SlideShare a Scribd company logo
CH A P T E R 
19-1 
Cisco ASA 5500 Series Configuration Guide using the CLI 
OL-18970-03 
19 
Configuring Static and Default Routes 
This chapter describes how to configure static and default routes on the ASA, and includes the following 
sections: 
• Information About Static and Default Routes, page 19-1 
• Licensing Requirements for Static and Default Routes, page 19-2 
• Guidelines and Limitations, page 19-2 
• Configuring Static and Default Routes, page 19-2 
• Monitoring a Static or Default Route, page 19-5 
• Configuration Examples for Static or Default Routes, page 19-7 
• Feature History for Static and Default Routes, page 19-7 
Information About Static and Default Routes 
To route traffic to a non-connected host or network, you must define a static route to the host or network 
or, at a minimum, a default route for any networks to which the ASA is not directly connected; for 
example, when there is a router between a network and the ASA. 
Without a static or default route defined, traffic to non-connected hosts or networks generates the 
following error message: 
%ASA-6-110001: No route to dest_address from source_address 
Multiple context mode does not support dynamic routing, 
You might want to use static routes in single context mode in the following cases: 
• Your networks use a different router discovery protocol from EIGRP, RIP, or OSPF. 
• Your network is small and you can easily manage static routes. 
• You do not want the traffic or CPU overhead associated with routing protocols. 
The simplest option is to configure a default route to send all traffic to an upstream router, relying on the 
router to route the traffic for you. However, in some cases the default gateway might not be able to reach 
the destination network, so you must also configure more specific static routes. For example, if the 
default gateway is outside, then the default route cannot direct traffic to any inside networks that are not 
directly connected to the ASA. 
In transparent firewall mode, for traffic that originates on the ASA and is destined for a non-directly 
connected network, you need to configure either a default route or static routes so the ASA knows out 
of which interface to send traffic. Traffic that originates on the ASA might include communications to a
Model License Requirement 
All models Base License. 
19-2 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
OL-18970-03 
Licensing Requirements for Static and Default Routes 
syslog server, Websense or N2H2 server, or AAA server. If you have servers that cannot all be reached 
through a single default route, then you must configure static routes. Additionally, the ASA supports up 
to three equal cost routes on the same interface for load balancing. 
Licensing Requirements for Static and Default Routes 
Guidelines and Limitations 
This section includes the guidelines and limitations for this feature. 
Context Mode Guidelines 
Supported in single and multiple context mode. 
Firewall Mode Guidelines 
Supported in routed and transparent firewall mode. 
IPv6 Guidelines 
Supports IPv6. 
Configuring Static and Default Routes 
This section explains how to configure a static, and a static default route and includes the following 
topics: 
• Configuring a Static Route, page 19-2 
• Configuring a Default Static Route, page 19-3 
• Configuring IPv6 Default and Static Routes, page 19-4 
Configuring a Static Route 
Static routing algorithms are basically table mappings established by the network administrator before 
the beginning of routing. These mappings do not change unless the network administrator alters them. 
Algorithms that use static routes are simple to design and work well in environments where network 
traffic is relatively predictable and where network design is relatively simple. Because of this fact, static 
routing systems cannot react to network changes. 
Static routes remain in the routing table even if the specified gateway becomes unavailable. If the 
specified gateway becomes unavailable, you need to remove the static route from the routing table 
manually. However, static routes are removed from the routing table if the specified interface goes down, 
and are reinstated when the interface comes back up.
This enables you to add a static route. 
The dest_ip and mask is the IP address for the destination network and the 
gateway_ip is the address of the next-hop router.The addresses you specify 
for the static route are the addresses that are in the packet before entering 
the ASA and performing NAT. 
The distance is the administrative distance for the route. The default is 1 if 
you do not specify a value. Administrative distance is a parameter used to 
compare routes among different routing protocols. The default 
administrative distance for static routes is 1, giving it precedence over 
routes discovered by dynamic routing protocols but not directly connect 
routes. 
The default administrative distance for routes discovered by OSPF is 110. 
If a static route has the same administrative distance as a dynamic route, 
the static routes take precedence. Connected routes always take precedence 
over static or dynamically discovered routes. 
19-3 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
Command Purpose 
route if_name dest_ip mask gateway_ip 
[distance] 
Example: 
hostname(config)# route outside 10.10.10.0 
255.255.255.0 192.168.1.1 [1] 
OL-18970-03 
Configuring Static and Default Routes 
Note If you create a static route with an administrative distance greater than the administrative distance of the 
routing protocol running on the ASA, then a route to the specified destination discovered by the routing 
protocol takes precedence over the static route. The static route is used only if the dynamically 
discovered route is removed from the routing table. 
To configure a static route, enter the following command: 
Detailed Steps 
Configuring a Default Static Route 
A default route identifies the gateway IP address to which the ASA sends all IP packets for which it does 
