<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic please show the complete in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546727#M235424</link>
    <description>&lt;P&gt;please show the &lt;STRONG&gt;complete&lt;/STRONG&gt; output of &lt;U&gt;&lt;EM&gt;show run rout&lt;/EM&gt;&lt;/U&gt;e and &lt;EM&gt;&lt;U&gt;show route&lt;/U&gt;&lt;/EM&gt;.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Aug 2014 07:11:07 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2014-08-21T07:11:07Z</dc:date>
    <item>
      <title>Cisco ASA static route Administrative Distance</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546719#M235416</link>
      <description>&lt;P&gt;Hello Dear Engineers,&lt;/P&gt;
&lt;P&gt;In Cisco ASA 8.2(5) version &amp;nbsp;I configured Static Route Floating with different Administrative Distances (for example, 10) , but IOS cannot accept this parameter. &amp;nbsp; for verifying, show route command &amp;nbsp;result shows &amp;nbsp;administrative distance as&amp;nbsp;&lt;STRONG&gt;1 .&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Configuration example:&lt;/P&gt;
&lt;P&gt;ip route 10.0.0.0 255.255.255.0 192.168.1.1 &lt;STRONG&gt;1&lt;/STRONG&gt;&amp;nbsp;track 1&lt;/P&gt;
&lt;P&gt;ip route 10.0.0.0 255.255.255.0 192.168.2.1 &lt;STRONG&gt;10&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE style="font-size: 9.600000381469727px; color: rgb(0, 0, 0); line-height: normal; background-color: rgb(255, 255, 255);"&gt;
S   10.0.0.0 255.255.255.0 [&lt;STRONG&gt;1&lt;/STRONG&gt;/0] via 192.168.2.1, outside2&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this the bug of the IOS, or may-be I misconfigured something?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:39:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546719#M235416</guid>
      <dc:creator>Samir Aliyev</dc:creator>
      <dc:date>2019-03-12T04:39:28Z</dc:date>
    </item>
    <item>
      <title>I doubt that it is a bug. I</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546720#M235417</link>
      <description>&lt;P&gt;I doubt that it is a bug. I see at least two ways in which you have misconfigured something.&lt;/P&gt;&lt;P&gt;- configuring a static route on the ASA requires that you specify the outbound interface in the ip route command, which you have not done.&lt;/P&gt;&lt;P&gt;- I have checked the config guide of 8.2 and I do not find any option for track which is part of the config that you show.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given that the config statements that you show are invalid on ASA I am not clear how the entry got into the routing table of the ASA and whether it was entered with distance of 10 or not. I did find this example in the documentation which seems to indicate that a static correctly configured with a higher distance will have that distance show up in the output of show route&lt;/P&gt;&lt;P&gt;S 10.1.1.0 255.255.255.0 [3/0] via 10.86.194.1, outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546720#M235417</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2014-08-20T14:16:15Z</dc:date>
    </item>
    <item>
      <title>On ASA it works similar as on</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546721#M235418</link>
      <description>&lt;P&gt;On ASA it works similar as on the router. Here is an&amp;nbsp;example:&lt;/P&gt;&lt;P&gt;I configured the route with an AD of 200:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;route WAN 192.168.100.0 255.255.255.0 192.168.1.254 200&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;And a show route reflects that config:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;S &amp;nbsp; &amp;nbsp;192.168.100.0 255.255.255.0 [200/0] via 192.168.1.254, WAN&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;But this route is only visible with "show route" it it gets installed in the routing-table. That means, if there is a better route to that network, this route is not there.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:21:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546721#M235418</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-20T14:21:21Z</dc:date>
    </item>
    <item>
      <title>Hi Rick,route-tracking is</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546722#M235419</link>
      <description>&lt;P&gt;Hi Rick,&lt;/P&gt;&lt;P&gt;route-tracking is also available in 8.2 (if I remember right, it was added to ASA v7.2):&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/route_static.html#wp1119813"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/route_static.html#wp1119813&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546722#M235419</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-20T14:28:03Z</dc:date>
    </item>
    <item>
      <title>Karsten Thank you for adding</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546723#M235420</link>
      <description>&lt;P&gt;Karsten&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for adding something that I did not know about the ASA - and +5 for the contribution. When I looked in the config guide I did not see the track option in the explanation of configuring static routes. I see that I should have looked further and found the later section that discussed how to add the track feature to a static route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546723#M235420</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2014-08-20T14:42:06Z</dc:date>
    </item>
    <item>
      <title>Sorry.here I typed static</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546724#M235421</link>
