<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VTI as Source Interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487358#M1084414</link>
    <description>&lt;P&gt;I already have the inside interface defined&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vti_as_source.png" style="width: 583px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134808iAE6F225FBEEDDC58/image-size/large?v=v2&amp;amp;px=999" role="button" title="vti_as_source.png" alt="vti_as_source.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;and the route is known via BGP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I find interesting, is that I see "identity" as the interface according to the log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vti_as_source2.png" style="width: 676px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134811iC0D3A73FFCA97A62/image-size/large?v=v2&amp;amp;px=999" role="button" title="vti_as_source2.png" alt="vti_as_source2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Anyone know why I may be seeing that, and not an actual interface?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And I was hoping to skip any versions 9.10 and up as I'd like to keep firePOWER active, but will upgrade if I have to.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for your reply.&lt;/P&gt;</description>
    <pubDate>Sat, 16 Oct 2021 19:22:42 GMT</pubDate>
    <dc:creator>Ed Melendez</dc:creator>
    <dc:date>2021-10-16T19:22:42Z</dc:date>
    <item>
      <title>VTI as Source Interface</title>
      <link>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4486671#M1084377</link>
      <description>&lt;P&gt;I have a 5506-x, v9.9, connecting to an AWS VPC with VTIs. Connectivity to AWS is fine, and all internal hosts can communicate with AWS resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue I'm having is that ASA cannot communicate with AWS resources with source interface set as "inside." AnyConnect is enabled on ASA and needs to communicate with LDAP resource in VPC to authenticate users. I'm guessing this is because the ASAs interface in this case would need to be the VTI, but it is not an option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone know of a way to get this working? How can I get the ASA to communicate with resources on the VTI side?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Oct 2021 05:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4486671#M1084377</guid>
      <dc:creator>Ed Melendez</dc:creator>
      <dc:date>2021-10-15T05:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: VTI as Source Interface</title>
      <link>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487161#M1084405</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316176"&gt;@Ed Melendez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Take a look at this &lt;A href="https://community.cisco.com/t5/vpn/equivalent-command-for-quot-ip-tacacs-source-interface-quot-on/td-p/2183824" target="_self"&gt;old post&lt;/A&gt;. I just tried this, and it works on v9.14.&lt;/P&gt;&lt;P&gt;In your case, you should define server with address of 'inside' zone, and your routng for that destination should point you to VTI. Something like (in your case is should be LDAP protocol, and LDAP relevant config):&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;aaa-server ISE protocol radius&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;aaa-server ISE (inside) host 10.20.0.20&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;key *****&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;route VTI 10.20.0.0 255.255.255.0 10.13.0.1 1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 06:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487161#M1084405</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-10-16T06:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: VTI as Source Interface</title>
      <link>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487358#M1084414</link>
      <description>&lt;P&gt;I already have the inside interface defined&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vti_as_source.png" style="width: 583px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134808iAE6F225FBEEDDC58/image-size/large?v=v2&amp;amp;px=999" role="button" title="vti_as_source.png" alt="vti_as_source.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;and the route is known via BGP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I find interesting, is that I see "identity" as the interface according to the log:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vti_as_source2.png" style="width: 676px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/134811iC0D3A73FFCA97A62/image-size/large?v=v2&amp;amp;px=999" role="button" title="vti_as_source2.png" alt="vti_as_source2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Anyone know why I may be seeing that, and not an actual interface?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And I was hoping to skip any versions 9.10 and up as I'd like to keep firePOWER active, but will upgrade if I have to.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you so much for your reply.&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 19:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487358#M1084414</guid>
      <dc:creator>Ed Melendez</dc:creator>
      <dc:date>2021-10-16T19:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: VTI as Source Interface</title>
      <link>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487360#M1084415</link>
      <description>&lt;P&gt;---------&lt;/P&gt;</description>
      <pubDate>Sat, 16 Oct 2021 19:27:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487360#M1084415</guid>
      <dc:creator>Ed Melendez</dc:creator>
      <dc:date>2021-10-16T19:27:22Z</dc:date>
    </item>
    <item>
      <title>VTI as Source Interface</title>
      <link>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487771#M1084428</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/316176"&gt;@Ed Melendez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Identity means that this traffic was originated from ASA, instead of flowing through. In regular, most frequent flow, traffic enters on one interface (e.g. inside) and leaves on another (e.g. outside), in which case you would see both interfaces in log. In this case, ASA is the one sourcing the traffic (and there is no inbound interface), so it is presented as 'identity'.&lt;/P&gt;&lt;P&gt;Based on this log, I would assume that IP address next to 'identity' is actually IP address of your inside interface, and base on other end ('aws_vti_t1'), it looks to me it is doing exactly what you want. You can do a packet capture on VTI interface, to confirm that this traffic is indeed flowing this way.&lt;/P&gt;&lt;P&gt;You don't need to do an upgrade, as that post was from 2013, so it means it works same way long time ago. You should consider an upgrade, as &lt;A href="https://www.cisco.com/c/en/us/products/collateral/security/asa-firepower-services/eos-eol-notice-c51-743169.html" target="_self"&gt;9.9 is announced EoL&lt;/A&gt; and no fixes are available for it anymore.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 08:44:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vti-as-source-interface/m-p/4487771#M1084428</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-10-18T08:44:52Z</dc:date>
    </item>
  </channel>
</rss>

