<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA and policy based routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793514#M7297</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/route-policy-based.html#ID-2182-00000032" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/route-policy-based.html#ID-2182-00000032&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Yes, you could configure PBR on ASA to route specific traffic to the standby router. But don't forget to add IP SLA to monitor the availability of the standby router's address. In short, the configuration would be like:&lt;BR /&gt;&lt;BR /&gt;sla monitor 1&lt;BR /&gt;type echo protocol ipIcmpEcho x.x.x.72 interface outside&lt;BR /&gt;num-packets&lt;BR /&gt;timeout&lt;BR /&gt;frequency&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;&lt;BR /&gt;route-map ISP1 permit 10&lt;BR /&gt;match &amp;lt;interesting traffic here&amp;gt;&lt;BR /&gt;set ip next-hop verify-availability x.x.x.72 1 track 1&lt;BR /&gt;set ip next-hop x.x.x.65</description>
    <pubDate>Sat, 02 Feb 2019 17:21:56 GMT</pubDate>
    <dc:creator>ngkin2010</dc:creator>
    <dc:date>2019-02-02T17:21:56Z</dc:date>
    <item>
      <title>ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793512#M7295</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have 2 x 5516x ASAs in active/standby and their outside interfaces go into a stack of 2 x 3750s.&amp;nbsp; In this switch we also have our ISP routers which are setup as a HSRP.&amp;nbsp; The active router is on 100MB line and the standby router is on 30MB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Out 100MB line is quite heavily used and I was wondering if it's possible to router certain traffic to the standby router (physical IP) by using policy based routing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've only every seen this on routers and we don't manage our routers, our ISP do and will charge for any changes.&amp;nbsp; I thought maybe the ASAs could do it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a test I was wondering if I can just route my laptop IP through the backup router for traffic destined for the internet on port 80 via the ASA and policy based routing on it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our current route for all users for http/https uses the 0.0.0.0 0.0.0.0 x.x.x.65 which is the HSRP public IP of the routers.&amp;nbsp; THe primary router is on .71 and standby on .72.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advanced for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:44:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793512#M7295</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2020-02-21T16:44:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793514#M7297</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/route-policy-based.html#ID-2182-00000032" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa99/configuration/general/asa-99-general-config/route-policy-based.html#ID-2182-00000032&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Yes, you could configure PBR on ASA to route specific traffic to the standby router. But don't forget to add IP SLA to monitor the availability of the standby router's address. In short, the configuration would be like:&lt;BR /&gt;&lt;BR /&gt;sla monitor 1&lt;BR /&gt;type echo protocol ipIcmpEcho x.x.x.72 interface outside&lt;BR /&gt;num-packets&lt;BR /&gt;timeout&lt;BR /&gt;frequency&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;&lt;BR /&gt;route-map ISP1 permit 10&lt;BR /&gt;match &amp;lt;interesting traffic here&amp;gt;&lt;BR /&gt;set ip next-hop verify-availability x.x.x.72 1 track 1&lt;BR /&gt;set ip next-hop x.x.x.65</description>
      <pubDate>Sat, 02 Feb 2019 17:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793514#M7297</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-02T17:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793519#M7299</link>
      <description>&lt;P&gt;Thanks, so the IP SLA will monitor if the standby route is available for this policy based route and if not revert to the using the primary router?&lt;/P&gt;</description>
      <pubDate>Sat, 02 Feb 2019 17:54:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793519#M7299</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-02T17:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793523#M7302</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Yes. Don't forget to apply the route-map to your interface.</description>
      <pubDate>Sat, 02 Feb 2019 18:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793523#M7302</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-02T18:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793654#M7303</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have an example of the route map and does it go on the inside or outside interface?&lt;/P&gt;</description>
      <pubDate>Sun, 03 Feb 2019 09:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793654#M7303</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-03T09:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793668#M7304</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;sla monitor 1&lt;BR /&gt;type echo protocol ipIcmpEcho x.x.x.72 interface outside&lt;BR /&gt;num-packets&lt;BR /&gt;timeout&lt;BR /&gt;frequency&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;track 1 rtr 1 reachability&lt;BR /&gt;&lt;BR /&gt;access-list interesting_traffic exteneded permit tcp 192.168.0.0 255.255.255.0 any eq http&lt;BR /&gt;access-list interesting_traffic exteneded permit tcp 192.168.0.0 255.255.255.0 any eq https&lt;BR /&gt;&lt;BR /&gt;route-map ISP1 permit 10&lt;BR /&gt;match ip address interesting_traffic&lt;BR /&gt;set ip next-hop verify-availability x.x.x.72 1 track 1&lt;BR /&gt;set ip next-hop x.x.x.65&lt;BR /&gt;&lt;BR /&gt;interface Gi0/1&lt;BR /&gt;policy-route route-map ISP1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Note: you only need to apply the route-map on the ingress interface. (E.g. inside interface)</description>
      <pubDate>Sun, 03 Feb 2019 10:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3793668#M7304</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-03T10:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794041#M7305</link>
