<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem with returning to the main VTI channel between ASA5508 and C881 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-returning-to-the-main-vti-channel-between-asa5508/m-p/4435268#M1082352</link>
    <description>&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;I have an ASA5508 at the main office, which has two Internet providers, and also has branches with which VTI tunnels are built. When the primary link of the ASA5508 fails, the routers switch to the backup, but when the primary link of the ASA returns, the failover does not occur, for this reason, the connection with the branches is cut off. I have to go to the router and write the command "clear crypto isakmp" and then the channel returns&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;I suspect that some isakmp buffer is overflowing due to which the visibility of the logical tunnel of the main VTI channel disappears&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;Configure a Router:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;rack 1 ip sla 1 reachability&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 14&lt;BR /&gt;lifetime 28800&lt;BR /&gt;crypto isakmp key ***** address ***.***.**.***&lt;BR /&gt;crypto isakmp key ****** address **.***.**.***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set TSET esp-aes 256 esp-sha-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile IPSEC_PROFILE&lt;BR /&gt;set transform-set TSET&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;description tunnel to MainChanell_ASA&lt;BR /&gt;ip address 10.10.10.78 255.255.255.252&lt;BR /&gt;tunnel source FastEthernet4&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination ***.***.**.***&lt;BR /&gt;tunnel protection ipsec profile IPSEC_PROFILE&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;description tunnel to BackupChanell_ASA&lt;BR /&gt;ip address 10.10.10.154 255.255.255.252&lt;BR /&gt;tunnel source FastEthernet4&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination **.***.**.***&lt;BR /&gt;tunnel protection ipsec profile IPSEC_PROFILE&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;BR /&gt;description Outside interface to ISP&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache cef&lt;BR /&gt;duplex full&lt;BR /&gt;speed auto&lt;BR /&gt;no cdp enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip sla 1&lt;BR /&gt;icmp-echo ***.***.**.*** source-interface FastEthernet4&lt;BR /&gt;threshold 1000&lt;BR /&gt;timeout 1500&lt;BR /&gt;frequency 3&lt;BR /&gt;ip sla schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip route 192.168.0.0 255.255.0.0 10.10.10.77 track 1&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 ***.***.**.**&lt;BR /&gt;ip route 192.168.0.0 255.255.0.0 10.10.10.153 254&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jul 2021 11:37:03 GMT</pubDate>
    <dc:creator>NikolayRybnikov</dc:creator>
    <dc:date>2021-07-19T11:37:03Z</dc:date>
    <item>
      <title>Problem with returning to the main VTI channel between ASA5508 and C881</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-returning-to-the-main-vti-channel-between-asa5508/m-p/4435268#M1082352</link>
      <description>&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;I have an ASA5508 at the main office, which has two Internet providers, and also has branches with which VTI tunnels are built. When the primary link of the ASA5508 fails, the routers switch to the backup, but when the primary link of the ASA returns, the failover does not occur, for this reason, the connection with the branches is cut off. I have to go to the router and write the command "clear crypto isakmp" and then the channel returns&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;I suspect that some isakmp buffer is overflowing due to which the visibility of the logical tunnel of the main VTI channel disappears&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;Configure a Router:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;rack 1 ip sla 1 reachability&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 14&lt;BR /&gt;lifetime 28800&lt;BR /&gt;crypto isakmp key ***** address ***.***.**.***&lt;BR /&gt;crypto isakmp key ****** address **.***.**.***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set TSET esp-aes 256 esp-sha-hmac&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile IPSEC_PROFILE&lt;BR /&gt;set transform-set TSET&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;description tunnel to MainChanell_ASA&lt;BR /&gt;ip address 10.10.10.78 255.255.255.252&lt;BR /&gt;tunnel source FastEthernet4&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination ***.***.**.***&lt;BR /&gt;tunnel protection ipsec profile IPSEC_PROFILE&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;description tunnel to BackupChanell_ASA&lt;BR /&gt;ip address 10.10.10.154 255.255.255.252&lt;BR /&gt;tunnel source FastEthernet4&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel destination **.***.**.***&lt;BR /&gt;tunnel protection ipsec profile IPSEC_PROFILE&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;BR /&gt;description Outside interface to ISP&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache cef&lt;BR /&gt;duplex full&lt;BR /&gt;speed auto&lt;BR /&gt;no cdp enable&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip sla 1&lt;BR /&gt;icmp-echo ***.***.**.*** source-interface FastEthernet4&lt;BR /&gt;threshold 1000&lt;BR /&gt;timeout 1500&lt;BR /&gt;frequency 3&lt;BR /&gt;ip sla schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ip route 192.168.0.0 255.255.0.0 10.10.10.77 track 1&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 ***.***.**.**&lt;BR /&gt;ip route 192.168.0.0 255.255.0.0 10.10.10.153 254&lt;/P&gt;&lt;PRE&gt;&lt;SPAN class="Y2IQFc"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 11:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-returning-to-the-main-vti-channel-between-asa5508/m-p/4435268#M1082352</guid>
      <dc:creator>NikolayRybnikov</dc:creator>
      <dc:date>2021-07-19T11:37:03Z</dc:date>
    </item>
  </channel>
</rss>

