<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Policy Based Routing Alternative in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135320#M392206</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If anyone else has any ideas on destination NAT to force traffic out of a partuclar outside interface regardless of routes..... I keep seeing hints that its possible but can't quite get it working....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 25 Jan 2013 18:38:31 GMT</pubDate>
    <dc:creator>mikedelafield</dc:creator>
    <dc:date>2013-01-25T18:38:31Z</dc:date>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135313#M392197</link>
      <description>&lt;P&gt;Hi there.&lt;/P&gt;&lt;P&gt;I believe its possible to mimic some of the functionality of PBR using NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've found this example which seems like it would logically work for the old NAT statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #555555; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 &lt;STRONG&gt;1&lt;/STRONG&gt;&lt;BR /&gt;route outside1 0.0.0.0 0.0.0.0&amp;nbsp; 193.168.1.1 &lt;STRONG&gt;2&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="color: #555555; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;nat (inside) 1 0 0&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside1) 1 interface&lt;/P&gt;&lt;P style="color: #555555; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;static (outside,inside) tcp 0.0.0.0 www 0.0.0.0 www netmask 0.0.0.0&lt;BR /&gt;static (outside1,inside) tcp 0.0.0.0 smtp 0.0.0.0 smtp netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this solution a valid workaround for the new NAT statements of 8.4 and above?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to get it working but without success so far. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to do is push web traffic via one ISP and SMTP via another, but so far when I check which IP i'm connecting as at the other end i'm still coming from the default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone made this work on 8.4 +?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135313#M392197</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2019-03-12T00:52:16Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135314#M392198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Using the packet tracer I can see that the route-lookup is occuring first and it is not basing its decision on the destination NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought that the route-lookup command needed to be run for this to happen, but I can confirm it has not been run....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 11:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135314#M392198</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2013-01-25T11:18:24Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135315#M392199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not exactly what you are looking for but thought I'd still mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only enviroment where I have actually succesfully configured overlapping networks or "a type of PBR" with a single ASA is with an ASA that is only serving VPN Client connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used 8.4(x) software and used NAT to determine the ingress and eggress interface for traffic (As I knew both the source and destination of the traffic this was easy). It also seemed setting the "Vlan value" under the Group-policy handled choosing the eggress interface as the VPN Client users traffic was coming to the ASA from the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this it was only matter of configuring routes with different metrics towards the subinterfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seemed to work just fine but rather than manage such an environment with a nightmarish NAT and route configuration I'm still waiting for the decision if we are going to get an Cisco IOS device instead to handle this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the moment I'd rather use a IOS device to do any PBR if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 11:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135315#M392199</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-25T11:31:46Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135316#M392200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've seen many examples of people saying they have this working using the old nat commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And indeed the CLI doc implies that if you have a NAT rule in place and specify an interface then it uses the NAT interface for egress automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If you specify an optional interface, then the ASA uses the NAT configuration to determine the egress interface. For identity NAT, the default behavior is to use the NAT configuration, but you have the option to always use a route lookup instead."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm pretty sure if can work i'm just missing a command to skip the route-lookup first...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 11:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135316#M392200</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2013-01-25T11:43:48Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135317#M392201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is from 8.4(2) Release notes (Had to check as theres been some changes all throughout 8.4 software level in the minor updates)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp600408table600403" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; Identity NAT configurable proxy ARP and route lookup &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp600443"&gt;&lt;/A&gt;&lt;P&gt; In earlier releases for identity NAT, proxy ARP was disabled, and a&amp;nbsp; route lookup was always used to determine the egress interface. You&amp;nbsp; could not configure these settings. In 8.4(2) and later, the default&amp;nbsp; behavior for identity NAT was changed to match the behavior of other&amp;nbsp; static NAT configurations: proxy ARP is enabled, and the NAT&amp;nbsp; configuration determines the egress interface (if specified) by default.&amp;nbsp; You can leave these settings as is, or you can enable or disable them&amp;nbsp; discretely. Note that you can now also disable proxy ARP for regular&amp;nbsp; static NAT. &lt;/P&gt;&lt;A name="wp600444"&gt;&lt;/A&gt;&lt;P&gt; For pre-8.3 configurations, the migration of NAT exempt rules (the &lt;STRONG&gt;nat 0 access-list&lt;/STRONG&gt; command) to 8.4(2) and later now includes the following keywords to disable proxy ARP and to use a route lookup: &lt;STRONG&gt;no-proxy-arp&lt;/STRONG&gt; and &lt;STRONG&gt;route-lookup&lt;/STRONG&gt;. The &lt;STRONG&gt;unidirectional&lt;/STRONG&gt; keyword that was used for migrating to 8.3(2) and 8.4(1) is no longer&amp;nbsp; used for migration. When upgrading to 8.4(2) from 8.3(1), 8.3(2), and&amp;nbsp; 8.4(1), all identity NAT configurations will now include the &lt;STRONG&gt;no-proxy-arp&lt;/STRONG&gt; and &lt;STRONG&gt;route-lookup&lt;/STRONG&gt; keywords, to maintain existing functionality. The &lt;STRONG&gt;unidirectional&lt;/STRONG&gt; keyword is removed. &lt;/P&gt;&lt;A name="wp600445"&gt;&lt;/A&gt;&lt;P&gt; We modified the following commands: &lt;STRONG&gt;nat static&lt;/STRONG&gt; [&lt;STRONG&gt;no-proxy-arp&lt;/STRONG&gt;] [&lt;STRONG&gt;route-lookup&lt;/STRONG&gt;] (object network) and &lt;STRONG&gt;nat source static&lt;/STRONG&gt; [&lt;STRONG&gt;no-proxy-arp&lt;/STRONG&gt;] [&lt;STRONG&gt;route-lookup&lt;/STRONG&gt;] (global). &lt;/P&gt;&lt;A name="wp600447"&gt;&lt;/A&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the above if you have 8.4(1) for example "route-lookup" is always active. And from 8.4(2) onwards the default behaviour should be that "route-lookup" is disabled and NAT handles the ingress/eggress decision.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What software level are you using? What kind of NAT configurations have you used to try this out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guess I might be able to try this out at home with my own ASA later. But until that I cant really say as I havent tried this or have not had the need to do this functionality on an ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 11:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135317#M392201</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-25T11:59:39Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135318#M392202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its acutally 8.6 so i've been working on the above 8.4(1) logic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I can see route-lookup should not be used where a specific NAT is in place but I can't get it to work that way&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 12:42:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135318#M392202</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2013-01-25T12:42:28Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135319#M392204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll let you know about the results if I get to test this out. Can you share any configurations and "packet-tracer" outputs on the things you have tried so far for me to compare to if I get to test this out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont know if I will have time on the weekend and next week I will be at Cisco Live! 2013 London &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 12:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135319#M392204</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-25T12:52:57Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135320#M392206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If anyone else has any ideas on destination NAT to force traffic out of a partuclar outside interface regardless of routes..... I keep seeing hints that its possible but can't quite get it working....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 18:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135320#M392206</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2013-01-25T18:38:31Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135321#M392207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I did a very simple test on my home ASA 5505 running 9.1(1) (Base License)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres my basic configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some notes&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;WAN-SEC IP address is just a placeholder&lt;/LI&gt;&lt;LI&gt;There is a "no forward" configuration on the interface as I only have Base License on my home ASA&lt;UL&gt;&lt;LI&gt;This doesnt however prevent traffic initiated from LAN -&amp;gt; WAN-SEC&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;x.x.x.x = My actual WAN public IP address&lt;/LI&gt;&lt;LI&gt;y.y.y.y = My actual WAN public IP gateway&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;INTERFACES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.10.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; description WAN&lt;/P&gt;&lt;P&gt; nameif WAN&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan20&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif WAN-SEC&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.10.234.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ROUTES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route WAN 0.0.0.0 0.0.0.0 y.y.y.y 1&lt;/P&gt;&lt;P&gt;route WAN-SEC 0.0.0.0 0.0.0.0 10.10.234.2 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT OBJECTS&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service WWW&lt;/P&gt;&lt;P&gt; service tcp destination eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service SMTP&lt;/P&gt;&lt;P&gt; service tcp destination eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT CONFIGURATIONS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source dynamic any interface service WWW WWW&lt;/P&gt;&lt;P&gt;nat (LAN,WAN-SEC) source dynamic any interface service SMTP SMTP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) after-auto source dynamic LAN-NETWORK interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PACKET-TRACER OUTPUT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;WWW-TRAFFIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# packet-tracer input LAN tcp 10.0.0.100 1025 1.2.3.4 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source dynamic any interface service WWW WWW&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface WAN&lt;/P&gt;&lt;P&gt;Untranslate 1.2.3.4/80 to 1.2.3.4/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source dynamic any interface service WWW WWW&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.0.0.100/1025 to x.x.x.x/1025&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source dynamic any interface service WWW WWW&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: USER-STATISTICS&lt;/P&gt;&lt;P&gt;Subtype: user-statistics&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: USER-STATISTICS&lt;/P&gt;&lt;P&gt;Subtype: user-statistics&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 112793, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: LAN&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: WAN&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SMTP TRAFFIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input LAN tcp 10.0.0.100 1025 1.2.3.4 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (LAN,WAN-SEC) source dynamic any interface service SMTP SMTP&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface WAN-SEC&lt;/P&gt;&lt;P&gt;Untranslate 1.2.3.4/25 to 1.2.3.4/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (LAN,WAN-SEC) source dynamic any interface service SMTP SMTP&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.0.0.100/1025 to 10.10.234.1/1025&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: inspect-smtp&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (LAN,WAN-SEC) source dynamic any interface service SMTP SMTP&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: USER-STATISTICS&lt;/P&gt;&lt;P&gt;Subtype: user-statistics&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: USER-STATISTICS&lt;/P&gt;&lt;P&gt;Subtype: user-statistics&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 112797, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: LAN&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: WAN-SEC&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was the only setup I could get the "packet-tracer" output seem what its "supposed" to show when the traffic would leave to different WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully you can get something out of this. I wont be able to proper lab this unless I use equipment and WAN connections at my work. But that wont happen until maybe after a week or so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you have already tried this and it doesnt work. And also if you havent yet tried it let me know did it help at all. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2013 14:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135321#M392207</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-26T14:00:08Z</dc:date>
    </item>
    <item>
      <title>ASA Policy Based Routing Alternative</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135322#M392208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the effort on this, it really helped to point me in the right direction. I tried it out and it was not working because even though it gets sent to the interface properly it looks for a route once it gets to that interface and fails. I was able to set the default route pointing out the WAN-SEC interface and then put the below routes pointing out the WAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route WAN 0.0.0.0 128.0.0.0 10.2.101.1 1&lt;/P&gt;&lt;P&gt;route WAN 128.0.0.0 128.0.0.0 10.2.101.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since they are more specific normal traffic flows out the WAN interface while the NAT'd traffic is sent out the other interface. I confirmed it is working using packet captures.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 20:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-based-routing-alternative/m-p/2135322#M392208</guid>
      <dc:creator>kenrandrews</dc:creator>
      <dc:date>2013-07-11T20:20:53Z</dc:date>
    </item>
  </channel>
</rss>

