<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asa 5505 Base static route in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554770#M615952</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Hi Brian,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Since you are running 8.2.1 there should have been an ICMP redirect by ASA and a route should be automatically injected on the client workstation for subnet 10.0.0.0 mask 255.0.0.0 GW 192.168.168.101.&amp;nbsp; Sometimes a PC can ignore ICMP redirect packets because of firewall on PC or HIPS, in that case a packet will come to firewall and firewall will forward the packet to 192.168.1.68.101 and then reply will directly&amp;nbsp; reach PC.&amp;nbsp; This all should be fine till ICMP or UDP is used, however for TCP based traffic we need to have a TCP state bypass. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;In your case, PC has default gateway set to firewall so first segment with SYN flag will reach firewall and firewall will forward it for 192.168.1681.101.&amp;nbsp;&amp;nbsp; However, a segment with SYN and ACK flags set will directly reach PC from 192.168.168.101 as it will have MAC address of host resolved via ARP; so next segment from PC with ACK flag set coming to ASA will be dropped as there was no SYN-ACk seen by ASA.&amp;nbsp; More details of feature can be found at &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Are you using ICMP itself to test the behavior or some TCP traffic.&amp;nbsp; Let us know if it still does not work as per suggesgtion from Federico and enabling TCP state bypass.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;-Deepak&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 21 Nov 2010 07:52:30 GMT</pubDate>
    <dc:creator>Deepak Sharma</dc:creator>
    <dc:date>2010-11-21T07:52:30Z</dc:date>
    <item>
      <title>Asa 5505 Base static route</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554768#M615942</link>
      <description>&lt;P&gt;I have an asa 5505 base model that I'm having problems with a static route. The inside network is 192.168.168.0/24 the inside interface is 192.168.168.1. There is a second gateway in the network that exists at 192.168.168.101. I need any traffic destined for the subnet 10.0.0.0/8 to go to the 101 gateway. All machines use the asa(192.168.168.1) as their gateway. I have 2 routes in the asa:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 24.144.192.1 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 192.168.168.101 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All machines are able to get on the internet, but none can reach the 10 network. When I try to ping the 10 network I get the following error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Deny inbound icmp src inside:192.X.X.X dst inside:10.X.X.X (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can however ping it from the asa itself. I tried adding the &lt;STRONG&gt;same-security-traffic permit intra-interface &lt;/STRONG&gt;command to the config and still cannot ping from workstations but get a different error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;portmap translation creation failed for icmp src inside:192.X.X.X dst inside:10.X.X.X (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't understand what I'm missing and am beginning to wonder if this is a base os restriction. I've attached my config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:12:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554768#M615942</guid>
      <dc:creator>meadcity984</dc:creator>
      <dc:date>2019-03-11T19:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 Base static route</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554769#M615950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 192.168.168.x will reach 10.0.0.x by reaching the ASA and reroute back via the inside interface correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try adding this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And see if it works.&lt;/P&gt;&lt;P&gt;Probably this one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.168.0 192.168.168.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Nov 2010 22:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554769#M615950</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-19T22:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 Base static route</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554770#M615952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Hi Brian,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Since you are running 8.2.1 there should have been an ICMP redirect by ASA and a route should be automatically injected on the client workstation for subnet 10.0.0.0 mask 255.0.0.0 GW 192.168.168.101.&amp;nbsp; Sometimes a PC can ignore ICMP redirect packets because of firewall on PC or HIPS, in that case a packet will come to firewall and firewall will forward the packet to 192.168.1.68.101 and then reply will directly&amp;nbsp; reach PC.&amp;nbsp; This all should be fine till ICMP or UDP is used, however for TCP based traffic we need to have a TCP state bypass. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;In your case, PC has default gateway set to firewall so first segment with SYN flag will reach firewall and firewall will forward it for 192.168.1681.101.&amp;nbsp;&amp;nbsp; However, a segment with SYN and ACK flags set will directly reach PC from 192.168.168.101 as it will have MAC address of host resolved via ARP; so next segment from PC with ACK flag set coming to ASA will be dropped as there was no SYN-ACk seen by ASA.&amp;nbsp; More details of feature can be found at &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Are you using ICMP itself to test the behavior or some TCP traffic.&amp;nbsp; Let us know if it still does not work as per suggesgtion from Federico and enabling TCP state bypass.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="text-align: justify;"&gt;&lt;SPAN style="color: #000080;"&gt;-Deepak&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Nov 2010 07:52:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554770#M615952</guid>
      <dc:creator>Deepak Sharma</dc:creator>
      <dc:date>2010-11-21T07:52:30Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 Base static route</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554771#M615956</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding both of the static NAT's took care of it. Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2010 14:20:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554771#M615956</guid>
      <dc:creator>meadcity984</dc:creator>
      <dc:date>2010-11-22T14:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: Asa 5505 Base static route</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554772#M615961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you show the static route commands using the new NAT method in 8.3.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jess&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Nov 2010 21:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-base-static-route/m-p/1554772#M615961</guid>
      <dc:creator>goodwin-j</dc:creator>
      <dc:date>2010-11-29T21:49:58Z</dc:date>
    </item>
  </channel>
</rss>

