<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reverse route injection for SSL RA VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887762#M30430</link>
    <description>&lt;P&gt;I previously proposed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip prefix-list pf_only_non_32 seq 5 permit 10.AAA.BBB.0/24 le 31&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it incorrect?&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2019 14:16:11 GMT</pubDate>
    <dc:creator>AlexFer</dc:creator>
    <dc:date>2019-07-10T14:16:11Z</dc:date>
    <item>
      <title>Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887468#M30422</link>
      <description>&lt;P&gt;Hello experts,&lt;/P&gt;&lt;P&gt;I want to disable RRI for each SSL VPN user, being advertised by EIGRP. The reason is that the subnet is already advertised and I don't see the reason for continuous EIGRP Updates, and of needlessly polluting Routing Table of routers in my network as you see:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="courier new,courier"&gt;router# show ip route | include 10.AAA.BBB.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.0/24 [170/3072] via 10.101.XXX.YYY, 6d23h, Vlan21&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.29/32 [170/3072] via 10.101.XXX.YYY, 20:38:27, Vlan21&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.34/32 [170/3072] via 10.101.XXX.YYY, 02:55:32, Vlan21&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.35/32 [170/3072] via 10.101.XXX.YYY, 00:00:35, Vlan21&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.36/32 [170/3072] via 10.101.XXX.YYY, 02:55:21, Vlan21&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.37/32 [170/3072] via 10.101.XXX.YYY, 01:28:09, Vlan21&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;D EX 10.AAA.BBB.38/32 [170/3072] via 10.101.XXX.YYY, 00:00:11, Vlan21&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="courier new,courier"&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Unlike &lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/anyconnect-ssl-and-reverse-route-injection/m-p/3361879" target="_self"&gt;AnyConnect SSL and Reverse Route Injection&lt;/A&gt;, I don't want to change the metric, but rather exclude all /32 advertisements.&lt;/P&gt;&lt;P&gt;I see no direct way of provisioning this (as "&lt;FONT size="2" face="courier new,courier"&gt;set reverse route&lt;/FONT&gt;" was for IPsec), so, what would be best way of achieving this?&lt;/P&gt;&lt;P&gt;R's, Alex&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 05:24:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887468#M30422</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2019-07-10T05:24:21Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887551#M30423</link>
      <description>Hi There,&lt;BR /&gt;&lt;BR /&gt;I don't think you can stop them from being in the routing table of the ASA itself as /32. I believe they are classed as statics.&lt;BR /&gt;&lt;BR /&gt;show route static&lt;BR /&gt;&lt;BR /&gt;If you don't want to advertise the /32s further afield from there you will have to look at what you are doing under the EIGRP process and either stop redistributing statics (if you are) or use some other form of router/redistribution manipulation, e.g prefix lists / route maps. Really depends on the bigger picture of your setup how you should approach it.</description>
      <pubDate>Wed, 10 Jul 2019 08:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887551#M30423</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-10T08:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887561#M30424</link>
      <description>&lt;P&gt;&lt;EM&gt;&amp;gt; ... use some other form of router/redistribution manipulation, e.g prefix lists / route maps.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Indeed, this is what I'm requesting. (I can't imagine I'm the first.)&lt;/P&gt;&lt;P&gt;Something like this?&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="courier new,courier"&gt;prefix-list pf_only_non_32 seq 5 permit 10.AAA.BBB.0/24 le 31&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="courier new,courier"&gt;route-map rm_only_non_32 permit 10&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;&amp;nbsp;match ip address prefix-list pf_only_non_32&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2" face="courier new,courier"&gt;router eigrp 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2" face="courier new,courier"&gt;&amp;nbsp;redistribute static route-map rm_only_non_32&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 00:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887561#M30424</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2019-07-11T00:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887592#M30425</link>
      <description>ip prefix-list PF_ANYCONNECT deny 10.AAA.BBB.0/24 ge 32 le 32&lt;BR /&gt;&lt;BR /&gt;route-map rm_only_non_32 permit 10&lt;BR /&gt;match ip address prefix-list PF_ANYCONNECT&lt;BR /&gt;&lt;BR /&gt;router eigrp 1&lt;BR /&gt;redistribute static route-map rm_only_non_32&lt;BR /&gt;&lt;BR /&gt;I think would work. If you have other statics that you WANT to RD you would need to allow them in the prefix list.</description>
      <pubDate>Wed, 10 Jul 2019 09:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887592#M30425</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-10T09:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887603#M30426</link>
      <description>&lt;HR /&gt;&lt;P&gt;Isn’t your Prefix List equivalent to mine, with permit/deny flipped? (I thought I'm taking advantage of implicit/default deny that is applied to unmatched any prefix-list entries).&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 11:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887603#M30426</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2019-07-10T11:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887646#M30427</link>
      <description>Hi,&lt;BR /&gt;I misread your initial reply apologies.&lt;BR /&gt;I guess it depends on how you are advertising the actual /24.&lt;BR /&gt;Is it a case of a static route on a different device pointing to the ASA as next hop? Then advertising the /24 from there?&lt;BR /&gt;There will be a few different ways to do this depending on the rest of the setup and what you want to route.</description>
      <pubDate>Wed, 10 Jul 2019 10:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887646#M30427</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-10T10:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887679#M30428</link>
