<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA static routes in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414674#M271015</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct..Should have carefully read your response. The ACLs are a match first session and the second one never processes it. We were trying to cover the remote networks with one line ( like a /24). So now we will have to create individual ACLs per each remote network per peer and not overlap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping the ASA would be more flexible in how it processes the ACLs so we could only work with one ACL line.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Feb 2014 19:48:30 GMT</pubDate>
    <dc:creator>xayavongp</dc:creator>
    <dc:date>2014-02-26T19:48:30Z</dc:date>
    <item>
      <title>ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414668#M271009</link>
      <description>&lt;P&gt;From the ASA (v 9.1) I have static routes to /30 that sits behind the VPN routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on ASA:&lt;/P&gt;&lt;P&gt;route outside x.x.x.124 255.255.255.252&amp;nbsp; x.x.x.1 1&lt;/P&gt;&lt;P&gt;route outside x.x.x.128 255.255.255.252&amp;nbsp; x.x.x.2 1&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;route outside x.x.x.148 255.255.255.252 x.x.x.7 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see in the routing table that there is an addtional static route that is learn that seems to summarize all the /30 (even though the /30 are not in the range). Why is that ? I was starting to believe this might be causing some of the duplicate tcp syn issues I'm seeing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA# show route outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;S x.x.x.0 255.255.255.0 [1/0] via x.x.x.1, outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;S x.x.x.124 255.255.255.252 [1/0] via x.x.x.1, outside&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;route outside x.x.x.148 255.255.255.252 [1/0] via x.x.x.7, outside&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414668#M271009</guid>
      <dc:creator>xayavongp</dc:creator>
      <dc:date>2019-03-12T03:34:49Z</dc:date>
    </item>
    <item>
      <title>ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414669#M271010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless you actually have a configured &lt;STRONG&gt;"route"&lt;/STRONG&gt; command for the network with the /24 mask then I would have to guess that some VPN configuration on this device is adding the route dynamically based on the VPN configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if you have a L2L VPN configurations and have the following line in the configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map &lt;MAP name=""&gt; &lt;NUMBER&gt; set reverse-route&lt;/NUMBER&gt;&lt;/MAP&gt;&lt;/STRONG&gt;&lt;MAP name=""&gt;&lt;/MAP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then this configuration will add a route for the destination network in the ACL configured in the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map &lt;MAP name=""&gt; &lt;NUMBER&gt; match address &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/NUMBER&gt;&lt;/MAP&gt;&lt;/STRONG&gt;&lt;MAP name=""&gt;&lt;/MAP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that would probably be something I would check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 19:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414669#M271010</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-23T19:33:49Z</dc:date>
    </item>
    <item>
      <title>ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414670#M271011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes this is a L2L configuration. Removing the "reverse-route" did remove the /24 static. Thought that would fix it but no.&lt;/P&gt;&lt;P&gt;Testing with only two peers right now. It seems whichever peer is able to establish the IPsec SA first can pass traffic.&lt;/P&gt;&lt;P&gt;The other one can establish IPSEC SA but can't pass traffic. It spits out error ASA-4-419002 (Dup TCP SYN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Pete&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 20:00:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414670#M271011</guid>
      <dc:creator>xayavongp</dc:creator>
      <dc:date>2014-01-23T20:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414671#M271012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What exactly are you trying to do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of the /30 routes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have 2 L2L VPN connections configured with some overlapping network in the Crypto ACL than the "crypto map" configuration with the lower value of the above &lt;NUMBER&gt; section will be matched when the VPN negoations start and to my understanding the second connection in order will never be matched.&lt;/NUMBER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But again, I am not sure what you are attempting to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the duplicate SYN I am not 100% sure but it might indicate a situation where a TCP SYN has been seen and also the TCP SYN ACK but again a TCP SYN is seen from the initial host since it has not received the TCP SYN ACK that the ASA has seen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2014 20:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414671#M271012</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-23T20:08:59Z</dc:date>
    </item>
    <item>
      <title>ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414672#M271013</link>
      <description>supportforums-beta.cisco.com</description>
      <pubDate>Thu, 23 Jan 2014 20:58:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414672#M271013</guid>
      <dc:creator>xayavongp</dc:creator>
      <dc:date>2014-01-23T20:58:53Z</dc:date>
    </item>
    <item>
      <title>ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414673#M271014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It appears that the first router creates a proxy session for for the same subnet the second router should be answering for. I assume the ASA drops the packet and is seen as an attack.&amp;nbsp; I did disable proxyarp on inside and outside. I'm wondering if the same broadcast domain is causing this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jan 2014 19:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414673#M271014</guid>
      <dc:creator>xayavongp</dc:creator>
      <dc:date>2014-01-24T19:28:30Z</dc:date>
    </item>
    <item>
      <title>ASA static routes</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414674#M271015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct..Should have carefully read your response. The ACLs are a match first session and the second one never processes it. We were trying to cover the remote networks with one line ( like a /24). So now we will have to create individual ACLs per each remote network per peer and not overlap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping the ASA would be more flexible in how it processes the ACLs so we could only work with one ACL line.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Feb 2014 19:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-routes/m-p/2414674#M271015</guid>
      <dc:creator>xayavongp</dc:creator>
      <dc:date>2014-02-26T19:48:30Z</dc:date>
    </item>
  </channel>
</rss>

