The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCLI Book 1: Cisco ASA Series General Operations CLI Configuration Guide, 9.14
This chapter describes how to configure the ASA to support policy based routing (PBR). The following sections describe policy based routing, guidelines for PBR, and configuration for PBR.
Traditional routing is destination-based, meaning packets are routed based on destination IP address. However, it is difficult to change the routing of specific traffic in a destination-based routing system. With Policy Based Routing (PBR), you can define routing based on criteria other than destination network—PBR lets you route traffic based on source address, source port, destination address, destination port, protocol, or a combination of these.
Policy Based Routing:
Policy Based Routing can implement QoS by classifying and marking traffic at the network edge, and then using PBR throughout the network to route marked traffic along a specific path. This permits routing of packets originating from different sources to different networks, even when the destinations are the same, and it can be useful when interconnecting several private networks.
Consider a company that has two links between locations: one a high-bandwidth, low-delay expensive link, and the other a low-bandwidth, higher-delay, less-expensive link. While using traditional routing protocols, the higher-bandwidth link would get most, if not all, of the traffic sent across it based on the metric savings obtained by the bandwidth and/or delay (using EIGRP or OSPF) characteristics of the link. PBR allows you to route higher priority traffic over the high-bandwidth/low-delay link, while sending all other traffic over the low-bandwidth/high-delay link.
Some applications of policy based routing are:
In this topology, traffic from HR network & Mgmt network can be configured to go through ISP1 and traffic from Eng network can be configured to go through ISP2. Thus, policy based routing enables the network administrators to provide equal-access and source-sensitive routing, as shown here.
By tagging packets with policy based routing, network administrators can classify the network traffic at the perimeter of the network for various classes of service and then implementing those classes of service in the core of the network using priority, custom or weighted fair queuing (as shown in the figure below). This setup improves network performance by eliminating the need to classify the traffic explicitly at each WAN interface in the core of backbone network.
An organization can direct the bulk traffic associated with a specific activity to use a higher-bandwidth high-cost link for a short time and continues basic connectivity over a lower-bandwidth low-cost link for interactive traffic by defining the topology, as show here.
In addition to the dynamic load-sharing capabilities offered by ECMP load balancing, network administrators can now implement policies to distribute traffic among multiple paths based on the traffic characteristics.
As an example, in the topology depicted in the Equal-Access Source Sensitive Routing scenario, an administrator can configure policy based routing to load share the traffic from HR network through ISP1 and traffic from Eng network through ISP2.
The ASA uses ACLs to match traffic and then perform routing actions on the traffic. Specifically, you configure a route map that specifies an ACL for matching, and then you specify one or more actions for that traffic. Finally, you associate the route map with an interface where you want to apply PBR on all incoming traffic.
Before proceeding with configuration, ensure that the ingress and egress traffic of each session flows through the same ISP-facing interface to avoid unexpected behavior caused by asymetirc routing, specifically when NAT and VPN are in use.
Supported only in routed firewall mode. Transparent firewall mode is not supported.
Since the ASA performs routing on a per-flow basis, policy routing is applied on the first packet and the resulting routing decision is stored in the flow created for the packet. All subsequent packets belonging to the same connection simply match this flow and are routed appropriately.
Policy Based Routing is an ingress-only feature; that is, it is applied only to the first packet of a new incoming connection, at which time the egress interface for the forward leg of the connection is selected. Note that PBR will not be triggered if the incoming packet belongs to an existing connection, or if NAT is applied.
An embryonic connection is where the necessary handshake between source and destination has not been made.
When a new internal interface is added and a new VPN policy is created using a unique address pool, PBR is applied to the outside interface matching the source of the new client pool. Thus, PBR sends traffic from the client to the next hop on the new interface. However, PBR is not involved in the return traffic from a host that has not yet established a connection with the new internal interface routes to the client. Thus, the return traffic from the host to the VPN client, specifically, the VPN client response is dropped as there is no valid route. You must configure a weighted static route with a higher metric on the internal interface.
IPv6 is supported
A route map is comprised of one or more route-map statements. Each statement has a sequence number, as well as a permit or deny clause. Each route-map statement contains match and set commands. The match command denotes the match criteria to be applied on the packet. The set command denotes the action to be taken on the packet.
Define a standard or extended access-list:
access-list name extended permit | deny> protocol source_and_destination_arguments
ciscoasa(config)# access-list testacl extended permit ip 10.1.1.0 255.255.255.0 10.2.2.0 255.255.255.0
If you use a standard ACL, matching is done on the destination address only. If you use an extended ACL, you can match on source, destination, or both.