      <description>&lt;P&gt;There are no static routes to the ASA in adjacent routers - I’m relying on ASA’s EIGRP to advertise route to its VPN assigned IP address space.&lt;/P&gt;&lt;P&gt;I’m open to the best suggestion (but my preference&amp;nbsp;&lt;SPAN&gt;to only change EIGRP configuration on ASA).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 12:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887679#M30428</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2019-07-10T12:01:37Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887715#M30429</link>
      <description>I think the following would allow you to only advertise a /24 from the ASA. Once traffic arrives at the ASA the /32 host routes would be preferred. There will be other ways to achieve the same result.&lt;BR /&gt;&lt;BR /&gt;route null0 10.AAA.BBB.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;ip prefix-list PF_ANYCONNECT seq 5 deny 10.AAA.BBB.0/24 ge 32 le 32&lt;BR /&gt;ip prefix-list PF_ANYCONNECT seq 10 permit 0.0.0.0/0 le 32&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;route-map rm_only_non_32 permit 10&lt;BR /&gt;match ip address prefix-list PF_ANYCONNECT&lt;BR /&gt;&lt;BR /&gt;router eigrp 1&lt;BR /&gt;redistribute static route-map rm_only_non_32</description>
      <pubDate>Wed, 10 Jul 2019 13:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887715#M30429</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-10T13:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887762#M30430</link>
      <description>&lt;P&gt;I previously proposed:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip prefix-list pf_only_non_32 seq 5 permit 10.AAA.BBB.0/24 le 31&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it incorrect?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 14:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887762#M30430</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2019-07-10T14:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887895#M30431</link>
      <description>You would still need to have the /24 in the routing table for it to be sent beyond the ASA if using prefix list.</description>
      <pubDate>Wed, 10 Jul 2019 17:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887895#M30431</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-10T17:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887986#M30432</link>
      <description>&lt;P&gt;Hi Alex,&lt;BR /&gt;&lt;BR /&gt;I have just tested this and works OK&lt;BR /&gt;&lt;BR /&gt;On my LAB ASA I do not have the ability to use &lt;EM&gt;route null0&lt;/EM&gt; due to the image version I am running. You may have the same issue.&lt;/P&gt;&lt;P&gt;I just added a static route for my whole /24 Anyconnect subnet pointing out one of my physical interfaces to a dummy next hop, just to get the /24 into routing table.&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ROWAN-FW-01(config)# sh run route&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;route Inside 10.44.66.0 255.255.255.0 1.1.1.2&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rest I configured is below using your own proposal -&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;route-map RM_RD permit 10&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;match ip address prefix-list PF_ANYCONNECT&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;prefix-list PF_ANYCONNECT seq 5 permit 10.44.66.0/24 le 31&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;router eigrp 10&lt;BR /&gt;network 172.16.0.2 255.255.255.255&lt;BR /&gt;passive-interface default&lt;BR /&gt;no passive-interface Inside&lt;BR /&gt;redistribute static route-map RM_RD&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My devices within the rest of the network only learn the /24. If I remove the route-map, the learn both /32 and /24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully helps you out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2019 20:08:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3887986#M30432</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-10T20:08:28Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3888058#M30433</link>
      <description>&lt;P&gt;Thank you very much.... There's just one more thing...&lt;/P&gt;&lt;P&gt;Currently, there's a large number of /32 static routers already advertised for users that have logged-in into RA VPN Gateway. Once I implement the above filter, no new EIGRP Updates associated will be sent for them (even if I manually issue "no route" for them on the ASA) and those routes will remain in other routers indefinitely.&lt;/P&gt;&lt;P&gt;I don't really want to manually terminate existing VPN sessions (to force EIGRP update before implementing the filter). So, my option seems to issue &lt;FONT size="2" face="courier new,courier"&gt;clear ip eigrp .. neighbors&lt;/FONT&gt; for the ASA's IP address on adjacent router.&lt;/P&gt;&lt;P&gt;Suggestions?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 01:36:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3888058#M30433</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2019-07-11T01:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3889233#M30434</link>
      <description>Hi There,&lt;BR /&gt;&lt;BR /&gt;I'm not sure if when you issue the redistribute command with the filter that everything will be filtered as this may be classed as a routing update, e.g removing existing routes from table so you may not need to clear eigrp neighbour. Once you apply the route-map check the neighbor device routing table to see.</description>
      <pubDate>Fri, 12 Jul 2019 13:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/3889233#M30434</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-07-12T13:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse route injection for SSL RA VPN</title>
      <link>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/4050871#M1068103</link>
      <description>&lt;P&gt;Indeed, after implementation, I did NOT need to enter "clear eigrp .. neighbour" - neighbor's topology table reduced (removing RRI routes) within a few minutes.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 23:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-route-injection-for-ssl-ra-vpn/m-p/4050871#M1068103</guid>
      <dc:creator>AlexFer</dc:creator>
      <dc:date>2020-03-23T23:20:16Z</dc:date>
    </item>
  </channel>
</rss>