      <description>&lt;P&gt;Thanks so much for your reply as I'm almost ready.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you just proof&amp;nbsp; read this before I apply. I want to just test this against my laptop IP first before applying to a subnet:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This public IPs are slightly different and now I'm in the office I have been able to check what they end in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA interfaces are:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.66 255.255.255.224 standby x.x.x.67&lt;BR /&gt;ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.x.10.1 255.255.255.0 standby 172.x.10.2&lt;BR /&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ISP routers&lt;/STRONG&gt;&lt;BR /&gt;Standby Router x.x.x.75&lt;BR /&gt;Primary Router x.x.x.74&lt;BR /&gt;HSRP x.x.x.65&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;172.x.140.37 is me&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IP SLA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is to track the standby router is reachable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;BR /&gt;type echo protocol ipIcmpEcho x.x.x.75 interface outside&lt;BR /&gt;num-packets&lt;BR /&gt;timeout&lt;BR /&gt;frequency&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This it the ACL the policy will only look at and is for my workstation and on tcp/80 and tcp/443 traffic only&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list interesting_traffic extended permit tcp host 172.x.140.37 any eq http&lt;BR /&gt;access-list interesting_traffic extended permit tcp host 172.x.140.37 any eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Route Map&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This route map will work only if the traffic is matching the ACLs called '&lt;SPAN&gt;interesting_traffic' and if so set the next hop to the standby router of x.x.x.75, but only if it's reachable (track 1) and if it is not then it will fall back to x.x.x.65 which is the HSRP virtual IP of the 2 ISP routers.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route-map ISP1 permit 10&lt;BR /&gt;match ip address interesting_traffic&lt;BR /&gt;set ip next-hop verify-availability x.x.x.75 1 track 1&lt;BR /&gt;set ip next-hop x.x.x.65&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Apply to interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The above will only work once applied and to do this it has to be applied to the 'inside' interface and not the 'outside'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Gig1/2&lt;BR /&gt;policy-route route-map ISP1&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 09:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794041#M7305</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-04T09:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794120#M7306</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;It look good to me.&lt;BR /&gt;&lt;BR /&gt;But it's highly recommended to build a lab on GNS3 or real lab environment before deploy it into production.&lt;BR /&gt;Especially you can't just shutdown the x.x.x.75 to verify the failover in production environment, right?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 04 Feb 2019 11:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794120#M7306</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-04T11:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794141#M7307</link>
      <description>&lt;P&gt;Funny you say that I am using GNS3 for this.&amp;nbsp; Will let you know how it goes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I use GNS3 all the time, best tool ever, especially for my exams etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what I will do, however I'm not sure if I should add a NAT and connect to my real work subnet, or somehow put a simple device beyond the ISP routers to test the policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GNS3lab1.PNG" style="width: 692px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29277i573B182A18CF907A/image-size/large?v=v2&amp;amp;px=999" role="button" title="GNS3lab1.PNG" alt="GNS3lab1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 12:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794141#M7307</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-04T12:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794144#M7308</link>
      <description>&lt;P&gt;Oh and what useful show commands can I use to check the policy is working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess I can also capture traffic on one of the links to the routers and watch in wireshark.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 12:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794144#M7308</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-04T12:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794292#M7309</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You could just place a router with loopback interface to simulate the Internet Address (E.g. 8.8.8.8). For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="diag2.PNG" style="width: 628px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29286i596E1B4C7AB04F22/image-size/large?v=v2&amp;amp;px=999" role="button" title="diag2.PNG" alt="diag2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 14:57:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794292#M7309</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-04T14:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794297#M7310</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;You could use "show route-map" to check the availability of next-hop, as well as the number packets hit this PBR.</description>
      <pubDate>Mon, 04 Feb 2019 15:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794297#M7310</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-04T15:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794339#M7311</link>