For the extended ACL, you can specify IPv4, IPv6, Identity Firewall, or Cisco TrustSec parameters. For complete syntax, see the ASA command reference.
Create a route map entry:
ciscoasa(config)# route-map testmap permit 12
Route map entries are read in order. You can identify the order using the sequence_number argument, or the ASA uses the order in which you add route map entries.
The ACL also includes its own permit and deny statements. For Permit/Permit matches between the route map and the ACL, the Policy Based Routing processing continues. For Permit/Deny matches, processing ends for this route map, and other route maps are checked. If the result is still Permit/Deny, then the regular routing table is used. For Deny/Deny matches, the Policy Based Routing processing continues.
When a route-map is configured without a permit or deny action and without a sequence-number, it by default will assume the action as permit and sequence-number as 10.
Define the match criteria to be applied using an access-list:
match ip address access-list_name [access-list_name. ]
ciscoasa(config-route-map)# match ip address testacl
Configure one or more set actions:
When multiple set actions are configured, the ASA evaluates them in the following order: set ip next-hop verify-availability; set ip next-hop; set ip next-hop recursive; set interface; set ip default next-hop; set default interface.
Configure an interface and enter interface configuration mode:
interface interface_id
ciscoasa(config)# interface GigabitEthernet0/0
Configure policy based routing for through-the-box traffic:
policy-route route-map route_map_name
ciscoasa(config-if)# policy-route route-map testmap
To remove an existing Policy Based Routing map, simply enter the no form of this command.
ciscoasa(config-if)# no policy-route route-map testmap
The following sections show examples for route map configuration, policy based routing, and a specific example of PBR in action.
In the following example, since no action and sequence is specified, an implicit action of permit and a sequence number of 10 is assumed:
ciscoasa(config)# route-map testmap
In the following example, since no match criteria is specified, an implicit match 'any' is assumed:
ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# set ip next-hop 1.1.1.10
In this example, all traffic matching will be policy routed and forwarded through outside interface.
ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# match ip address ciscoasa(config-route-map)# set interface outside
In this example, since there are no interface or next-hop actions are configured, all traffic matching will have df bit and dscp fields modified as per configuration and are forwarding using normal routing.
ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# match ip address set ip df 1 set ip precedence af11
In the following example, all traffic matching is forwarded using next-hop 1.1.1.10, all traffic matching is forwarded using next-hop 2.1.1.10 and rest of the traffic is dropped. No "match" criteria implies an implicit match "any".
ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# match ip address ciscoasa(config-route-map)# set ip next-hop 1.1.1.10 ciscoasa(config)# route-map testmap permit 20 ciscoasa(config-route-map)# match ip address ciscoasa(config-route-map)# set ip next-hop 2.1.1.10 ciscoasa(config)# route-map testmap permit 30 ciscoasa(config-route-map)# set interface Null0
In the following example, the route-map evaluation will be such that (i) a route-map action permit and acl action permit will apply the set actions (ii) a route-map action deny and acl action permit will skip to normal route lookup (iii) a route-map action of permit/deny and acl action deny will continue with next route-map entry. When no next route-map entry available, we will fallback to normal route lookup.
ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# match ip address permit_acl_1 deny_acl_2 ciscoasa(config-route-map)# set ip next-hop 1.1.1.10 ciscoasa(config)# route-map testmap deny 20 ciscoasa(config-route-map)# match ip address permit_acl_3 deny_acl_4 ciscoasa(config-route-map)# set ip next-hop 2.1.1.10 ciscoasa(config)# route-map testmap permit 30 ciscoasa(config-route-map)# match ip address deny_acl_5 ciscoasa(config-route-map)# set interface outside
In the following example, when multiple set actions are configured, they are evaluated in the order mentioned above. Only when all options of a set action are evaluated and cannot be applied, the next set actions will be considered. This ordering will ensure that the most available and least distant next-hop will be tried first followed by next most available and least distant next-hop and so on.
ciscoasa(config)# route-map testmap permit 10 ciscoasa(config-route-map)# match ip address acl_1 ciscoasa(config-route-map)# set ip next-hop verify-availability 1.1.1.10 1 track 1 ciscoasa(config-route-map)# set ip next-hop verify-availability 1.1.1.11 2 track 2 ciscoasa(config-route-map)# set ip next-hop verify-availability 1.1.1.12 3 track 3 ciscoasa(config-route-map)# set ip next-hop 2.1.1.10 2.1.1.11 2.1.1.12 ciscoasa(config-route-map)# set ip next-hop recursive 3.1.1.10 ciscoasa(config-route-map)# set interface outside-1 outside-2 ciscoasa(config-route-map)# set ip default next-hop 4.1.1.10 4.1.1.11 ciscoasa(config-route-map)# set default interface Null0
This section describes the complete set of configuration required to configure PBR for the following scenario:
First, we need to configure interfaces.
ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# nameif inside ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# nameif outside-1 ciscoasa(config-if)# ip address 192.168.6.5 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/2 ciscoasa(config-if)# no shutdown ciscoasa(config-if)# nameif outside-2 ciscoasa(config-if)# ip address 172.16.7.6 255.255.255.0
Then, we need to configure an access-list for matching the traffic.
ciscoasa(config)# access-list acl-1 permit ip 10.1.0.0 255.255.0.0 ciscoasa(config)# access-list acl-2 permit ip 10.2.0.0 255.255.0.0
We need to configure a route-map by specifying the above access-list as match criteria along with the required set actions.
ciscoasa(config)# route-map equal-access permit 10 ciscoasa(config-route-map)# match ip address acl-1 ciscoasa(config-route-map)# set ip next-hop 192.168.6.6 ciscoasa(config)# route-map equal-access permit 20 ciscoasa(config-route-map)# match ip address acl-2 ciscoasa(config-route-map)# set ip next-hop 172.16.7.7 ciscoasa(config)# route-map equal-access permit 30 ciscoasa(config-route-map)# set ip interface Null0
Now, this route-map has to be attached to an interface.
ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# policy-route route-map equal-access
To display the policy routing configuration.
ciscoasa(config)# show policy-route Interface Route map GigabitEthernet0/0 equal-access
We will use this test setup to configure policy based routing with different match criteria and set actions to see how they are evaluated and applied.
First, we will start with the basic configuration for all the devices involved in the set-up. Here, A, B, C, and D represent ASA devices, and H1 and H2 represent IOS routers.
ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# security-level 100 ciscoasa(config-if)# ip address 10.1.1.60 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# no shut ciscoasa(config)# interface GigabitEthernet0/1.1 ciscoasa(config-if)# vlan 391 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 25.1.1.60 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/1.2 ciscoasa(config-if)# vlan 392 ciscoasa(config-if)# nameif dmz ciscoasa(config-if)# security-level 50 ciscoasa(config-if)# ip address 35.1.1.60 255.255.255.0
ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# no shut ciscoasa(config)# interface GigabitEthernet0/0.1 ciscoasa(config-if)# vlan 291 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 45.1.1.61 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# no shut ciscoasa(config)# interface GigabitEthernet0/1.1 ciscoasa(config-if)# vlan 391 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# security-level 100 ciscoasa(config-if)# ip address 25.1.1.61 255.255.255.0
ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# no shut ciscoasa(config)# interface GigabitEthernet0/0.2 ciscoasa(config-if)# vlan 292 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 55.1.1.61 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# no shut ciscoasa(config)# interface GigabitEthernet0/1.2 ciscoasa(config-if)# vlan 392 ciscoasa(config-if)# nameif inside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 35.1.1.61 255.255.255.0
ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# no shut ciscoasa(config) #interface GigabitEthernet0/0.1 ciscoasa(config-if)# vlan 291 ciscoasa(config-if)# nameif inside-1 ciscoasa(config-if)# security-level 100 ciscoasa(config-if)# ip address 45.1.1.62 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/0.2 ciscoasa(config-if)# vlan 292 ciscoasa(config-if)# nameif inside-2 ciscoasa(config-if)# security-level 100 ciscoasa(config-if)# ip address 55.1.1.62 255.255.255.0 ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# nameif outside ciscoasa(config-if)# security-level 0 ciscoasa(config-if)# ip address 65.1.1.60 255.255.255.0
ciscoasa(config)# interface Loopback1 ciscoasa(config-if)# ip address 15.1.1.100 255.255.255.255 ciscoasa(config-if)# interface Loopback2 ciscoasa(config-if)# ip address 15.1.1.101 255.255.255.255 ciscoasa(config)# ip route 0.0.0.0 0.0.0.0 10.1.1.60
ciscoasa(config)# interface GigabitEthernet0/1 ciscoasa(config-if)# ip address 65.1.1.100 255.255.255.0 ciscoasa(config-if)# ip route 15.1.1.0 255.255.255.0 65.1.1.60
We will configure PBR on ASA-A to route traffic sourced from H1.
