<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA WCCP From Multiple Interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532920#M616190</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got around this issue by configuring my Ironport interface as a dot1q trunk and giving it a L3 interface in each vlan. I then can re-direct on each ASA interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jan 2013 15:50:50 GMT</pubDate>
    <dc:creator>karlchatterton</dc:creator>
    <dc:date>2013-01-28T15:50:50Z</dc:date>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532916#M616186</link>
      <description>&lt;P&gt;I use WCCP to interact with my IronPort web filter.&amp;nbsp; Currently my WSA (web filter) sits on my inside network.&amp;nbsp; WCCP is configured to redirect inside traffic to the WSA off of the inside interface.&amp;nbsp; It is my understanding that my ASA (8.2) can not redirect web traffic coming into the DMZ interface to the WCCP device (WSA) off of the inside interface.&amp;nbsp; I have been told by a sales rep that ASA 8.3 now supports this.&amp;nbsp; I have not been able to find any Cisco documentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone familiar or have tested this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532916#M616186</guid>
      <dc:creator>rmeans</dc:creator>
      <dc:date>2019-03-11T19:10:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532917#M616187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The documentation can be found below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/wccp.html#wp1113990"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/wccp.html#wp1113990&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The behavior seems to be still the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 16:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532917#M616187</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-17T16:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532918#M616188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as i know the problem, is not the ASA not being able to send the traffic to the Ironport, but the fact that most people are using both L2 and L3 spoofing on the Ironport. When i had this issue, i sniffed it, and it looks like the source mac/ip is coming from the interface where the Ironport is, which the ASA of course won't allow. My solution was to only use wccp for traffic coming from the same interface as the Ironport is on in the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 17:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532918#M616188</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2010-11-17T17:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532919#M616189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To answer your question, even in 8.3 "WCCP redirection is supported only on the ingress of an interface. The only topology that the adaptive security appliance supports is when client and cache engine are behind the same interface of the adaptive security appliance and the cache engine can directly communicate with the client, without going through the adaptive security appliance.".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, the WCCP engine talks directly to the host computer and that is why it would need to be L2 adjacent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt; &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 21:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532919#M616189</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-17T21:21:47Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532920#M616190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got around this issue by configuring my Ironport interface as a dot1q trunk and giving it a L3 interface in each vlan. I then can re-direct on each ASA interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 15:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532920#M616190</guid>
      <dc:creator>karlchatterton</dc:creator>
      <dc:date>2013-01-28T15:50:50Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532921#M616191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Karl,&lt;/P&gt;&lt;P&gt;Can I ask how did you setup multiple Group Lists using the web-cache service. I try to add another web-cache service group and it will not allow me as web-cache is in use on the first interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error I get is "The service group web-cache already exisits"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I presume that I need to set up a second group with the additional IP address of the Ironports, since it needs to be layer two adjacent to the client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Mar 2013 12:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532921#M616191</guid>
      <dc:creator>scottyd</dc:creator>
      <dc:date>2013-03-06T12:16:45Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532922#M616192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the WCCP on the ASA as follows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list wccp-traffic extended permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list wccp-traffic extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;BR /&gt;access-list wccp-traffic extended permit tcp 192.168.3.0 255.255.255.0 any eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wccp web-cache redirect-list wccp-traffic group-list ironport&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;wccp interface VLAN-1 web-cache redirect in&lt;BR /&gt;wccp interface VLAN-2 web-cache redirect in&lt;BR /&gt;wccp interface VLAN-3 web-cache redirect in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The WCCP web-cache is enabled on each interface and the ironport is configured as a do1q trunk with an IP interface in each vlan. &lt;/P&gt;&lt;P&gt;Hope this helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 11:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532922#M616192</guid>
      <dc:creator>karlchatterton</dc:creator>
      <dc:date>2013-03-11T11:45:22Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532923#M616193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Karl,&lt;/P&gt;&lt;P&gt;How do you have your routing set up on the Iron Port on each interface. Do you just have one with a default GW and it uses that for both WCCP interfaces to driect traffic? Or do you use a seperate interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Scott&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Scott &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Mar 2013 20:12:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532923#M616193</guid>