not have a learned or static route. A default static route is simply a static route with 0.0.0.0/0 as the 
destination IP address. Routes that identify a specific destination take precedence over the default route. 
Note In ASA software Versions 7.0 and later, if you have two default routes configured on different interfaces 
that have different metrics, the connection to the ASA firewall that is made from the higher metric 
interface fails, but connections to the ASA firewall from the lower metric interface succeed as expected. 
You can define up to three equal cost default route entries per device. Defining more than one equal cost 
default route entry causes the traffic sent to the default route to be distributed among the specified 
gateways. When defining more than one default route, you must specify the same interface for each 
entry. 
If you attempt to define more than three equal cost default routes, or if you attempt to define a default 
route with a different interface than a previously defined default route, you receive the following 
message: 
“ERROR: Cannot add route entry, possible conflict with existing routes.”
Command Purpose 
route if_name 0.0.0.0 0.0.0.0 gateway_ip 
[distance | tunneled] 
Example: 
hostname(config)# route outside 0 0 
192.168.2.4 tunneled 
19-4 
This enables you to add a static route. 
The dest_ip and mask is the IP address for the destination network and the 
gateway_ip is the address of the next-hop router. The addresses you specify 
for the static route are the addresses that are in the packet before entering 
the ASA and performing NAT. 
The distance is the administrative distance for the route. The default is 1 if 
you do not specify a value. Administrative distance is a parameter used to 
compare routes among different routing protocols. The default 
administrative distance for static routes is 1, giving it precedence over 
routes discovered by dynamic routing protocols but not directly connect 
routes. The default administrative distance for routes discovered by OSPF 
is 110. If a static route has the same administrative distance as a dynamic 
route, the static routes take precedence. Connected routes always take 
precedence over static or dynamically discovered routes. 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
OL-18970-03 
Configuring Static and Default Routes 
You can define a separate default route for tunneled traffic along with the standard default route. When 
you create a default route with the tunneled option, all traffic from a tunnel terminating on the ASA that 
cannot be routed using learned or static routes, is sent to this route. For traffic emerging from a tunnel, 
this route overrides over any other configured or learned default routes. 
Limitations on Configuring a Default Static Route 
The following restrictions apply to default routes with the tunneled option: 
• Do not enable unicast RPF (ip verify reverse-path) on the egress interface of tunneled route. 
Enabling Unicast RPF on the egress interface of a tunneled route causes the session to fail. 
• Do not enable TCP intercept on the egress interface of the tunneled route. Doing so causes the 
session to fail. 
• Do not use the VoIP inspection engines (CTIQBE, H.323, GTP, MGCP, RTSP, SIP, SKINNY), the 
DNS inspect engine, or the DCE RPC inspection engine with tunneled routes. These inspection 
engines ignore the tunneled route. 
You cannot define more than one default route with the tunneled option; ECMP for tunneled traffic is 
not supported. 
To define a tunneled default route, enter the following command: 
Detailed Steps 
Tip You can enter 0 0 instead of 0.0.0.0 0.0.0.0 for the destination network address and mask, for example: 
hostname(config)# route outside 0 0 192.168.1 1 
Configuring IPv6 Default and Static Routes 
The ASA automatically routes IPv6 traffic between directly connected hosts if the interfaces to which 
the hosts are attached are enabled for IPv6 and the IPv6 ACLs allow the traffic.
This step adds an IPv6 static route to the IPv6 routing table. 
This example routes packets for network 7fff::0/32 to a 
networking device on the inside interface at 
3FFE:1100:0:CC00::1 , and with an administrative distance of 
110. 
19-5 
This step adds a default IPv6 route. 
This example routes packets for network 7fff::0/32 to a 
networking device on the inside interface at 
3FFE:1100:0:CC00::1 
The address ::/0 is the IPv6 equivalent of “any.” 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
Command Purpose 
Step 1 ipv6 route if_name ::/0 next_hop_ipv6_addr 
Example: 
hostname(config)#ipv6 route inside 
7fff::0/32 3FFE:1100:0:CC00::1 
Step 2 ipv6 route if_name destination 
next_hop_ipv6_addr [admin_distance] 
Example: 
hostname(config)# ipv6 route inside 
7fff::0/32 3FFE:1100:0:CC00::1 [110] 
OL-18970-03 
Monitoring a Static or Default Route 
To configure an IPv6 default route and static routes, perform the following steps: 
Detailed Steps 
Note The ipv6 route command works like the route command used to define IPv4 static routes. 
Monitoring a Static or Default Route 
One of the problems with static routes is that there is no inherent mechanism for determining if the route 
is up or down. They remain in the routing table even if the next hop gateway becomes unavailable. Static 
routes are only removed from the routing table if the associated interface on the ASA goes down. 
The static route tracking feature provides a method for tracking the availability of a static route and 
installing a backup route if the primary route should fail. This allows you to, for example, define a 
default route to an ISP gateway and a backup default route to a secondary ISP in case the primary ISP 
becomes unavailable. 
The ASA does this by associating a static route with a monitoring target that you define. It monitors the 
target using ICMP echo requests. If an echo reply is not received within a specified time period, the 
object is considered down and the associated route is removed from the routing table. A previously 
configured backup route is used in place of the removed route. 