      <description>&lt;P&gt;GNS3 is all running and the pings are hitting the remote device, but still taking the active HSRP path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The route map is up too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GNS3lab1-3.PNG" style="width: 606px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29297i032FFB3A32DA543A/image-size/large?v=v2&amp;amp;px=999" role="button" title="GNS3lab1-3.PNG" alt="GNS3lab1-3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had to reboot GNS3 and ping around to get things working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I ping from the PC on the inside I see it route via the active HSRP .74 IP and not .75.&amp;nbsp; What I do is run Wireshark on the link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Because the remote device in GNS3 is a vPCS I have used this ACL, maybe it's not recognised?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list aw_interesting_traffic extended permit icmp host 172.x.x.37 any echo&lt;BR /&gt;access-list aw_interesting_traffic extended permit icmp host 172.x.x.37 any echo-reply&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 19:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3794339#M7311</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-06T19:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3795888#M7312</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Do you see any hit count on your access list? Can you enable "debug policy-route" to have more detailed information?</description>
      <pubDate>Wed, 06 Feb 2019 13:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3795888#M7312</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-06T13:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3795905#M7313</link>
      <description>I am curious why it would be forwarded via .74&lt;BR /&gt;&lt;BR /&gt;What is the default gateway you have configured on inside PC?&lt;BR /&gt;&lt;BR /&gt;If the route-map is hit, it would either via .65 (HSRP's MAC address) or .75 (Standby Router's MAC Address)..&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Feb 2019 13:28:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3795905#M7313</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-06T13:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796153#M7314</link>
      <description>&lt;P&gt;The inside PC's gateway is the SVI of the switch for it's VLAN which then routes to the inside interface of the ASA.&amp;nbsp; It then seems to got .65 (HSRP) then .74 (Active router).&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 17:48:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796153#M7314</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-06T17:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796159#M7315</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Sorry that I asked a wrong question, it isn't relevant to the default gateway... what I should ask is the next hop address on your switch. That's is .65, you answered.&lt;BR /&gt;&lt;BR /&gt;As mentioned, could you check if there is any hit for the access list? And could you try with the debug command to check with the PBR?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 06 Feb 2019 17:57:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796159#M7315</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-06T17:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796202#M7316</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I have also created a GNS3 lab, and here is the full configuration for your reference.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 19:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796202#M7316</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-06T19:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796212#M7317</link>
      <description>&lt;P&gt;I will grab some debugs, but the switch beyond the ASA is just a L2 switch all in VLAN1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;.66 the (ASA) next hop is .65 (the routers HSRP), but the policy maps next hop is set to .65.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="routemap1.PNG" style="width: 723px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/29431i3417FDF91BE04436/image-size/large?v=v2&amp;amp;px=999" role="button" title="routemap1.PNG" alt="routemap1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The primary router is .74 and standby is .75 which is where I want to icmp/http/https to route to.&lt;/P&gt;&lt;P&gt;So what does this route map do (sorry not used one before as you can probably tell)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route-map ISP1 permit 10&lt;/P&gt;&lt;P&gt;match ip aw_address interesting_traffic&lt;/P&gt;&lt;P&gt;set ip next-hop verify-availability x.x.x.75 1 track 1&lt;/P&gt;&lt;P&gt;set ip next-hop x.x.x.65&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way I read it is, if traffic in ACL '&lt;SPAN&gt;aw_address interesting_traffic' is matched then check the standby router (.75) is up and if it is route to .65 (the HSRP).&amp;nbsp; Shouldn't the next hop be .75?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 19:34:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796212#M7317</guid>
      <dc:creator>Andrew White</dc:creator>
      <dc:date>2019-02-06T19:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and policy based routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796454#M7318</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Yes, your interpretation is correct.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;set {ip | ipv6} next-hop&lt;/STRONG&gt; &lt;EM&gt;ipv4_or_ipv6_address&lt;/EM&gt;&lt;BR /&gt;-- You can configure multiple next-hop IP addresses in which case they are evaluated in the specified order until a valid routable next-hop IP address is found.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;set ip next-hop verify-availability&lt;/STRONG&gt; &lt;EM&gt;next-hop-address sequence_number&lt;/EM&gt; &lt;STRONG&gt;track&lt;/STRONG&gt; &lt;EM&gt;object&lt;/EM&gt;&lt;BR /&gt;-- You can configure an SLA monitor tracking object to verify the reachability of the next-hop.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When &lt;STRONG&gt;multiple set actions are configured&lt;/STRONG&gt;, the ASA evaluates them in the following order:s&lt;STRONG&gt;et ip next-hop verify-availability&lt;/STRONG&gt;;&lt;STRONG&gt;set ip next-hop&lt;/STRONG&gt;;set ip next-hop recursive;set interface; set ip default next-hop;set default interface.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The more detailed information can be found on:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/route-policy-based.html#ID-2182-00000032" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/route-policy-based.html#ID-2182-00000032&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 03:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-policy-based-routing/m-p/3796454#M7318</guid>
      <dc:creator>ngkin2010</dc:creator>
      <dc:date>2019-02-07T03:14:32Z</dc:date>
    </item>
  </channel>
</rss>