      <description>&lt;P&gt;Sorry.&lt;/P&gt;&lt;P&gt;here I typed static routing command manually, I forgot about interfaces:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside1 10.0.0.0 255.255.255.0 192.168.1.1 &amp;nbsp;&lt;STRONG&gt;1&lt;/STRONG&gt;&amp;nbsp; track 1&lt;/P&gt;&lt;P&gt;route outside2 10.0.0.0 255.255.255.0 192.168.2.1 &amp;nbsp;&lt;STRONG&gt;10&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 03:57:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546724#M235421</guid>
      <dc:creator>Samir Aliyev</dc:creator>
      <dc:date>2014-08-21T03:57:23Z</dc:date>
    </item>
    <item>
      <title>That's exactly how it should</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546725#M235422</link>
      <description>&lt;P&gt;That's exactly how it should work. Please show the resulting routing table.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 05:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546725#M235422</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-21T05:56:10Z</dc:date>
    </item>
    <item>
      <title>S   10.0.0.0 255.255.255.0 [1</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546726#M235423</link>
      <description>&lt;PRE&gt;
S   10.0.0.0 255.255.255.0 [&lt;STRONG&gt;1&lt;/STRONG&gt;/0] via 192.168.2.1, outside2&lt;/PRE&gt;

&lt;P&gt;1. After getting down primary link, route through backup link comes up. Than is okey.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;BUT&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Seems the ASA couldnot accept Administrative Distance parameter for backup route, which AD is &lt;STRONG&gt;10&lt;/STRONG&gt;&amp;nbsp;. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; it must shown like as &lt;STRONG&gt;[10/0]&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 06:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546726#M235423</guid>
      <dc:creator>Samir Aliyev</dc:creator>
      <dc:date>2014-08-21T06:37:41Z</dc:date>
    </item>
    <item>
      <title>please show the complete</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546727#M235424</link>
      <description>&lt;P&gt;please show the &lt;STRONG&gt;complete&lt;/STRONG&gt; output of &lt;U&gt;&lt;EM&gt;show run rout&lt;/EM&gt;&lt;/U&gt;e and &lt;EM&gt;&lt;U&gt;show route&lt;/U&gt;&lt;/EM&gt;.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 07:11:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546727#M235424</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-08-21T07:11:07Z</dc:date>
    </item>
    <item>
      <title>Hi Samir, It happens you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546728#M235425</link>
      <description>&lt;P&gt;Hi Samir,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It happens you expect when configure the backup route for a same interface..... with AD... if you do that for a backup interface say outside2 as per your scenario will take it as 1... since you do not have anyother default route for outside2 interface..... It considers as per the standard..... hope it clarifies your doubt..... All based on assumption... but it not happens in 8.4 version... even it shows the backup route...... it shows with the defined AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 10:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546728#M235425</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-21T10:29:17Z</dc:date>
    </item>
    <item>
      <title>Hi Samir,Even Pix 8.0 version</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546729#M235426</link>
      <description>&lt;P&gt;Hi Samir,&lt;/P&gt;&lt;P&gt;Even Pix 8.0 version shows the correct ad value defined..... might be that would be a bug or misconfiguration from your end.&lt;/P&gt;&lt;P&gt;pixfirewall(config-if)# sh route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 1.1.1.2 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 1.1.1.0 255.255.255.0 is directly connected, out1&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.0 255.255.255.0 is directly connected, out2&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 1.1.1.2, out1&lt;BR /&gt;pixfirewall(config-if)# shut&lt;BR /&gt;pixfirewall(config-if)# sh route&lt;/P&gt;&lt;P&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;/P&gt;&lt;P&gt;Gateway of last resort is 2.2.2.2 to network 0.0.0.0&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.0 255.255.255.0 is directly connected, out2&lt;BR /&gt;S*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [100/0] via 2.2.2.2, out2&lt;BR /&gt;pixfirewall(config-if)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 10:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546729#M235426</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-08-21T10:40:47Z</dc:date>
    </item>
    <item>
      <title>Dears, I've found the root</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546730#M235427</link>
      <description>&lt;P&gt;Dears,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've found the root couse.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The route cause was - &amp;nbsp;Reverse-Route-Injection for site-to-site VPN&lt;/P&gt;&lt;P&gt;Static routes for interesting remote LAN&amp;nbsp;subnets (10.0.0.0/24) was&amp;nbsp;added automatically to the routing table by crypto map RRI feature.&lt;/P&gt;&lt;P&gt;so I deleted &amp;nbsp; 'crypto map outside_map 1 set reverse-route' &amp;nbsp;command.&amp;nbsp;&lt;/P&gt;&lt;P&gt;And problem has been solved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you all. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for inconvenience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Aug 2014 07:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-route-administrative-distance/m-p/2546730#M235427</guid>
      <dc:creator>Samir Aliyev</dc:creator>
      <dc:date>2014-08-22T07:20:07Z</dc:date>
    </item>
  </channel>
</rss>

