Are you aware that ASA 9.5 finally introduced a separate routing table (like a VRF) for the management interface to use?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Well it's about time &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the info.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 16 Dec 2015 16:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routes-on-cisco-asa/m-p/2791851#M173993</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-12-16T16:30:25Z</dc:date>
    </item>
  </channel>
</rss>

