<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Haven't used PBR on ASAs but in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772349#M177596</link>
    <description>&lt;P&gt;Haven't used PBR on ASAs but the routing happens first whether that is with PBR or the routing table.&lt;/P&gt;
&lt;P&gt;If the traffic is then routed out of an interface that has a crypto map applied and the traffic matches an entry in the acl it will sent down the tunnel.&lt;/P&gt;
&lt;P&gt;I'm not sure what the issue is though.&lt;/P&gt;
&lt;P&gt;If you are using PBR just make sure the VPN traffic is policy routed to the right interface or exclude it from PBR and if the routing table already points out the right interface ie. your default route it should work anyway.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
    <pubDate>Fri, 30 Oct 2015 16:07:40 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2015-10-30T16:07:40Z</dc:date>
    <item>
      <title>Cisco ASA PBR forwarding</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772348#M177595</link>
      <description>&lt;P&gt;I have a Cisco ASA 5525-X, with 2 ISPs (Consider X and Y). I want to use both of them for loadbalancing, but the issue is I have a site to site VPN over ISP-X. &amp;nbsp;As per my understanding, if my PBR routes my VPN interested traffic through ISP-Y, it would be dropped.&amp;nbsp;&lt;BR /&gt;Not sure If ASA checks crypto ACL first or the PBR.&amp;nbsp;&lt;BR /&gt;Please help me to understand.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772348#M177595</guid>
      <dc:creator>nshinde01</dc:creator>
      <dc:date>2019-03-12T06:48:46Z</dc:date>
    </item>
    <item>
      <title>Haven't used PBR on ASAs but</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772349#M177596</link>
      <description>&lt;P&gt;Haven't used PBR on ASAs but the routing happens first whether that is with PBR or the routing table.&lt;/P&gt;
&lt;P&gt;If the traffic is then routed out of an interface that has a crypto map applied and the traffic matches an entry in the acl it will sent down the tunnel.&lt;/P&gt;
&lt;P&gt;I'm not sure what the issue is though.&lt;/P&gt;
&lt;P&gt;If you are using PBR just make sure the VPN traffic is policy routed to the right interface or exclude it from PBR and if the routing table already points out the right interface ie. your default route it should work anyway.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2015 16:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772349#M177596</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-10-30T16:07:40Z</dc:date>
    </item>
    <item>
      <title>Hello Jon,Thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772350#M177597</link>
      <description>&lt;P&gt;Hello Jon,&lt;BR /&gt;&lt;BR /&gt;Thanks for your quick response. That helps me to understand how traffic encryption decision is taken by the device. I have to check if I am exposing my whole internal subnet over the VPN.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I think 'reverse-route' in crypto map and 'set ip default next-hop' together can help me, but I have to think about it.&lt;BR /&gt;Also I have not considered remote-access VPN traffic at the moment, I do not want that to get hampered because of PBR.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2015 18:03:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772350#M177597</guid>
      <dc:creator>nshinde01</dc:creator>
      <dc:date>2015-10-30T18:03:02Z</dc:date>
    </item>
    <item>
      <title>I totally forgot that I can</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772351#M177598</link>
      <description>&lt;P&gt;I totally forgot that I can match source and destination IP all together to take intelligent forwarding decision.&lt;BR /&gt;I will come back with my solution.&lt;/P&gt;</description>
      <pubDate>Sat, 31 Oct 2015 08:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr-forwarding/m-p/2772351#M177598</guid>
      <dc:creator>nshinde01</dc:creator>
      <dc:date>2015-10-31T08:42:20Z</dc:date>
    </item>
  </channel>
</rss>

