<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA PBR in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3923930#M5525</link>
    <description>&lt;P&gt;here is the referene&amp;nbsp; guide :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/networking-documents/how-to-configure-pbr/ta-p/3122774" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/networking-documents/how-to-configure-pbr/ta-p/3122774&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;good example :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.networkstraining.com/cisco-asa-policy-based-routing-pbr/" target="_blank" rel="noopener"&gt;https://www.networkstraining.com/cisco-asa-policy-based-routing-pbr/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure you have verion 9.4.x above.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2019 13:44:48 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2019-09-13T13:44:48Z</dc:date>
    <item>
      <title>Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3923847#M5524</link>
      <description>&lt;P&gt;Looking to do PBR on the ASA for Tunnel interface, is this possible?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It has been super long time since I have done this because I try to avoid it at all costs. I cant recall when I make a PBR ACL that uses a source Subnet to a destination subnet on ports 80/443, what happens to the traffic not from that subnet? I ask because I am tying the ACL to the inside interface and do not want other traffic to get blocked. Do i need to add a permit any after the matching the ACL in the route-map?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:29:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3923847#M5524</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2020-02-21T17:29:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3923930#M5525</link>
      <description>&lt;P&gt;here is the referene&amp;nbsp; guide :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/networking-documents/how-to-configure-pbr/ta-p/3122774" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/networking-documents/how-to-configure-pbr/ta-p/3122774&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;good example :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.networkstraining.com/cisco-asa-policy-based-routing-pbr/" target="_blank" rel="noopener"&gt;https://www.networkstraining.com/cisco-asa-policy-based-routing-pbr/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure you have verion 9.4.x above.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2019 13:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3923930#M5525</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-13T13:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3933417#M5527</link>
      <description>So when looking at this:&lt;BR /&gt;&lt;BR /&gt;route-map PBR permit 2 &amp;lt;– create the route-map and give it a name “PBR”&lt;BR /&gt;match ip address PBR_ACL1 &amp;lt;– match the traffic of LAN1 identified in ACL1 created above&lt;BR /&gt;set ip next-hop 50.50.50.2 &amp;lt;– set the next hop of LAN1 traffic to be ISP1&lt;BR /&gt;&lt;BR /&gt;route-map PBR permit 3 &amp;lt;– create another entry in the same route-map&lt;BR /&gt;match ip address PBR_ACL2 &amp;lt;– match the traffic of LAN2 identified in ACL2 created above&lt;BR /&gt;set ip next-hop 55.55.55.2 &amp;lt;– set the next hop of LAN2 traffic to be ISP2&lt;BR /&gt;&lt;BR /&gt;What if I want only one network of many behind the firewall to traverse ISP1 and want everything else to hit ISP2?&lt;BR /&gt;&lt;BR /&gt;Would the second statement have an acl that is "access-list PBR_ACL_2 extended permit ip any any" so it would process my more defined network first and send it out ISP1 and then take anything after that matching any any and send it out ISP2?</description>
      <pubDate>Wed, 02 Oct 2019 00:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3933417#M5527</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-02T00:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3933436#M5530</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;Would the second statement have an acl that is "access-list PBR_ACL_2 extended permit ip any any" so it would process my more defined network first and send it out ISP1 and then take anything after that matching any any and send it out ISP2?&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is correct, alternatively you could simply have your default route through ISP2 that way you only need one entry in the route map used for PBR.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;route WAN_ISP2 0.0.0.0 0.0.0.0&amp;nbsp;55.55.55.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;route-map PBR permit 2&amp;nbsp;&lt;BR /&gt;match ip address PBR_ACL1&amp;nbsp;&lt;BR /&gt;set ip next-hop 50.50.50.2&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 02:14:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3933436#M5530</guid>
      <dc:creator>josedelpino</dc:creator>
      <dc:date>2019-10-02T02:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3936607#M5532</link>
      <description>&lt;P&gt;Something is wrong that I cannot see or notice. I am seeing the entries in the xlate table but no internet is getting out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ICMP shows this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Stevens-MacBook-Pro:~ stevenwiliams$ traceroute 4.2.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;traceroute to 4.2.2.2 (4.2.2.2), 64 hops max, 52 byte packets&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;1&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.20.42.3 (10.20.42.3)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.625 ms&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.325 ms&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.266 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.53.100.9 (10.53.100.9)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.722 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10.53.100.13 (10.53.100.13)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.873 ms&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.915 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;3&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;4&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;* * 192.133.72.1 (192.133.72.1)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1.747 ms !N&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;5&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;192.133.72.1 (192.133.72.1)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1.721 ms !N * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;6&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;192.133.72.1 (192.133.72.1)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1.931 ms !N *&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;2.042 ms !N&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Stevens-MacBook-Pro:~ stevenwiliams$ &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 18:38:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3936607#M5532</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-07T18:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3936608#M5534</link>
      <description>&lt;P&gt;Something is wrong that I cannot see or notice. I am seeing the entries in the xlate table but no internet is getting out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ICMP shows this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Stevens-MacBook-Pro:~ stevenwiliams$ traceroute 4.2.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;traceroute to 4.2.2.2 (4.2.2.2), 64 hops max, 52 byte packets&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;1&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.20.42.3 (10.20.42.3)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.625 ms&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.325 ms&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.266 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;10.53.100.9 (10.53.100.9)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.722 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;10.53.100.13 (10.53.100.13)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.873 ms&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;0.915 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;3&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;4&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;* * 192.133.72.1 (192.133.72.1)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1.747 ms !N&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;5&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;192.133.72.1 (192.133.72.1)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1.721 ms !N * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;6&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;192.133.72.1 (192.133.72.1)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;1.931 ms !N *&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;2.042 ms !N&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Stevens-MacBook-Pro:~ stevenwiliams$&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 18:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3936608#M5534</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-07T18:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA PBR</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3936673#M5535</link>
      <description>Will a packet tracer detail actually process the traffic using the PBR acl?&lt;BR /&gt;</description>
      <pubDate>Mon, 07 Oct 2019 20:13:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-pbr/m-p/3936673#M5535</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2019-10-07T20:13:55Z</dc:date>
    </item>
  </channel>
</rss>

