<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Possible? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/possible/m-p/1766613#M495994</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yup Jon, you've hit the nail on its head, thats what I meant but never realized that it got lost in the discussion and got overlooked... lol &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; . I am very confident about that since its something I have tested and works as expected. In this config, we can eliminate the route issue and just route packets based on DNAT, so the firewall would not even look for the default route. Only condition -----&amp;gt; 172.16.x.x shoudl be behind another separate interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Oct 2011 19:11:40 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-10-11T19:11:40Z</dc:date>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766593#M495963</link>
      <description>&lt;P&gt;Hi Team! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the scenario: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bunch of networks -- ASA -- ISP1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -- ISP2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The deal is that the customer wants one of the networks 172.16.x.0/24 to use ISP2 as its main exit, while keeping all other networks using ISP1.&lt;/P&gt;&lt;P&gt;We know there's no PBR functionality on ASA, and also there are some workarounds with NAT, but this is the problem that I'm having: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current config for ISP1 for all networks: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;route outside 0 0 x.x.x.x 1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Works perfectly fine. &lt;/P&gt;&lt;P&gt;I add the following to try to make 172.16.x.0/24 to use ISP2. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 172.16.x.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (new_outside) 2 interface &lt;/P&gt;&lt;P&gt;route new_outside 0 0 y.y.y.y 1&amp;nbsp; --&amp;gt; as soon as I enter this command the ASA complains, it won't allow it... fine, so I did as per this document:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-15622" target="_blank"&gt;https://supportforums.cisco.com/docs/DOC-15622&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route new_outside 128.0.0.0 128.0.0.0 y.y.y.y 1 &lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route new_outside 0.0.0.0 128.0.0.0 y.y.y.y 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; But that drops the Internet connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Funny thing is that if I do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 172.16.x.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (new_outside) 2 interface &lt;/P&gt;&lt;P&gt;route new_outside 0 0 y.y.y.y 2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, the inside host can't get to the Internet... seems to me that having an AD of ''2'' on the default route the ASA won't use it since it has a better route pointing to the original ISP1. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, can this be done? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:36:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766593#M495963</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2019-03-11T21:36:32Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766594#M495965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Fed,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say the DG for ISP 1 line is 1.1.1.1 and for ISP 2 is 2.2.2.2,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add teh nat statements in the same order as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 172.16.x.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside_new) 2 interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0 0 1.1.1.1 1&lt;/P&gt;&lt;P&gt;route outside_new 0 0 2.2.2.2 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I would never suggest this, since ASA is not a load-balancer, it should not be done on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best is to connect a router in front of your ASA, terminate the ISP on it and do PBR on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 16:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766594#M495965</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T16:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766595#M495967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does this work ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a start i thought the ASA did not support multiple default-routes pointing out of different interfaces. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And even if it did how does the NAT setup for 172.16.x.0 "tie" it to the outside_new interface ?&amp;nbsp; Because doesn't the routing define which interface is used for NAT ie. assuming you could have 2 default-routes to different interfaces -&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.5.1 comes in on the inside wirth destination any address. How does the ASA know to use the default-route pointing to 2.2.2.2 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are yoy saying the default-route via 1.1.1.1 is rejected because there is no global (outside) 2 corresponding config ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 16:33:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766595#M495967</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T16:33:28Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766596#M495968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ooops I must have mixed it up, what I wanted to was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route outside 128.0.0.0 128.0.0.0 y.y.y.y 1 &lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route new_outside 0.0.0.0 128.0.0.0 y.y.y.y 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;I mixed it up &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; But my advise still remains, its just a workaround and not a tested thing, even I have never tested it, so the result might differ, from setup to setup and router shoudl only be used for tyhis purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;Glad you pointed it out, nothing beats your eye &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 16:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766596#M495968</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T16:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766597#M495971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No problem and believe me i mix things up quite often myself &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be honest i am posting for my own clarification on this as much as anything else. And its the NAT config i am intrigued by. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With your config when a packet comes in on the inside interface from 172.16.5.1 with a destination of 15.15.15.1 the routing table is looked up and the routes chosen is via the outside interface ie. next-hop 1.1.1.1. But there is no corresponding global ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 172.16.x.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but there is no global (outside) 2&amp;nbsp; statement so&amp;nbsp; i would have thought the ASA would simply drop the packet because it cannot NAT it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the destination was for 130.15.15.1 for example then yes it would work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just want to be sure i am not misunderstanding how the nat/global routing interactions wortk. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - will Cisco ever support PBR for the ASA, seems like these sort of questions come up all the time &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" height="1" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" width="1"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 16:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766597#M495971</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T16:52:36Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766598#M495973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon and Varun! &lt;/P&gt;&lt;P&gt;Thank you both &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;I have the same exact doubt as Jon. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config won't work: &lt;/P&gt;&lt;P&gt;nat (inside) 2 172.16.x.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (new_outside) 2 interface &lt;/P&gt;&lt;P&gt;route new_outside 0 0 y.y.y.y 2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because (i think) the fact of a better route in the routing table (AD of 1) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA won't let me allow this: &lt;/P&gt;&lt;P&gt;route new_outside 0 0 y.y.y.y 1 --&amp;gt; complains about the route &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 16:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766598#M495973</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-10-11T16:58:10Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766599#M495975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No that definitely won't work. You cannot have multiple default-routes pointing out of different interfaces on the ASA. You can have multiple default-routes pointing out of the same interface but that wouldn't help in your situation. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with Varun that the ASA really isn't designed to be a load-balancer and as it doesn't support PBR you really are going to struggle doing this. What you need is PBR on a router(s) that are outside of the ASA but if your ISP controls those routers there is not a lot you can do. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 17:04:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766599#M495975</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T17:04:25Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766600#M495977</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes thats correct what Jon pointed out and I think your situation is different to whats mentioned in the doc, the doc is if half of the network needs to be sent through ISP1 and the other half from ISP2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route outside 128.0.0.0 128.0.0.0 y.y.y.y 1 &lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route new_outside 0.0.0.0 128.0.0.0 y.y.y.y 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at the network and subnet masks being used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think so it shoudl work the way we are trying to, since I ahev also never tested it. The only thing that I have tested is if your 172.16.x.0 is connected behind another interface rqather than inside, lets say inside_2, then this can be accomplished:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (new_outside,inside_2) 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In teh config above, we are using the static command to route the traffic through new_outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 17:07:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766600#M495977</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T17:07:29Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766601#M495979</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with you both, and I really don't like the situation &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I'm wondering why the following won't work: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route new_outside 128.0.0.0 128.0.0.0 y.y.y.y 1 &lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P style="padding-left: 90px;"&gt;route new_outside 0.0.0.0 128.0.0.0 y.y.y.y 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree the ASA is not supposed to do this, but just wondering why it does not work like the logic says. &lt;/P&gt;&lt;P&gt;I thought with the above (don't have two default gateways out two different interfaces), just have two routes via ISP2 sending ''all'' traffic out. With the proper NAT configuration? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you guys again for all your input&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 17:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766601#M495979</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-10-11T17:17:33Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766602#M495980</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that even if you could do this ie. i assume you mean &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x&lt;/P&gt;&lt;P&gt;route new_outside 0.0.0.0 128.0.0.0 y.y.y.y&lt;/P&gt;&lt;P&gt;route new_outside 128.0.0.0 128.0.0.0 y.y.y.y &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and i'm not sure it would allow you but lets say you could. The default-route via outside would never be used because the 2 routes via new_outside are more specific and the more specific routes are always chosen so all traffic would then go via outside2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If instead you had - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 128.0.0.0 x.x.x.x&lt;/P&gt;&lt;P&gt;route outside_new 128.0.0.0 128.0.0.0 y.y.y.y &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then this would split traffic down the links but still based on destination not source ie. all destinations from 1.x.x.x -&amp;gt; 126.x.x.x would be sent via the outside interface and destinations from 128.x.x.x upwards would be sent to outside_new.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no way to specify which route to used based on source IP on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 17:45:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766602#M495980</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T17:45:09Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766603#M495981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats right as Jon said. &lt;/P&gt;&lt;P&gt;The doc is for splitting the traffic going to the internet based on destination ip, so your requirement doesn't fall into it. Source based routing is not an option on ASA, so that makes it more difficult for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 17:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766603#M495981</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T17:57:43Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766604#M495982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am more clear now &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;So, besides being an awful solution with the ASA as we all know, it is not even possible correct? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to confirm since ''not supported'' does not neccessarily means ''can't possibly do it''!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you, &lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766604#M495982</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-10-11T18:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766605#M495983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming we are talking about the original issue, ie. 172.16.x.x via outside_2, as&amp;nbsp; far as i can see it's just not possible to do on an ASA rather than simply being unsupported.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766605#M495983</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T18:14:19Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766606#M495984</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this is not possible on ASA, I have never been able to do it, until anyone can come up with any magic solution to it &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; , I would definitely put it in unsupported configuration only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766606#M495984</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T18:20:14Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766607#M495985</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you both guys! &lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766607#M495985</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-10-11T18:52:02Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766608#M495986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cheers Fed and cheers to you as well Jon, it was a useful discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766608#M495986</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-11T18:54:57Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766609#M495987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Agreed, it cleared a few things up for me as well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 18:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766609#M495987</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T18:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766610#M495988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;edited for spacing&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 19:08:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766610#M495988</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T19:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766611#M495991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico / Varun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A thought just occured. Varun wrote - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I don't think so it shoudl work the way we are trying to, since I ahev also never tested it. The only thing that I have tested is if your 172.16.x.0 is connected behind another interface rqather than inside, lets say inside_2, then this can be accomplished:&lt;/EM&gt;&lt;/P&gt;&lt;P style="min-height: 8pt;"&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (new_outside,ins&lt;EM&gt;i&lt;/EM&gt;de_2) 0.0.0.0 0.0.0.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;sysopt noproxyarp inside_2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I have never done this so i may be misunderstanding but Varun seems to be suggesting with this config all traffic from inside2 would be routed out of new_outside. If this is the case then either - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) do you have a spare interface you could route the 172.16.x.x addresses to on the inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) if you don't could you use subinterfaces on the inside interface and route just the 172.16.x.x to one of the subinterfaces and the rest of the traffic to the other &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun, if i have misunderstood what that config does please let me know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 19:09:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766611#M495991</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-10-11T19:09:19Z</dc:date>
    </item>
    <item>
      <title>Possible?</title>
      <link>https://community.cisco.com/t5/network-security/possible/m-p/1766612#M495993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It will be a matter of just having another ''inside'' interface (subinterface)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Oct 2011 19:11:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/possible/m-p/1766612#M495993</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-10-11T19:11:02Z</dc:date>
    </item>
  </channel>
</rss>