When selecting a monitoring target, you need to make sure it can respond to ICMP echo requests. The 
target can be any network object that you choose, but you should consider using: 
• the ISP gateway (for dual ISP support) address 
• the next hop gateway address (if you are concerned about the availability of the gateway) 
• a server on the target network, such as a AAA server, that the ASA needs to communicate with 
• a persistent network object on the destination network (a desktop or notebook computer that may be 
shut down at night is not a good choice) 
You can configure static route tracking for statically defined routes or default routes obtained through 
DHCP or PPPoE. You can only enable PPPoE clients on multiple interface with route tracking. 
To configure static route tracking, perform the following steps:
19-6 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
OL-18970-03 
Monitoring a Static or Default Route 
Detailed Steps 
Command Purpose 
Step 1 sla monitor sla_id 
Example: 
hostname(config)# sla monitor sla_id 
Configure the tracked object monitoring parameters by defining 
the monitoring process. 
If you are configuring a new monitoring process, you enter SLA 
monitor configuration mode. 
If you are changing the monitoring parameters for an unscheduled 
monitoring process that already has a type defined, you 
automatically enter SLA protocol configuration mode. 
Step 2 type echo protocol ipIcmpEcho target_ip 
interface if_name 
Example: 
hostname(config-sla-monitor)# type echo 
protocol ipIcmpEcho target_ip interface 
if_name 
Specify the monitoring protocol. 
If you are changing the monitoring parameters for an unscheduled 
monitoring process that already has a type defined, you 
automatically enter SLA protocol configuration mode and cannot 
change this setting. 
The target_ip is the IP address of the network object whose 
availability the tracking process monitors. While this object is 
available, the tracking process route is installed in the routing 
table. When this object becomes unavailable, the tracking process 
removed the route and the backup route is used in its place. 
Step 3 sla monitor schedule sla_id [life {forever 
| seconds}] [start-time {hh:mm[:ss] [month 
day | day month] | pending | now | after 
hh:mm:ss}] [ageout seconds] [recurring] 
Example: 
hostname(config)# sla monitor schedule 
sla_id [life {forever | seconds}] 
[start-time {hh:mm[:ss] [month day | day 
month] | pending | now | after hh:mm:ss}] 
[ageout seconds] [recurring] 
Schedule the monitoring process. 
Typically, you will use sla monitor schedule sla_id life forever 
start-time now for the monitoring schedule, and allow the 
monitoring configuration determine how often the testing occurs. 
However, you can schedule this monitoring process to begin in the 
future and to only occur at specified times. 
Step 4 track track_id rtr sla_id reachability 
Example: 
hostname(config)# track track_id rtr 
sla_id reachability 
Associate a tracked static route with the SLA monitoring process. 
The track_id is a tracking number you assign with this command. 
The sla_id is the ID number of the SLA process. 
Step 5 Do one of the following to define the static route to be installed in the routing table while the tracked object is 
reachable. 
These options allow you to track a static route, or default route obtained through DHCP or PPPOE. 
route if_name dest_ip mask gateway_ip 
[admin_distance] track track_id 
Example: 
hostname(config)# route if_name dest_ip 
mask gateway_ip [admin_distance] track 
track_id 
This option tracks a static route. 
You cannot use the tunneled option with the route command with 
static route tracking.
Command Purpose 
This option tracks a default route obtained through DHCP, 
Remember that you must use the setroute argument with the ip 
address dhcp command to obtain the default route using DHCP. 
This option tracks a default route obtained through PPPoE. 
You must use the setroute argument with the ip address pppoe 
command to obtain the default route using PPPoE. 
19-7 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
hostname(config)# interface phy_if 
hostname(config-if)# dhcp client route 
track track_id 
hostname(config-if)# ip addresss dhcp 
setroute 
hostname(config-if)# exit 
hostname(config)# interface phy_if 
hostname(config-if)# pppoe client route 
track track_id 
hostname(config-if)# ip addresss pppoe 
setroute 
hostname(config-if)# exit 
OL-18970-03 
Configuration Examples for Static or Default Routes 
Configuration Examples for Static or Default Routes 
Step 1 Create a static route: 
hostname(config)# route inside 10.1.1.0 255.255.255.0 10.1.2.45 1 
In this step, a static route is created that sends all traffic destined for 10.1.1.0/24 to the router (10.1.2.45) 
connected to the inside interface. 
Step 2 Define three equal cost static routes that directs traffic to three different gateways on the outside 
interface, and adds a default route for tunneled traffic. The ASA distributes the traffic among the 
specified gateways. 
hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.2.1 
hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.2.2 
hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.2.3 
hostname(config)# route outside 0 0 192.168.2.4 tunneled 
Unencrypted traffic received by the ASA for which there is no static or learned route is distributed among 
the gateways with the IP addresses 192.168.2.1, 192.168.2.2, 192.168.2.3. Encrypted traffic receive by 
the ASA for which there is no static or learned route is passed to the gateway with the IP address 
192.168.2.4. 
Feature History for Static and Default Routes 
Table 19-1 lists the release history for this feature. 
Table 19-1 Feature History for Static and Default Routes 
Feature Name Releases Feature Information 
route command 7.0 The route command is used to enter a static or default route 
for the specified interface.
19-8 
Cisco ASA 5500 Series Configuration Guide using the CLI 
Chapter 19 Configuring Static and Default Routes 
OL-18970-03 
Feature History for Static and Default Routes

