<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PBR On Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755120#M8696</link>
    <description>&lt;P&gt;&lt;STRONG&gt;They are on same subnet and has following config but does not work on the ASA&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;access-list Test-ACL&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;extended permit ip any object-group Test&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE&gt;route-map Test-Routemap permit 10
 match ip address Test-ACL
 set ip default next-hop 192.168.1.3 (192.168.1.3 is the R1 where backup internet is connected)&lt;BR /&gt;&lt;BR /&gt;assume 192.168.1.1 is core switch and 192.168.1.2 is firewall&lt;BR /&gt;&lt;BR /&gt;if I do a traceroute from R1 to address where I want to go, its routing out locally through backup internet so i know that circuit works&lt;BR /&gt;is there anything that i am missing?&lt;/PRE&gt;
&lt;PRE&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just did a packet tracer and see its being denied as second phase as Access-List dropped&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Test(config-pmap-c)# packet-tracer input inside tcp&amp;nbsp;192.168.1.100 80 13.67.180.4&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: PBR-LOOKUP&lt;BR /&gt;Subtype: policy-route&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;route-map&amp;nbsp;Test-Routemap permit 10&lt;BR /&gt; match ip next-hop Test&lt;BR /&gt; set ip next-hop 192.168.1.3&lt;BR /&gt;Additional Information:&lt;BR /&gt; Matched route-map Test-routemap&amp;nbsp;sequence 10, permit&lt;BR /&gt; Found next-hop 192.168.1.3 using egress ifc inside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f90370a9f90, priority=111, domain=permit, deny=true&lt;BR /&gt; hits=32401, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=inside&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Nov 2018 14:22:31 GMT</pubDate>
    <dc:creator>NetworkGuy!</dc:creator>
    <dc:date>2018-11-29T14:22:31Z</dc:date>
    <item>
      <title>PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755045#M8639</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have the following topology&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; |&lt;/P&gt;
&lt;P&gt;Cisco ASA&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; |&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Core Switch------------Router1----Backup Internet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All&amp;nbsp; my traffic goes out through Cisco ASA but I want only certain traffic (for example) telnet traffic to go through backup Internet. I cannot assign PBR on the Core switch as it needs certain SDM version which I cant do it now&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am trying to do this on the Cisco ASA using ACL and matching that to a PBR to setip next hop as the Router1 - so basically traffic goes from Core Switch to Cisco ASA and hairpains back to R1 - will this work? (Cisco ASA and R1 and Cisco Switch run routing protocol so know about each other)&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:31:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755045#M8639</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2020-02-21T16:31:20Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755090#M8640</link>
      <description>&lt;P&gt;Hi, yes should work if Router 1 and ASA are in the same IP subnet.&lt;/P&gt;
&lt;P&gt;If Router 1 and ASA are in a different network the ASA will not be able to find the next-hop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find a configuration example of PBR on the firewall at this link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/cli/general/asa-94-general-config/route-policy-based.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa94/config-guides/cli/general/asa-94-general-config/route-policy-based.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 12:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755090#M8640</guid>
      <dc:creator>Daniele Giordano</dc:creator>
      <dc:date>2018-11-29T12:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755120#M8696</link>
      <description>&lt;P&gt;&lt;STRONG&gt;They are on same subnet and has following config but does not work on the ASA&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;SPAN&gt;access-list Test-ACL&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;extended permit ip any object-group Test&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;PRE&gt;route-map Test-Routemap permit 10
 match ip address Test-ACL
 set ip default next-hop 192.168.1.3 (192.168.1.3 is the R1 where backup internet is connected)&lt;BR /&gt;&lt;BR /&gt;assume 192.168.1.1 is core switch and 192.168.1.2 is firewall&lt;BR /&gt;&lt;BR /&gt;if I do a traceroute from R1 to address where I want to go, its routing out locally through backup internet so i know that circuit works&lt;BR /&gt;is there anything that i am missing?&lt;/PRE&gt;
&lt;PRE&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just did a packet tracer and see its being denied as second phase as Access-List dropped&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Test(config-pmap-c)# packet-tracer input inside tcp&amp;nbsp;192.168.1.100 80 13.67.180.4&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: PBR-LOOKUP&lt;BR /&gt;Subtype: policy-route&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;route-map&amp;nbsp;Test-Routemap permit 10&lt;BR /&gt; match ip next-hop Test&lt;BR /&gt; set ip next-hop 192.168.1.3&lt;BR /&gt;Additional Information:&lt;BR /&gt; Matched route-map Test-routemap&amp;nbsp;sequence 10, permit&lt;BR /&gt; Found next-hop 192.168.1.3 using egress ifc inside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x7f90370a9f90, priority=111, domain=permit, deny=true&lt;BR /&gt; hits=32401, user_data=0x0, cs_id=0x0, flags=0x4000, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt; input_ifc=inside, output_ifc=inside&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755120#M8696</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2018-11-29T14:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755159#M8697</link>
      <description>&lt;P&gt;Where is applied the route map?&lt;/P&gt;
&lt;P&gt;Is in the NAT operations?&lt;/P&gt;
&lt;P&gt;The packets must be routed without NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the order of operations of the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755159#M8697</guid>
      <dc:creator>Daniele Giordano</dc:creator>
      <dc:date>2018-11-29T14:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755173#M8698</link>
      <description>&lt;P&gt;route-map applied on inside direction - it shouldnt NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;its dropping as default ACL drop - implicit deny&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:47:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755173#M8698</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2018-11-29T14:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755207#M8699</link>
      <description>&lt;P&gt;ok found it!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it needs the following enabled (same security traffic)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;once enabled it seems to be ok&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:17:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755207#M8699</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2018-11-29T15:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755214#M8700</link>
      <description>&lt;P&gt;Yes, you have right.&lt;/P&gt;&lt;P&gt;It's necessary for the&amp;nbsp;hairpinning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 15:21:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755214#M8700</guid>
      <dc:creator>Daniele Giordano</dc:creator>
      <dc:date>2018-11-29T15:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: PBR On Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755712#M8701</link>
      <description>&lt;P&gt;The traffic seems to be routing via the backup circuit however&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get Deny TCP no connection from 192.168.1.x to x.x.x.x flags RST on interface inside, any thoughts?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Nov 2018 10:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pbr-on-cisco-asa/m-p/3755712#M8701</guid>
      <dc:creator>NetworkGuy!</dc:creator>
      <dc:date>2018-11-30T10:13:07Z</dc:date>
    </item>
  </channel>
</rss>

