<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic route inside 0.0.0.0 0.0.0.0 tunneled in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376561#M271740</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"route 0 0 &lt;GATEWAY ip=""&gt; tunneled"&lt;/GATEWAY&gt;&lt;/STRONG&gt; is meant to forward traffic from VPN to some other device that routes it again to the correct destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine you mean that your route points to a L3 switch doing routing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 Jan 2014 17:35:47 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-01-10T17:35:47Z</dc:date>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376557#M271736</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASA which is running RA VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why we will use this command &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0&amp;nbsp; x.x.x.x tunneled?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:28:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376557#M271736</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T03:28:16Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376558#M271737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding a &lt;STRONG&gt;"tunneled" "route"&lt;/STRONG&gt; is simply meant to tell the ASA to forward all traffic inbound from a VPN connection straight to another device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We for example use this on an ASA Failover pair that is simply meant to serve as a VPN device. This &lt;STRONG&gt;"tunneled"&lt;/STRONG&gt; default route forwards all traffic from the VPN connections to an actual Firewall device (ASA too) that handles NAT/ACL and other things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It provides an easy way to define a separate default route for the traffic incoming from VPN connections towards internal networks since the device itself needs the normal default route for the VPN connections return traffic which are formed from the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 17:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376558#M271737</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-10T17:22:21Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376559#M271738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What if tunneled traffic goes to Switch instead&amp;nbsp; of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 17:30:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376559#M271738</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-10T17:30:41Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376560#M271739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It used to set the default tunnel gateway for VPN traffic. So in effect it allows you to have two default routes on your ASA ie. if a packet arrives at the ASA the routing table is consulted. If there is no specific match then if there is a default route it will be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you may want your VPN traffic to use a different default route than your non VPN traffic. If you add the "tunneled" option then that default route only applies to encrpyted traffic arriving on the ASA. This means you can have two default routes, one for VPN traffic only and one for non VPN traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 17:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376560#M271739</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-01-10T17:31:36Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376561#M271740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"route 0 0 &lt;GATEWAY ip=""&gt; tunneled"&lt;/GATEWAY&gt;&lt;/STRONG&gt; is meant to forward traffic from VPN to some other device that routes it again to the correct destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine you mean that your route points to a L3 switch doing routing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 17:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376561#M271740</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-10T17:35:47Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376562#M271741</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me dig more &lt;/P&gt;&lt;P&gt;will get back to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 17:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376562#M271741</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-10T17:37:44Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376563#M271742</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jon &amp;amp; Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run route&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 200.x.x.x 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 2.0.0.0 192.168.50.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route inside 172.16.0.0 255.240.0.0 192.168.50.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.50.1 1&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.50.1 tunneled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I traced where route outside goes to Internet ASA---then to outside world.&lt;/P&gt;&lt;P&gt;route inside 192.168.50.1 -- this is Interface IP of another ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your at home connects to Company VPN then the encrypted traffic where he needs to access the company network&lt;/P&gt;&lt;P&gt;say subnet 172.16.0.0 will arrive encrypted and will use 192.168.50.1 which is not tunneled right?&lt;/P&gt;&lt;P&gt;this traffic from VPN ASA&amp;nbsp; to Internal ASA&amp;nbsp; will not be encrypted right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if he&amp;nbsp; need to access&amp;nbsp; route which is either not 172 or 192 say then it will use tunneled to reach Internal ASA and that traffic will be&amp;nbsp; encrypted&amp;nbsp; right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 18:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376563#M271742</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-10T18:01:15Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376564#M271743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to what you tell us it seems to me that this device is also a VPN ASA only? I mean that its used for VPN purposes only while there is another ASA behind it in the internal network that does the actual firewalling (NAT/ACL/etc)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding the VPN Client/User connected to this ASA will use the Static routes for the specific networks if the user tries to connect some destination address mentioned by those routes. If it doesnt match those static routes then it will use the &lt;STRONG&gt;"tunneled"&lt;/STRONG&gt; default route. But since the gateway is the same that means traffic from the VPN connections are always forwarded to the device 192.168.50.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic from the VPN ASA to the Internal ASA wont be encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The&lt;STRONG&gt; "tunneled"&lt;/STRONG&gt; parameter doesnt mean that the traffic is encrypted. It just refers to the fact the &lt;STRONG&gt;"route"&lt;/STRONG&gt; command used is used to forward traffic incoming from a VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 18:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376564#M271743</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-10T18:12:20Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376565#M271744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mahesh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you have a default route for non VPN traffic ie. general internet access and this points to next hop reachable via the outside interface. But you want to send any VPN traffic to a different destination ie. 192.168.50.1 which is another ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way i understand this is that if you connect via VPN to the ASA then once the traffic is decrypted it will use the "tunneled" route to send traffic to the internal ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as i know all VPN traffic is decrypted on the first ASA ie. no traffic is sent on as encrypted traffic and you can check this because i suspect your internal ASA is not terminating any VPNs. But the ASA knows that the traffic arrived encrypted so once it has decrypted it it then uses the "tunneled" route to send it on to the internal ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise it would try and use it's other default route and obviously in your setup all VPN traffic should go via the internal ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 18:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376565#M271744</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-01-10T18:13:18Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376566#M271745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes it is VPN asa only.&lt;/P&gt;&lt;P&gt;You understood correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for explaining me.&lt;/P&gt;&lt;P&gt;Seems i can not do my job without your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 20:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376566#M271745</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-10T20:36:39Z</dc:date>
    </item>
    <item>
      <title>route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376567#M271746</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks Jon for explaining me in clear and precise manner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Jan 2014 20:38:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/2376567#M271746</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-10T20:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/3190954#M271747</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have a customer who wants just to route vpn traffic from a specific subnet to another device, not all the vpn traffic. I've twisted my brain and I could not think of something good now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any ideas?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2017 11:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/3190954#M271747</guid>
      <dc:creator>george.prica</dc:creator>
      <dc:date>2017-09-28T11:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: route inside 0.0.0.0 0.0.0.0 tunneled</title>
      <link>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/4761090#M1097132</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;If you add the "tunneled" option then that default route only applies to encrypted traffic &lt;STRONG&gt;arriving&lt;/STRONG&gt; on the ASA."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;...&lt;STRONG&gt;arriving&lt;/STRONG&gt;&amp;nbsp;only externally, or also internally going external?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 16:09:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/route-inside-0-0-0-0-0-0-0-0-tunneled/m-p/4761090#M1097132</guid>
      <dc:creator>MicJameson1</dc:creator>
      <dc:date>2023-01-24T16:09:45Z</dc:date>
    </item>
  </channel>
</rss>