More Related Content

What's hot (19)

PDF
Bgp
Golak Nayak
 
PDF
3 ip routing part b
SagarR24
 
PPT
Bgp For Presentation
Alp isik
 
PPTX
MPLS Layer 3 VPN
NetProtocol Xpert
 
PPTX
Border Gatway Protocol
Shashank Asthana
 
DOCX
En rse pts_av21_pt61_design_public
Saad Jouhari
 
PPT
Bgp Basic Labs
cisconetworker
 
PPTX
Internet Traffic Engineering
jonassm
 
PDF
Ccnp enterprise workbook v1.0 bgp zero to hero
SagarR24
 
PPT
BGP
Reza Farahani
 
PPTX
OPEN SHORTEST PATH FIRST (OSPF)
Ann Joseph
 
PDF
3 ip routing bgp-updated
SagarR24
 
PDF
Class notes fhrp,hsrp,vrrp
SagarR24
 
PDF
How BGP Works
ThousandEyes
 
PPT
Mpls L3_vpn
Reza Farahani
 
PPTX
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
PPT
bgp(border gateway protocol)
Noor Ul Hudda Memon
 
PDF
Class notes fhrp,hsrp
SagarR24
 
3 ip routing part b
SagarR24
 
Bgp For Presentation
Alp isik
 
MPLS Layer 3 VPN
NetProtocol Xpert
 
Border Gatway Protocol
Shashank Asthana
 
En rse pts_av21_pt61_design_public
Saad Jouhari
 
Bgp Basic Labs
cisconetworker
 
Internet Traffic Engineering
jonassm
 
Ccnp enterprise workbook v1.0 bgp zero to hero
SagarR24
 
OPEN SHORTEST PATH FIRST (OSPF)
Ann Joseph
 
3 ip routing bgp-updated
SagarR24
 
Class notes fhrp,hsrp,vrrp
SagarR24
 
How BGP Works
ThousandEyes
 
Mpls L3_vpn
Reza Farahani
 
BGP (Border Gateway Protocol)
NetProtocol Xpert
 
bgp(border gateway protocol)
Noor Ul Hudda Memon
 
Class notes fhrp,hsrp
SagarR24
 

Viewers also liked (9)

PPT
Школьный музей
schoolkrkut
 
PDF
রাশি গণনার বই
Gausul Azam
 
PPT
Weaver bennett & bland p.a
Weaver, Bennett & Bland, P.A.
 
PPTX
NBA
99071502160
 
DOCX
Bahan
Bachtiar Rosyada
 
PPTX
Dumery Lien Presentatie
Liendumery
 
PDF
Modul membuat server debian whezzy terbaru by:afn
Wilda Afn
 
DOC
Borang pk 07 3 contoh format minit mesyuarat
Manjuin Rasid
 
DOCX
Makalah etika
Ifandi Silitonga
 
Школьный музей
schoolkrkut
 
রাশি গণনার বই
Gausul Azam
 
Weaver bennett & bland p.a
Weaver, Bennett & Bland, P.A.
 
