<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752250#M8801</link>
    <description>I do not understand the question nor what info you are looking for and why? Can you expand more on the scenario please?</description>
    <pubDate>Sat, 24 Nov 2018 23:42:51 GMT</pubDate>
    <dc:creator>Steven Williams</dc:creator>
    <dc:date>2018-11-24T23:42:51Z</dc:date>
    <item>
      <title>ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3751460#M8797</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I currently have an ASA that has a default route out to&amp;nbsp;a service provider (extranet with RFC1918 addresses plus some limited RIPE addresses).&amp;nbsp; The network will be changing in the future and I need to swing that default route elsewhere.&amp;nbsp; The RIPE addresses are easy to handle but the RIPE addresses are not, as they are used privately and not routable on the Internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a low-level way&amp;nbsp;I can query the ASA to see what foreign destination IP's it has received a packet for, and evaluated to match the default route?&amp;nbsp; Ie, is the routing lookup cached for performance and query-able somehow?&amp;nbsp; Is it exposed in some kind of debugs or through ASP tables?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatively, the ASAs are connected to a 6500, 3850 and Nexus 7k so any options on those platforms that may help?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Stuart&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3751460#M8797</guid>
      <dc:creator>Stuart Patton</dc:creator>
      <dc:date>2020-02-21T16:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3751566#M8799</link>
      <description>&lt;P&gt;I recomment you to perform a SPAN or RSPAN (if necessary) on your switches, this way you will have the storage of that traffic.&lt;BR /&gt;After this you can analyze to collect the information that is needed.&lt;/P&gt;
&lt;P&gt;As you are asking for a solution in ASA, you can do the Morror in the ASA itself (although I think it's best to do it on the Switch because it has more ports available).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;SPAN configuration example in ASA:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa# conf t&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# int eth0/0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-if)# switchport monitor eth0/1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 16:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3751566#M8799</guid>
      <dc:creator>Nelson Neto</dc:creator>
      <dc:date>2018-11-22T16:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752128#M8800</link>
      <description>&lt;P&gt;I dont fully undertsand the issue, but ASA;s do not function the same way as routers, in the way an ASA matches the ingress interface and requires the response to egress the same interface. so you can have two default gateways if you want, with different admin distances working at the same time on two different interfaces. I am not sure if this is gonna help you but its worth looking into.&lt;/P&gt;</description>
      <pubDate>Sat, 24 Nov 2018 11:05:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752128#M8800</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-11-24T11:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752250#M8801</link>
      <description>I do not understand the question nor what info you are looking for and why? Can you expand more on the scenario please?</description>
      <pubDate>Sat, 24 Nov 2018 23:42:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752250#M8801</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2018-11-24T23:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752636#M8863</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/321173"&gt;@Steven Williams&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;I do not understand the question nor what info you are looking for and why? Can you expand more on the scenario please?&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;As I put above.&amp;nbsp; My ASA has a default route to an extranet (the service provider doesn't offer any dynamic addressing) that uses a mixture of both RFC1918 and RIPE addresses.&amp;nbsp; I have a requirement to put a default route elsewhere on my network.&amp;nbsp; Therefore, I want to remove the change the default route on the ASA that currently points outwards to point inwards.&amp;nbsp; I can't do this without breaking the service because I don't know what RIPE addresses are used on the extranet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my question is, is there any way I can query the ASA to find what foreign addresses it's routed packets to that have matched the default route?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 10:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752636#M8863</guid>
      <dc:creator>Stuart Patton</dc:creator>
      <dc:date>2018-11-26T10:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752674#M8864</link>
      <description>&lt;P&gt;You can't query the ASA to tell you every remote destination it has ever routed to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can tell the ASA to "show connections" put that only gives you a point in time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can turn up your syslog sensitivity to log every tcp connection and udp flow and gather all that up; but that approach would quickly become unwieldy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For what it's worth, I have seen hundreds of ASA installations and never have i seen somebody put the default route on the "inside". We often put a catch all inside route for all RFC 1918 addresses (10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16). With that in place, if you have any more specific private addresses on the outside interface they would take precedence.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Nov 2018 11:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3752674#M8864</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-11-26T11:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3755370#M8865</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can turn up your syslog sensitivity to log every tcp connection and udp flow and gather all that up; but that approach would quickly become unwieldy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Ok, so I've taken a change of approach and now investigating using a searchable syslog server to track the flows but have run into a different problem.&amp;nbsp; Hypothetically, let's say I have a web server behind an ASA with IP address 192.168.1.1 and I allow access from anywhere to the web server.&amp;nbsp; I know some but not all of the IP addresses accessing the server (eg clients in 10.1.1.0/24).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question: If I put a specific access rule in permitting 10.1.1.0/24 to 192.168.1.1 with logging disabled followed by a less specific rule of any to 192.168.1.1 with logging enabled, would/should this approach work?&amp;nbsp; As I identify clients accessing my web server, I can add them to the first ACE to prevent logging.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm only interested in message 302014 (teardowns) so I can see whether they are FINs, resets or SYN timeouts etc, so the config looks like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp object-group KNOWN_SOURCES host 192.168.1.1 eq http log disable&lt;BR /&gt;access-list outside_access_in extended permit any host 192.168.1.1 eq http&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging enable&lt;BR /&gt;logging list Syslog_events message 302014&lt;BR /&gt;logging trap Syslog_events&lt;BR /&gt;logging host management a.b.c.d&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so, then something is not right because I'm still seeing events logged against the ACE's with logging disabled.&amp;nbsp; Have I missed something?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Stuart&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 18:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3755370#M8865</guid>
      <dc:creator>Stuart Patton</dc:creator>
      <dc:date>2018-11-29T18:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3755588#M8866</link>
      <description>&lt;P&gt;I would route using 3 sets of static routes on your ASA:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1-summary of all your internal subnets (point to your core)&lt;/P&gt;
&lt;P&gt;2-summarize RFC 1918 and point to extranet&lt;/P&gt;
&lt;P&gt;3-default route, pointing back inward (to whatever ISP RTR you have)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Nov 2018 02:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3755588#M8866</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-11-30T02:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-routing/m-p/3755680#M8867</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/322101"&gt;@Dennis Mink&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I would route using 3 sets of static routes on your ASA:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1-summary of all your internal subnets (point to your core)&lt;/P&gt;
&lt;P&gt;2-summarize RFC 1918 and point to extranet&lt;/P&gt;
&lt;P&gt;3-default route, pointing back inward (to whatever ISP RTR you have)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;That's my problem though...there are some RIPE ranges being used as though they are RFC1918 so if I don't work out what they are and route to the extranet, I will lose access to those services.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Nov 2018 09:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-routing/m-p/3755680#M8867</guid>
      <dc:creator>Stuart Patton</dc:creator>
      <dc:date>2018-11-30T09:15:49Z</dc:date>
    </item>
  </channel>
</rss>