      <dc:creator>scottyd</dc:creator>
      <dc:date>2013-03-11T20:12:00Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532924#M616194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Scott,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one default route on my management interface. In my case this is vlan2. You can only manage the ironport on one interface and this needs to be untagged on your trunk port to the switch. So in my case I made vlan 2 the native vlan for the trunk to the ironport as this was the interface I wanted to use for management. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the same interface as I send my redirect traffic too in the access-list "ironport" above. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Ironport effectively has 2 connected networks and one default route. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 09:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532924#M616194</guid>
      <dc:creator>karlchatterton</dc:creator>
      <dc:date>2013-03-12T09:06:09Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532925#M616195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Karl,&lt;/P&gt;&lt;P&gt;Great, we are on track. Since you seem pretty knowlegable about this subject and I am pretty new, one more question...I see that you are only pushing HTTP through to the IronPort. We are inspecting both 80 and 443, but have come accross problems with some sites being broken by the inspection or loss of filtering of certain URLs if we just pass them through, with transparent proxy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you inspect HTTPS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 09:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532925#M616195</guid>
      <dc:creator>scottyd</dc:creator>
      <dc:date>2013-03-12T09:14:41Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532926#M616196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My customer is currently testing HTTPS inspection by only redirecting for the IP address of one user. I know they were having different experiences with different browsers etc. They are only using self signed certificate on the ironport which means you get cert errors in some cases. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I'm not able to provide much more help on HTTPS inspection. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 09:29:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532926#M616196</guid>
      <dc:creator>karlchatterton</dc:creator>
      <dc:date>2013-03-12T09:29:15Z</dc:date>
    </item>
    <item>
      <title>ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532927#M616197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes, we are seeing some issue also. We have deployed the cert via group policy and for the most part it is working for explicit mode. But it does seem to be a problem in transparent mode. Especially when you want to roll it out in a BYOD scenario, where you do not have control over the end device.&lt;/P&gt;&lt;P&gt;Thanks anyway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Mar 2013 09:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532927#M616197</guid>
      <dc:creator>scottyd</dc:creator>
      <dc:date>2013-03-12T09:49:34Z</dc:date>
    </item>
    <item>
      <title>Hi Karlchatterton, I don't</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532928#M616198</link>
      <description>&lt;P&gt;Hi Karlchatterton,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't quite undestand this point when you said that you have your ironport configured as dot1q trunk.&lt;/P&gt;&lt;P&gt;I have S170 using M1 for management and sending data, I don't where on the WSA configuration an option to do the trunk or dot1q. You can trunk the interface port on the switch, I have my ASA with VLANs on each IP (ex. nameif inside and wireless) those two have different IP, but when I do the second redirection and the wireless users can't surfe the web. and found this on Cisco Website "&lt;/P&gt;&lt;H2 class="p_H_Head1"&gt;Enabling WCCP Redirection&lt;/H2&gt;&lt;P&gt;WCCP redirection is supported only on the ingress of an interface. The only topology that the adaptive security appliance supports is when client and cache engine are behind the same interface of the adaptive security appliance and the cache engine can directly communicate with the client, without going through the adaptive security appliance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;On your setting does the WSA have multiple IP address? how you set it up?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2015 20:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532928#M616198</guid>
      <dc:creator>Herlander Stock</dc:creator>
      <dc:date>2015-01-23T20:42:59Z</dc:date>
    </item>
    <item>
      <title>Not to revive a dead post</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532929#M616199</link>
      <description>&lt;P&gt;Not to revive a dead post from six years ago but this is the top result when searching for ASA, WCCP and multiple interfaces.&lt;BR /&gt;&lt;BR /&gt;So here's how to configure WCCP on multiple interfaces using ASA 9.6(1), Squid 3.5.19, and RHEL 6 with everything persisting after reboot.&amp;nbsp; You only need one GRE tunnel between Squid and the ASA, however the &lt;STRONG&gt;Squid box needs to have a NIC on each VLAN &lt;/STRONG&gt;as others have indicated.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;One key note - &lt;STRONG&gt;the ASA uses it's highest IP for the router ID&lt;/STRONG&gt; and that cannot be changed.&amp;nbsp; To prevent potential issues and confusion I created a dummy wccp interface but in most cases you can probably just use the default highest.