<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New Cisco ASA 5540 - Basic Routing Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999944#M401780</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is recommended that you configure 10.22.2.15 as your default gateway and that switch/router's default gateway to be the ASA inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason is if you configure your PC default gateway to be the ASA inside interface, there will be assymetric routing and the ASA will drop the packet because it does not see the complete session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To access the internet from the Private subnets, just add the following global statement:&lt;/P&gt;&lt;P&gt;global (Public) 101 interface &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 22 Jul 2012 16:00:40 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-07-22T16:00:40Z</dc:date>
    <item>
      <title>New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999943#M401779</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my first post on these forums, so please go easy on me. I am new to Cisco ASA and plan to upgrade our current firewalls to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Upon testing it seems although I have static routes setup to all of our internal network, I cannot ping anything outside the current subnet (same as ASA 10.22.x.x) whilst choosing the ASA as my default gateway. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I can ping the ASA itself (10.22.1.7) and I can ping all of the internal network whilst on the ASA, but I cannot route to any internal hosts when I set the ASA as the default gateway on my PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have chose ICMP in the default Service policy rules and I have also added ICMP access rules which haven't worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know it is probably something really simple, but any help would be greatly appreciated. I haven't even got to routing from Private to Public for Internet access etc. Below is my current running config with secure bits changed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(5) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name test.com&lt;BR /&gt;enable password hf8y89w8f.88 encrypted&lt;BR /&gt;passwd fy87er9hfneiornjreo encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description Private Interface&lt;BR /&gt;nameif Private&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.22.1.7 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description DMZ Interface&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 10.96.22.3 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description Public Interface&lt;BR /&gt;nameif Public&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 100.65.35.30 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;description Management Interface&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;banner asdm Test ASDM, Authorised Access Only.&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup Private&lt;BR /&gt;dns domain-lookup Public&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 208.67.222.222&lt;BR /&gt;name-server 208.67.220.200&lt;BR /&gt;name-server 10.21.1.1&lt;BR /&gt;domain-name test.com&lt;BR /&gt;object-group service GWise tcp&lt;BR /&gt;description Groupwise&lt;BR /&gt;port-object eq 1677&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;access-list ripACL_FR_1 standard permit 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list Public_access_out remark HTTP Outbound&lt;BR /&gt;access-list Public_access_out extended permit tcp interface Private eq www interface Public eq www &lt;BR /&gt;access-list Public_access_out remark Ping Test&lt;BR /&gt;access-list Public_access_out extended permit icmp 10.0.0.0 255.0.0.0 100.65.35.29 255.255.255.248 &lt;BR /&gt;access-list Public_access_out remark DNS Resolution&lt;BR /&gt;access-list Public_access_out extended permit object-group TCPUDP interface Private interface Public eq domain &lt;BR /&gt;access-list Private_access_in extended permit ip any any &lt;BR /&gt;access-list Private_access_in extended permit icmp any any &lt;BR /&gt;access-list ripACL_FR standard permit 10.0.0.0 255.0.0.0 &lt;BR /&gt;access-list Private_access_out remark Icmp ping LAN&lt;BR /&gt;access-list Private_access_out extended permit ip any any log disable &lt;BR /&gt;access-list Private_access_out extended permit icmp any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Private 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu Public 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (Private) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group Private_access_in in interface Private&lt;BR /&gt;access-group Private_access_out out interface Private&lt;BR /&gt;access-group Public_access_out out interface Public&lt;BR /&gt;!&lt;BR /&gt;router rip&lt;BR /&gt;network 10.0.0.0&lt;BR /&gt;version 2&lt;BR /&gt;distribute-list ripACL_FR out interface Private&lt;BR /&gt;distribute-list ripACL_FR_1 in interface Private&lt;BR /&gt;!&lt;BR /&gt;route Public 0.0.0.0 0.0.0.0 100.65.35.29 1&lt;BR /&gt;route Private 10.2.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.3.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.4.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.5.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.6.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.7.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.8.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.9.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.10.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.11.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.12.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.13.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.14.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.20.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.21.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.22.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.24.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.45.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route DMZ 10.96.0.0 255.255.0.0 10.96.22.3 1&lt;BR /&gt;route Private 10.97.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.98.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.99.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.210.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.215.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Private 10.220.0.0 255.255.0.0 10.22.2.15 1&lt;BR /&gt;route Public 100.65.35.30 255.255.255.248 100.65.35.29 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.22.0.0 255.255.0.0 Private&lt;BR /&gt;http 10.0.0.0 255.0.0.0 Private&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;lt;cut&amp;gt;&lt;BR /&gt;quit&lt;BR /&gt;telnet 10.0.0.0 255.0.0.0 Private&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 Private&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 10.21.1.1 source Private prefer&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;class-map Public-class&lt;BR /&gt;match port tcp eq www&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map Public-policy&lt;BR /&gt;class Public-class&lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy Public-policy interface Public&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:uh888juhojm9j009kj09&lt;BR /&gt;: end&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999943#M401779</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2019-03-11T23:33:16Z</dc:date>