Dumery Lien Presentatie
Liendumery
 
Modul membuat server debian whezzy terbaru by:afn
Wilda Afn
 
Borang pk 07 3 contoh format minit mesyuarat
Manjuin Rasid
 
Makalah etika
Ifandi Silitonga
 
Ad

Similar to Route static Configuration (20)

PPTX
Chapter [27/11, 11:00 am] Sumaya👸🏻✨️: Mida kale waqtiga wuba kudhamaadaye [28...
xaydari03
 
PPTX
Статическая IP-маршрутизация_Теоретическая часть ПЗ_2 (1).pptx
MuhdQawiem1
 
PPTX
Link state routing protocol by painters.pptx
OUMANORBERTFrancis
 
DOCX
Static routes in the cisco ios
IT Tech
 
PDF
Fortigatefirewall routing specficatoinmmm
maheshumanath1
 
PPTX
7-ROUTING IN COMPUTER NETWORKS .pptx
shawwalrashed
 
PPTX
static routing slide lab.pptx
GirT2
 
PPTX
CCNA CISCO Chapter 02 Routing Concepts and Network
MonchaiPhaichitchan1
 
PPTX
CCNA_RSE_Chp2-1 Static Routing for Networking
pmonchai1
 
PPTX
ENCOR_Chapter_6.pptx
ManuelRojas960410
 
PDF
Building Scalable Cisco Internetworks (Bsci)
CCNAResources
 
PPTX
Chapter 5 Routing.pptx
AyaanMohamed4
 
PDF
Day 2 IP ROUTING
anilinvns
 
PPTX
IP ROUTING
anilinvns
 
PPTX
Ccna rse chp2
newbie2019
 
PDF
220375-use-secure-web-appliance-best-practices.pdf
tungtk1
 
PPT
Day 9 routing
CYBERINTELLIGENTS
 
DOCX
BÀI TẬP 01.docx
ssuseraf0e77
 
DOCX
BÀI TẬP 01.docx
ssuseraf0e77
 
Chapter [27/11, 11:00 am] Sumaya👸🏻✨️: Mida kale waqtiga wuba kudhamaadaye [28...
xaydari03
 
Статическая IP-маршрутизация_Теоретическая часть ПЗ_2 (1).pptx
MuhdQawiem1
 
Link state routing protocol by painters.pptx
OUMANORBERTFrancis
 
Static routes in the cisco ios
IT Tech
 
Fortigatefirewall routing specficatoinmmm
maheshumanath1
 
7-ROUTING IN COMPUTER NETWORKS .pptx
shawwalrashed
 
static routing slide lab.pptx
GirT2
 
CCNA CISCO Chapter 02 Routing Concepts and Network
MonchaiPhaichitchan1
 
CCNA_RSE_Chp2-1 Static Routing for Networking
pmonchai1
 
ENCOR_Chapter_6.pptx
ManuelRojas960410
 
Building Scalable Cisco Internetworks (Bsci)
CCNAResources
 
Chapter 5 Routing.pptx
AyaanMohamed4
 
Day 2 IP ROUTING
anilinvns
 
IP ROUTING
anilinvns
 
Ccna rse chp2
newbie2019
 
220375-use-secure-web-appliance-best-practices.pdf
tungtk1
 
Day 9 routing
CYBERINTELLIGENTS
 
BÀI TẬP 01.docx
ssuseraf0e77
 
BÀI TẬP 01.docx
ssuseraf0e77
 
Ad

More from Gausul Azam (8)

PDF
"Top 100 Tips for Mastering Microsoft Excel: Expert Guide to Boost Your Produ...
Gausul Azam
 
PDF
আরবের এক লোকের ফল কেনার গল্প
Gausul Azam
 
PDF
মসজিদে আকসা কেন এত গুরুত্বপূর্ণ মুসলিমদের কাছে
Gausul Azam
 
PDF
ইন্টারনেটের অদৃশ্য জগত ডার্ক ওয়েব
Gausul Azam
 
PDF
হযরত নূহ আ: এর জীবনী এবং মহাপ্লাবনের ইতিহাস
Gausul Azam
 
PDF
জমজমের পানি পানের ফজিলত ও দোয়া
Gausul Azam
 
PDF
Windows 7 pp oe configure pdf
Gausul Azam
 
PDF
Rip configruation
Gausul Azam
 
"Top 100 Tips for Mastering Microsoft Excel: Expert Guide to Boost Your Produ...
Gausul Azam
 
আরবের এক লোকের ফল কেনার গল্প
Gausul Azam
 
মসজিদে আকসা কেন এত গুরুত্বপূর্ণ মুসলিমদের কাছে
Gausul Azam
 
ইন্টারনেটের অদৃশ্য জগত ডার্ক ওয়েব
Gausul Azam
 
হযরত নূহ আ: এর জীবনী এবং মহাপ্লাবনের ইতিহাস
Gausul Azam
 
জমজমের পানি পানের ফজিলত ও দোয়া
Gausul Azam
 
Windows 7 pp oe configure pdf
Gausul Azam
 
Rip configruation
Gausul Azam
 

Recently uploaded (20)

PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PDF
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PPTX
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
PPTX
cybersecurityandthe importance of the that
JayachanduHNJc
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PPTX
Ground improvement techniques-DEWATERING
DivakarSai4
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
cybersecurityandthe importance of the that
JayachanduHNJc
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
Ground improvement techniques-DEWATERING
DivakarSai4
 
Information Retrieval and Extraction - Module 7
premSankar19
 

Route static Configuration

  • 1. CH A P T E R 19-1 Cisco ASA 5500 Series Configuration Guide using the CLI OL-18970-03 19 Configuring Static and Default Routes This chapter describes how to configure static and default routes on the ASA, and includes the following sections: • Information About Static and Default Routes, page 19-1 • Licensing Requirements for Static and Default Routes, page 19-2 • Guidelines and Limitations, page 19-2 • Configuring Static and Default Routes, page 19-2 • Monitoring a Static or Default Route, page 19-5 • Configuration Examples for Static or Default Routes, page 19-7 • Feature History for Static and Default Routes, page 19-7 Information About Static and Default Routes To route traffic to a non-connected host or network, you must define a static route to the host or network or, at a minimum, a default route for any networks to which the ASA is not directly connected; for example, when there is a router between a network and the ASA. Without a static or default route defined, traffic to non-connected hosts or networks generates the following error message: %ASA-6-110001: No route to dest_address from source_address Multiple context mode does not support dynamic routing, You might want to use static routes in single context mode in the following cases: • Your networks use a different router discovery protocol from EIGRP, RIP, or OSPF. • Your network is small and you can easily manage static routes. • You do not want the traffic or CPU overhead associated with routing protocols. The simplest option is to configure a default route to send all traffic to an upstream router, relying on the router to route the traffic for you. However, in some cases the default gateway might not be able to reach the destination network, so you must also configure more specific static routes. For example, if the default gateway is outside, then the default route cannot direct traffic to any inside networks that are not directly connected to the ASA. In transparent firewall mode, for traffic that originates on the ASA and is destined for a non-directly connected network, you need to configure either a default route or static routes so the ASA knows out of which interface to send traffic. Traffic that originates on the ASA might include communications to a
  • 2. Model License Requirement All models Base License. 19-2 Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes OL-18970-03 Licensing Requirements for Static and Default Routes syslog server, Websense or N2H2 server, or AAA server. If you have servers that cannot all be reached through a single default route, then you must configure static routes. Additionally, the ASA supports up to three equal cost routes on the same interface for load balancing. Licensing Requirements for Static and Default Routes Guidelines and Limitations This section includes the guidelines and limitations for this feature. Context Mode Guidelines Supported in single and multiple context mode. Firewall Mode Guidelines Supported in routed and transparent firewall mode. IPv6 Guidelines Supports IPv6. Configuring Static and Default Routes This section explains how to configure a static, and a static default route and includes the following topics: • Configuring a Static Route, page 19-2 • Configuring a Default Static Route, page 19-3 • Configuring IPv6 Default and Static Routes, page 19-4 Configuring a Static Route Static routing algorithms are basically table mappings established by the network administrator before the beginning of routing. These mappings do not change unless the network administrator alters them. Algorithms that use static routes are simple to design and work well in environments where network traffic is relatively predictable and where network design is relatively simple. Because of this fact, static routing systems cannot react to network changes. Static routes remain in the routing table even if the specified gateway becomes unavailable. If the specified gateway becomes unavailable, you need to remove the static route from the routing table manually. However, static routes are removed from the routing table if the specified interface goes down, and are reinstated when the interface comes back up.
  • 3. This enables you to add a static route. The dest_ip and mask is the IP address for the destination network and the gateway_ip is the address of the next-hop router.The addresses you specify for the static route are the addresses that are in the packet before entering the ASA and performing NAT. The distance is the administrative distance for the route. The default is 1 if you do not specify a value. Administrative distance is a parameter used to compare routes among different routing protocols. The default administrative distance for static routes is 1, giving it precedence over routes discovered by dynamic routing protocols but not directly connect routes. The default administrative distance for routes discovered by OSPF is 110. If a static route has the same administrative distance as a dynamic route, the static routes take precedence. Connected routes always take precedence over static or dynamically discovered routes. 