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Network Info&lt;/STRONG&gt;&lt;BR /&gt;ASA inside: 192.168.1.1&lt;BR /&gt;ASA dmz: 192.168.2.1&lt;BR /&gt;ASA wccp: 192.168.99.1 ("dummy" iface... not really used)&lt;BR /&gt;Squid inside:&amp;nbsp; 192.168.1.2 &lt;BR /&gt;Squid dmz:&amp;nbsp; 192.168.2.2&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA Config&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list wccp-servers extended permit ip host 192.168.1.2 any&lt;BR /&gt;access-list wccp-traffic extended deny ip host 192.168.1.2 any&lt;BR /&gt;access-list wccp-traffic extended deny ip host 192.168.2.2 any&lt;BR /&gt;access-list wccp-traffic extended permit tcp 192.168.1.0 255.255.255.0 any eq www&lt;BR /&gt;access-list wccp-traffic extended permit tcp 192.168.2.0 255.255.255.0 any eq www&lt;BR /&gt;access-list wccp-traffic extended deny ip any any&lt;BR /&gt;wccp web-cache redirect-list wccp-traffic group-list wccp-servers&lt;BR /&gt;wccp interface inside web-cache redirect in&lt;BR /&gt;wccp interface dmz web-cache redirect in&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Squid&lt;/STRONG&gt;&lt;BR /&gt;/etc/squid/squid.conf&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;wccp2_router 192.168.1.1&lt;BR /&gt;wccp2_forwarding_method gre&lt;BR /&gt;wccp2_return_method gre&lt;BR /&gt;wccp2_service standard 0&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;iptables&lt;/STRONG&gt;&lt;BR /&gt;/etc/sysconfig/iptables on &lt;SPAN style="color: #ff0000;"&gt;RHEL based systems&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;*nat&lt;BR /&gt;:PREROUTING ACCEPT [0:0]&lt;BR /&gt;:POSTROUTING ACCEPT [0:0]&lt;BR /&gt;:OUTPUT ACCEPT [0:0]&lt;BR /&gt;-A PREROUTING -i wccp0 -p tcp --dport 80 -j DNAT --to 192.168.1.2:3128&lt;BR /&gt;COMMIT&lt;STRONG&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;RHEL WCCP/GRE&lt;/STRONG&gt; tunnel config&lt;BR /&gt;/etc/sysconfig/network-scripts/ifcfg-wccp0 (again - &lt;SPAN style="color: #ff0000;"&gt;RHEL based systems&lt;/SPAN&gt;)&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;DEVICE="wccp0"&lt;BR /&gt;BOOTPROTO="none"&lt;BR /&gt;ONBOOT="yes"&lt;BR /&gt;TYPE="GRE"&lt;BR /&gt;LOCAL_DEVICE="bond0"&lt;BR /&gt;PEER_OUTER_IPADDR="192.168.99.1"&lt;BR /&gt;PEER_INNER_IPADDR="192.168.99.1"&lt;BR /&gt;MY_OUTER_IPADDR="192.168.1.2"&lt;BR /&gt;MY_INNER_IPADDR="192.168.1.2"&lt;BR /&gt;USERCTL="no"&lt;BR /&gt;IPV6INIT="no"&lt;BR /&gt;IPV6_AUTOCONF="no"&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Kernel params&lt;/STRONG&gt;&lt;BR /&gt;/etc/sysctl.conf (&lt;SPAN style="color: #ff0000;"&gt;RHEL!!!&lt;/SPAN&gt;)&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;net.ipv4.ip_forward = 1&lt;BR /&gt;net.ipv4.conf.bond0.rp_filter = 0&lt;BR /&gt;net.ipv4.conf.bond1.rp_filter = 0&lt;BR /&gt;net.ipv4.conf.wccp0.rp_filter = 0&lt;BR /&gt;net.ipv4.conf.default.rp_filter = 0&lt;BR /&gt;net.ipv4.conf.all.rp_filter = 0&lt;/PRE&gt;
&lt;P&gt;Reboot for kernel changes to take effect (this can also be done via the /proc filesystem and no reboot, if necessary).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 13:51:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/1532929#M616199</guid>
      <dc:creator>wsladekjr</dc:creator>
      <dc:date>2016-12-01T13:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3180393#M616200</link>
      <description>&lt;P&gt;Unless something has changed in the last year or so and it&amp;nbsp;is possible, you could configure the WSA to use 802.1q VLAN interfaces and they would synch with WCCP on the ASA off the physical inside interface and sub-interfaces however there was an issue where the physical interface on the ASA would grab all available buckets and never redirect traffic to the sub-interfaces. If you've made this work I'd certainly love to see the configuration as we ended up working around this issue using PBR on the later releases of ASA.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2017 03:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3180393#M616200</guid>
      <dc:creator>Tom Foucha</dc:creator>
      <dc:date>2017-09-06T03:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3910468#M616201</link>
      <description>&lt;P&gt;I cannot get this working either, the first working service ID grabs all the buckets and the second service ID that registers will not get a hash allotment nor any buckets. Can you explain what you did with PBR to to get this to work? I have multiple DMZ's with Cisco WSA tagged to each DMZ that I want to redirect for but can only get one wccp service ID per firewall context to work.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 19:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3910468#M616201</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2019-08-19T19:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3910469#M616202</link>
      <description>&lt;P&gt;cannot get this working either, the first working service ID grabs all the buckets and the second service ID that registers will not get a hash allotment nor any buckets. Can you explain what you did with PBR to to get this to work? I have multiple DMZ's with Cisco WSA tagged to each DMZ that I want to redirect for but can only get one wccp service ID per firewall context to work.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 19:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3910469#M616202</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2019-08-19T19:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3911807#M616204</link>
      <description>&lt;P&gt;What you are seeing is correct the first bucket grabs everything and doesn't allow traffic to be distributed to other service ID's. Using PBR to overcome this is what we came up with for this type of deployment.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 17:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3911807#M616204</guid>
      <dc:creator>Tom Foucha</dc:creator>
      <dc:date>2019-08-21T17:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA WCCP From Multiple Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3911818#M616206</link>
      <description>&lt;P&gt;This looks like a good solution for context a, then now my context b and context c for example which are already working with wccp from a single interface.&amp;nbsp; I suppose I also have to do the same setup on the other contexts now using PBR and cannot use the wccp from anywhere else. So for pointing the PBR to the WSA now, can the route-map be pointed back out the Inside interface, or the same Interface where the traffic is coming from, as in the example you show, you have it on a separate interface of DMZ for the WSA's proxy IP.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 17:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-wccp-from-multiple-interfaces/m-p/3911818#M616206</guid>
      <dc:creator>alextomko</dc:creator>
      <dc:date>2019-08-21T17:58:20Z</dc:date>
    </item>
  </channel>
</rss>