ciscoasa(config-if)# access-list pbracl_1 extended permit ip host 15.1.1.100 any ciscoasa(config-if)# route-map testmap permit 10 ciscoasa(config-if)# match ip address pbracl_1 ciscoasa(config-if)# set ip next-hop 25.1.1.61 ciscoasa(config)# interface GigabitEthernet0/0 ciscoasa(config-if)# policy-route route-map testmap ciscoasa(config-if)# debug policy-route
H1: ping 65.1.1.100 repeat 1 source loopback1
pbr: policy based route lookup called for 15.1.1.100/44397 to 65.1.1.100/0 proto 1 sub_proto 8 received on interface inside pbr: First matching rule from ACL(2) pbr: route map testmap, sequence 10, permit; proceed with policy routing pbr: evaluating next-hop 25.1.1.61 pbr: policy based routing applied; egress_ifc = outside : next_hop = 25.1.1.61
The packet is forwarded as expected using the next-hop address in the route-map.
When a next-hop is configured, we do a lookup in input route table to identify a connected route to the configured next-hop and use the corresponding interface. The input route table for this example is shown here (with the matching route entry highlighted).
in 255.255.255.255 255.255.255.255 identity in 10.1.1.60 255.255.255.255 identity in 25.1.1.60 255.255.255.255 identity in 35.1.1.60 255.255.255.255 identity in 10.127.46.17 255.255.255.255 identity in 10.1.1.0 255.255.255.0 inside in 25.1.1.0 255.255.255.0 outside in 35.1.1.0 255.255.255.0 dmz
Next let's configure ASA-A to route packets from H1 loopback2 out of ASA-A dmz interface.
ciscoasa(config)# access-list pbracl_2 extended permit ip host 15.1.1.101 any ciscoasa(config)# route-map testmap permit 20 ciscoasa(config-route-map)# match ip address pbracl ciscoasa(config-route-map)# set ip next-hop 35.1.1.61 ciscoasa(config)# show run route-map ! route-map testmap permit 10 match ip address pbracl_1 set ip next-hop 25.1.1.61 ! route-map testmap permit 20 match ip address pbracl_2 set ip next-hop 35.1.1.61 !
H1: ping 65.1.1.100 repeat 1 source loopback2
The debugs are shown here:
pbr: policy based route lookup called for 15.1.1.101/1234 to 65.1.1.100/1234 proto 6 sub_proto 0 received on interface inside pbr: First matching rule from ACL(3) pbr: route map testmap, sequence 20, permit; proceed with policy routing pbr: evaluating next-hop 35.1.1.61 pbr: policy based routing applied; egress_ifc = dmz : next_hop = 35.1.1.61
and the route entry chosen from input route table is shown here:
in 255.255.255.255 255.255.255.255 identity in 10.1.1.60 255.255.255.255 identity in 25.1.1.60 255.255.255.255 identity in 35.1.1.60 255.255.255.255 identity in 10.127.46.17 255.255.255.255 identity in 10.1.1.0 255.255.255.0 inside in 25.1.1.0 255.255.255.0 outside in 35.1.1.0 255.255.255.0 dmz
Policy based routing
Policy Based Routing (PBR) is a mechanism by which traffic is routed through specific paths with a specified QoS using ACLs. ACLs let traffic be classified based on the content of the packet’s Layer 3 and Layer 4 headers. This solution lets administrators provide QoS to differentiated traffic, distribute interactive and batch traffic among low-bandwidth, low-cost permanent paths and high-bandwidth, high-cost switched paths, and allows Internet service providers and other organizations to route traffic originating from various sets of users through well-defined Internet connections.
We introduced the following commands: set ip next-hop verify-availability, set ip next-hop, set ip next-hop recursive, set interface, set ip default next-hop, set default interface, set ip df, set ip dscp, policy-route route-map, show policy-route, debug policy-route
IPv6 support for Policy Based Routing
IPv6 addresses are now supported for Policy Based Routing.
We introduced the following commands: set ipv6 next-hop,set default ipv6-next hop, set ipv6 dscp
VXLAN support for Policy Based Routing
You can now enable Policy Based Routing on a VNI interface.
We did not modify any commands.
Policy Based Routing support for Identity Firewall and Cisco Trustsec
You can configure Identity Firewall and Cisco TrustSec and then use Identity Firewall and Cisco TrustSec ACLs in Policy Based Routing route maps.
We did not modify any commands.