    </item>
    <item>
      <title>New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999944#M401780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is recommended that you configure 10.22.2.15 as your default gateway and that switch/router's default gateway to be the ASA inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason is if you configure your PC default gateway to be the ASA inside interface, there will be assymetric routing and the ASA will drop the packet because it does not see the complete session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To access the internet from the Private subnets, just add the following global statement:&lt;/P&gt;&lt;P&gt;global (Public) 101 interface &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 16:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999944#M401780</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-22T16:00:40Z</dc:date>
    </item>
    <item>
      <title>New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999945#M401783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;As Jennifer Halim advised, it’s best that all workstations default gateway points to the L3 Core Switch i.e. 10.22.2.15, and the L3 Core Switch has a default gateway pointing to the Cisco ASA FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are some config changes that you’ll need to do. Once you’ve done it, paste your latest config here, so that everyone here can assist you further&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Commands to remove&lt;/P&gt;&lt;P&gt;================&lt;/P&gt;&lt;P&gt;no access-list ripACL_FR_1 standard permit 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;no access-group Private_access_out out interface Private&lt;/P&gt;&lt;P&gt;no access-group Public_access_out out interface Public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no object-group service GWise tcp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list Public_access_out remark HTTP Outbound&lt;/P&gt;&lt;P&gt;no access-list Public_access_out extended permit tcp interface Private eq www interface Public eq www &lt;/P&gt;&lt;P&gt;no access-list Public_access_out remark Ping Test&lt;/P&gt;&lt;P&gt;no access-list Public_access_out extended permit icmp 10.0.0.0 255.0.0.0 100.65.35.29 255.255.255.248 &lt;/P&gt;&lt;P&gt;no access-list Public_access_out remark DNS Resolution&lt;/P&gt;&lt;P&gt;no access-list Public_access_out extended permit object-group TCPUDP interface Private interface Public eq domain &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list Private_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;no access-list Private_access_in extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no access-list ripACL_FR standard permit 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;no access-list Private_access_out remark Icmp ping LAN&lt;/P&gt;&lt;P&gt;no access-list Private_access_out extended permit ip any any log disable &lt;/P&gt;&lt;P&gt;no access-list Private_access_out extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no router rip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no route DMZ 10.96.0.0 255.255.0.0 10.96.22.3 1&lt;/P&gt;&lt;P&gt;no route Public 100.65.35.30 255.255.255.248 100.65.35.29 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no class-map Public-class&lt;/P&gt;&lt;P&gt;no policy-map Public-policy&lt;/P&gt;&lt;P&gt;no service-policy Public-policy interface Public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Commands to add&lt;/P&gt;&lt;P&gt;============&lt;/P&gt;&lt;P&gt;access-group public in interface Public&lt;/P&gt;&lt;P&gt;access-group dmz in interface DMZ&lt;/P&gt;&lt;P&gt;access-list Private_access_in permit ip any any &lt;/P&gt;&lt;P&gt;access-list private permit ip any any &lt;/P&gt;&lt;P&gt;access-list public permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Private,DMZ) 10.0.0.0 10.0.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;global (Public) 101 interface&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 22 Jul 2012 17:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999945#M401783</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-22T17:44:43Z</dc:date>
    </item>
    <item>
      <title>New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999946#M401786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for both your replies. That makes sense not configuring the ASA as the gateway on the PC. I have been able to do this in the past just to test routing, but I had already tested it on the ASA itself so should have realised.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for both your recommendations anyway, I will make those changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question if you don't mind. I understand changing the default gateway on the switch/router to be the inside ASA interface so it can route out to the Internet. Yet the site we are migrating first is a secondary Firewall/Proxy and backup E-Mail link on a separate site to our Primary one. At the moment users access this secondary internet service via a Proxy Server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anyway to point users to the secondary site via the ASA to use the Internet not modifying the default gateway on the router there? We use Proxy on both our sites, yet the Primary one already has the default gateway to the Internet via our current main Firewall which all our sites go through when we don't use the Proxy Server. So I am concerned having 2 default routes and how one would be chosen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope that makes sense, thanks again for all your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 10:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999946#M401786</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2012-07-23T10:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999947#M401789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume you are using an explicit proxy server instead of transparent proxy. If that is the case then the proxy traffic should already been routed explicitly to the proxy server so there should be no issue there. All you need to ensure is you have static route for the proxy server pointing towards this firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2012 10:43:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999947#M401789</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-23T10:43:52Z</dc:date>
    </item>
    <item>
      <title>Re: New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999948#M401792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will be using an explicit proxy, so a static route should workout perfect. Thanks for clearing it all up for me.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 08:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999948#M401792</guid>
      <dc:creator>Mark Cavendish</dc:creator>
      <dc:date>2012-07-24T08:14:58Z</dc:date>
    </item>
    <item>
      <title>New Cisco ASA 5540 - Basic Routing Problem</title>
      <link>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999949#M401794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem. Pls kindly mark the questions answered so others can learn from your post. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2012 08:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-cisco-asa-5540-basic-routing-problem/m-p/1999949#M401794</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-07-24T08:27:59Z</dc:date>
    </item>
  </channel>
</rss>

