02-01-2018 05:10 AM - edited 03-08-2019 01:39 PM
We had some routing issues and during our troubleshooting, we found that our wireless guest network is routing over our primary outbound interface. We have a backup outbound interface configured on the ASA, there are two outbound interfaces. We would like to change the routing for the wireless guest network to go out our second outbound interface on the ASA. I believe using a route map should accomplish this? I am new to using route map and would like some direction on the configuration. I have wrote, what I think would do the routing to the second outbound interface below. Any assistance would be greatly appreciated.
Configuration template
(Config#) route-map guest_network permit 10
(Config-route-map#) match IP address guest_network
(Config-route-map#) set interface Outside-2
(Config-if) set ip next-hop x.x.x.x
access-list guest_network extended permit IP x.x.x.0 255.255.255.0 any
access-list guest_network extended permit IP any any
02-01-2018 06:38 AM
There are a few things about this to consider:
1) do you have a version of code on the ASA that supports route map?
2) in the route map you do not need to set both the interface and the next hop. I would suggest using only set next hop.
3) if your ACL includes permit ip any any then all traffic will match and all traffic will be sent out this interface and your primary interface will have no outbound traffic.
4) when this is implanted all traffic from guest will go through the secondary interface. Is there any circumstance where traffic from guest network might need to go into your network? If so then there needs to be logic in your ACL to exempt that traffic.
HTH
Rick
02-01-2018 07:34 AM
02-01-2018 08:03 AM
The route map looks better. Yes the IP for next-hop is the address of the ISP.
HTH
Rick
02-05-2018 08:12 AM
Hi,
I configured the route map without any success, it actually stopped the guest networking from routing and had to back out the changes. I have appended everything in the running config for the guest network, hopefully you can identify why the routing didn't forward the guest network traffic out the secondary interface (OUTSIDE-2). I did find the guest network utilizing dynamic nat, I changed the statement to the outside-2 interface still no success. Any suggestions will help greatly.
Configuration on FW for guest network
object network Company-Guest
subnet 10.253.30.0 255.255.255.0
access-list ACL-OUTSIDE-IN extended permit ip any 10.x.x.0 255.255.255.0
access-list ACL-GUEST-IN extended deny ip any 10.x.x.0 255.255.255.0
interface GigabitEthernet0/5.30
vlan 30
nameif Company-Guest
security-level 10
ip address 10.x.x.1 255.255.255.0
mtu Company-Guest 1500
object network Company-Guest
nat (Company-Guest,OUTSIDE-1) dynamic interface
dhcpd address 10.x.x.2-10.x.x.254 Company-Guest
dhcpd dns 8.8.8.8 interface Company-Guest
dhcpd enable Company-Guest
object network obj_any
nat (INSIDE,OUTSIDE-1) dynamic interface
interface GigabitEthernet0/1
description OUTSIDE COMCAST ISP INTERNET
speed 1000
duplex full
nameif OUTSIDE-2
security-level 0
ip address 50.x.x.29 255.255.255.240 standby 50.x.x.28
route OUTSIDE-2 0.0.0.0 0.0.0.0 50.x.x.30 254
mtu OUTSIDE-2 1500
icmp permit any echo OUTSIDE-2
icmp permit any echo-reply OUTSIDE-2
Configuration changes that didn't work to route the traffic out the OUTSIDE-2 interface
(Config#) route-map Company_Guest permit 10
(Config-route-map#) match IP address Company_Guest
(Config-route-map#) set ip next-hop 50.x.x.30
(Config)# interaface gi0/5.30 (Dedicated guest interaface)
(Config-if) policy-route route-map Company_Guest
access-list Company_Guest extended permit IP 10.x.x.0 255.255.255.0 any
object network Company_Guest
nat (Company_Guest, OUTSIDE-2) dynamic interaface
02-05-2018 09:02 AM
The first thing I will say is that I understand the desire to mask sensitive information. So I understand using 50.x.x.29. But why mask in 10.x.x.0? What is sensitive about that? And it does make it difficult to discern whether these parts of the config are correct.
You show this access list
access-list ACL-GUEST-IN extended deny ip any 10.x.x.0 255.255.255.0
I can not tell what it is doing. And you do not show where it is applied. Can you clarify this?
I can understand why you are doing nat for guest this way in normal operation. Can you clarify that this was removed when you attempted the route map for PBR
object network Company-Guest
nat (Company-Guest,OUTSIDE-1) dynamic interface
I question whether this route statement is needed
route OUTSIDE-2 0.0.0.0 0.0.0.0 50.x.x.30 254
You did not use the correct object name in the nat to use with PBR (note the difference between hyphen and underscore)
object network Company_Guest
nat (Company_Guest, OUTSIDE-2) dynamic interaface
HTH
Rick
02-05-2018 09:59 AM
02-05-2018 01:37 PM
Thanks for the update. You say that the "nat (Company-Guest, OUTSIDE-1)" was replaced and then say that it was no removed. I am not sure how to interpret that. I would suggest that as you attempt to implement the route map that this nat not be in the config.
Good to know that the ACL ACL-GUEST-IN is not used anywhere.
Yes the policy route command goes on the interface where the traffic is received and does not go on the outbound interface. (it seems intuitive that the policy route might go on the interface where traffic will go, but that is not how it works. I find this to be one of the most frequent issues when implementing PBR)
Your route map uses NACO_Guest in the match statement but you have not shown us that ACL.
From what I see it now looks pretty good. Have you tested it yet?
HTH
Rick
02-06-2018 05:17 AM
02-06-2018 11:21 AM
I have these comments
1) in earlier post you have an ACL applied in for interface OUTSIDE-2 (which I am not sure that you needed). Now you have an ACL applied out. You do not need this. Any traffic originated from an interface with higher security level (like your guest) to an interface with lower security level (like your OUTSIDE-2) is automatically permitted (and response traffic from outside is permitted) without needing an ACL.
access-group NACO-Guest-ACL out interface OUTSIDE-2
2) the nat looks ok, I would just repeat my advice that when you implement PBR that you make sure that the original nat for guest (using OUTSIDE-1) is removed.
3) in your testing you have this
(config-network-object)# nat (inside,outside) static 40.x.x.x
but it uses an interface name that does not match interfaces in previous posts.
4) your post continues to use masking of what are already private addresses such as 10.x.x.x so it is hard to know what you are doing in your test and whether the results of your test show success or not.
HTH
Rick
02-06-2018 11:29 AM
Hi Richard,
There are two configurations, one for the guest network and another for adding a new host with static nat. You are referencing the second configuration, I draw a line separating the two configs.
Quintin
02-06-2018 02:19 PM
Quintin
I understand that there are two configs. I assumed that both configs were for the ASA that we have been discussing. Is the second config for a different ASA?
My comments 1and 2 are related to the first config (for guest access) and I believe that both are still applicable. My comment 3 is related to the config for new host. If this is for a different ASA then it perhaps is not applicable. If it is for the same ASA then it is applicable. My comment 4 is applicable to both configs.
HTH
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide