Cisco ASA Management and Routing Help

ciscocisco-asafirewallrouting

Hoping somebody can help me understand what I'm doing wrong here. Here is the diagram:

[![enter image description here][1]][1]

We have an ASA sitting at the edge. The FirePower module is connected via the management interface (with "no ip address" configured on ASA, but IP configured on FirePower). The ASA is managed through interface 1/2.

There is an exit subnet configured that should be used for routing all traffic to/from the outside.

The environment has a separate subnet for management (physical devices mostly, hyper-v, storage, etc) which is the 10.10.5.0/24 network and another subnet for end-user-accessed servers, pretty much all VMs. The ASA has to contact some of these servers for various network services like DNS, RADIUS, and others. So if I want the ASA to authenticate a VPN user through RADIUS, I would like it to send that traffic via 10.10.5.1, not 172.16.98.1. I can't get this to work. I believe the routing is breaking. I've been reading about management-only routes, but I can't seem to wrap my head around what I'm doing wrong here. The TAC engineer is very intelligent, but uninterested in going beyond break/fix. Is this is architecture design flaw?

Much appreciated.

Best Answer

I know this is not the answer that you're hoping to hear, but the answer is to manage your ASA in-band, not out-of-band. The ASA does not have VRF capabilities, meaning that the Man1/1 port (or whatever interface you designate, like Gig1/2) does not have a separate routing table, but rather functions like a regular interface and uses the regular routing table. This can cause several issues in the way the device processes certain traffic flows.

Your best path forward is to shutdown your Gi1/2 interface, and remove the MANAGEMENT_SUBNET nameif. Then, add a static route for the 10.10.5.0/24 pointing to 172.16.98.1 like everything else.

All your problems will then go away except your nagging desire to manage the firewall on the management network, "like everything else". The thing is, your firewall isn't like everything else. Management networks are designed for non-network devices (meaning servers, storage, whatever else) and probably layer 2 switches. Layer 3 devices like routers and firewalls use their IP addresses to make behavioral decisions, and are much more effectively managed with a loopback address, or an in-band IP address.