19-3 Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes Command Purpose route if_name dest_ip mask gateway_ip [distance] Example: hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.1.1 [1] OL-18970-03 Configuring Static and Default Routes Note If you create a static route with an administrative distance greater than the administrative distance of the routing protocol running on the ASA, then a route to the specified destination discovered by the routing protocol takes precedence over the static route. The static route is used only if the dynamically discovered route is removed from the routing table. To configure a static route, enter the following command: Detailed Steps Configuring a Default Static Route A default route identifies the gateway IP address to which the ASA sends all IP packets for which it does not have a learned or static route. A default static route is simply a static route with 0.0.0.0/0 as the destination IP address. Routes that identify a specific destination take precedence over the default route. Note In ASA software Versions 7.0 and later, if you have two default routes configured on different interfaces that have different metrics, the connection to the ASA firewall that is made from the higher metric interface fails, but connections to the ASA firewall from the lower metric interface succeed as expected. You can define up to three equal cost default route entries per device. Defining more than one equal cost default route entry causes the traffic sent to the default route to be distributed among the specified gateways. When defining more than one default route, you must specify the same interface for each entry. If you attempt to define more than three equal cost default routes, or if you attempt to define a default route with a different interface than a previously defined default route, you receive the following message: “ERROR: Cannot add route entry, possible conflict with existing routes.”
  • 4. Command Purpose route if_name 0.0.0.0 0.0.0.0 gateway_ip [distance | tunneled] Example: hostname(config)# route outside 0 0 192.168.2.4 tunneled 19-4 This enables you to add a static route. The dest_ip and mask is the IP address for the destination network and the gateway_ip is the address of the next-hop router. The addresses you specify for the static route are the addresses that are in the packet before entering the ASA and performing NAT. The distance is the administrative distance for the route. The default is 1 if you do not specify a value. Administrative distance is a parameter used to compare routes among different routing protocols. The default administrative distance for static routes is 1, giving it precedence over routes discovered by dynamic routing protocols but not directly connect routes. The default administrative distance for routes discovered by OSPF is 110. If a static route has the same administrative distance as a dynamic route, the static routes take precedence. Connected routes always take precedence over static or dynamically discovered routes. Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes OL-18970-03 Configuring Static and Default Routes You can define a separate default route for tunneled traffic along with the standard default route. When you create a default route with the tunneled option, all traffic from a tunnel terminating on the ASA that cannot be routed using learned or static routes, is sent to this route. For traffic emerging from a tunnel, this route overrides over any other configured or learned default routes. Limitations on Configuring a Default Static Route The following restrictions apply to default routes with the tunneled option: • Do not enable unicast RPF (ip verify reverse-path) on the egress interface of tunneled route. Enabling Unicast RPF on the egress interface of a tunneled route causes the session to fail. • Do not enable TCP intercept on the egress interface of the tunneled route. Doing so causes the session to fail. • Do not use the VoIP inspection engines (CTIQBE, H.323, GTP, MGCP, RTSP, SIP, SKINNY), the DNS inspect engine, or the DCE RPC inspection engine with tunneled routes. These inspection engines ignore the tunneled route. You cannot define more than one default route with the tunneled option; ECMP for tunneled traffic is not supported. To define a tunneled default route, enter the following command: Detailed Steps Tip You can enter 0 0 instead of 0.0.0.0 0.0.0.0 for the destination network address and mask, for example: hostname(config)# route outside 0 0 192.168.1 1 Configuring IPv6 Default and Static Routes The ASA automatically routes IPv6 traffic between directly connected hosts if the interfaces to which the hosts are attached are enabled for IPv6 and the IPv6 ACLs allow the traffic.
  • 5. This step adds an IPv6 static route to the IPv6 routing table. This example routes packets for network 7fff::0/32 to a networking device on the inside interface at 3FFE:1100:0:CC00::1 , and with an administrative distance of 110. 19-5 This step adds a default IPv6 route. This example routes packets for network 7fff::0/32 to a networking device on the inside interface at 3FFE:1100:0:CC00::1 The address ::/0 is the IPv6 equivalent of “any.” Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes Command Purpose Step 1 ipv6 route if_name ::/0 next_hop_ipv6_addr Example: hostname(config)#ipv6 route inside 7fff::0/32 3FFE:1100:0:CC00::1 Step 2 ipv6 route if_name destination next_hop_ipv6_addr [admin_distance] Example: hostname(config)# ipv6 route inside 7fff::0/32 3FFE:1100:0:CC00::1 [110] OL-18970-03 Monitoring a Static or Default Route To configure an IPv6 default route and static routes, perform the following steps: Detailed Steps Note The ipv6 route command works like the route command used to define IPv4 static routes. Monitoring a Static or Default Route One of the problems with static routes is that there is no inherent mechanism for determining if the route is up or down. They remain in the routing table even if the next hop gateway becomes unavailable. Static routes are only removed from the routing table if the associated interface on the ASA goes down. The static route tracking feature provides a method for tracking the availability of a static route and installing a backup route if the primary route should fail. This allows you to, for example, define a default route to an ISP gateway and a backup default route to a secondary ISP in case the primary ISP becomes unavailable. The ASA does this by associating a static route with a monitoring target that you define. It monitors the target using ICMP echo requests. If an echo reply is not received within a specified time period, the object is considered down and the associated route is removed from the routing table. A previously configured backup route is used in place of the removed route. When selecting a monitoring target, you need to make sure it can respond to ICMP echo requests. The target can be any network object that you choose, but you should consider using: • the ISP gateway (for dual ISP support) address • the next hop gateway address (if you are concerned about the availability of the gateway) • a server on the target network, such as a AAA server, that the ASA needs to communicate with • a persistent network object on the destination network (a desktop or notebook computer that may be shut down at night is not a good choice) You can configure static route tracking for statically defined routes or default routes obtained through DHCP or PPPoE. You can only enable PPPoE clients on multiple interface with route tracking. To configure static route tracking, perform the following steps:
  • 6. 19-6 Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes OL-18970-03 Monitoring a Static or Default Route Detailed Steps Command Purpose Step 1 sla monitor sla_id Example: hostname(config)# sla monitor sla_id Configure the tracked object monitoring parameters by defining the monitoring process. If you are configuring a new monitoring process, you enter SLA monitor configuration mode. If you are changing the monitoring parameters for an unscheduled monitoring process that already has a type defined, you automatically enter SLA protocol configuration mode. Step 2 type echo protocol ipIcmpEcho target_ip interface if_name Example: hostname(config-sla-monitor)# type echo protocol ipIcmpEcho target_ip interface if_name Specify the monitoring protocol. If you are changing the monitoring parameters for an unscheduled monitoring process that already has a type defined, you automatically enter SLA protocol configuration mode and cannot change this setting. The target_ip is the IP address of the network object whose availability the tracking process monitors. While this object is available, the tracking process route is installed in the routing table. When this object becomes unavailable, the tracking process removed the route and the backup route is used in its place. Step 3 sla monitor schedule sla_id [life {forever | seconds}] [start-time {hh:mm[:ss] [month day | day month] | pending | now | after hh:mm:ss}] [ageout seconds] [recurring] Example: hostname(config)# sla monitor schedule sla_id [life {forever | seconds}] [start-time {hh:mm[:ss] [month day | day month] | pending | now | after hh:mm:ss}] [ageout seconds] [recurring] Schedule the monitoring process. Typically, you will use sla monitor schedule sla_id life forever start-time now for the monitoring schedule, and allow the monitoring configuration determine how often the testing occurs. However, you can schedule this monitoring process to begin in the future and to only occur at specified times. Step 4 track track_id rtr sla_id reachability Example: hostname(config)# track track_id rtr sla_id reachability Associate a tracked static route with the SLA monitoring process. The track_id is a tracking number you assign with this command. The sla_id is the ID number of the SLA process. Step 5 Do one of the following to define the static route to be installed in the routing table while the tracked object is reachable. These options allow you to track a static route, or default route obtained through DHCP or PPPOE. route if_name dest_ip mask gateway_ip [admin_distance] track track_id Example: hostname(config)# route if_name dest_ip mask gateway_ip [admin_distance] track track_id This option tracks a static route. You cannot use the tunneled option with the route command with static route tracking.
  • 7. Command Purpose This option tracks a default route obtained through DHCP, Remember that you must use the setroute argument with the ip address dhcp command to obtain the default route using DHCP. This option tracks a default route obtained through PPPoE. You must use the setroute argument with the ip address pppoe command to obtain the default route using PPPoE. 19-7 Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes hostname(config)# interface phy_if hostname(config-if)# dhcp client route track track_id hostname(config-if)# ip addresss dhcp setroute hostname(config-if)# exit hostname(config)# interface phy_if hostname(config-if)# pppoe client route track track_id hostname(config-if)# ip addresss pppoe setroute hostname(config-if)# exit OL-18970-03 Configuration Examples for Static or Default Routes Configuration Examples for Static or Default Routes Step 1 Create a static route: hostname(config)# route inside 10.1.1.0 255.255.255.0 10.1.2.45 1 In this step, a static route is created that sends all traffic destined for 10.1.1.0/24 to the router (10.1.2.45) connected to the inside interface. Step 2 Define three equal cost static routes that directs traffic to three different gateways on the outside interface, and adds a default route for tunneled traffic. The ASA distributes the traffic among the specified gateways. hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.2.1 hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.2.2 hostname(config)# route outside 10.10.10.0 255.255.255.0 192.168.2.3 hostname(config)# route outside 0 0 192.168.2.4 tunneled Unencrypted traffic received by the ASA for which there is no static or learned route is distributed among the gateways with the IP addresses 192.168.2.1, 192.168.2.2, 192.168.2.3. Encrypted traffic receive by the ASA for which there is no static or learned route is passed to the gateway with the IP address 192.168.2.4. Feature History for Static and Default Routes Table 19-1 lists the release history for this feature. Table 19-1 Feature History for Static and Default Routes Feature Name Releases Feature Information route command 7.0 The route command is used to enter a static or default route for the specified interface.
  • 8. 19-8 Cisco ASA 5500 Series Configuration Guide using the CLI Chapter 19 Configuring Static and Default Routes OL-18970-03 Feature History for Static and Default Routes