<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD VTI tunnels limit in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839962#M1100631</link>
    <description>&lt;P&gt;OK, let me provide some updates. It seems FPR1010 doesn't like more than one VTI with FPR1010 on far end. 9 of 10 VTIs are with ASA 5506 on far end with only one VTI with FPR1010 on far end. I've removed all my 9 VTIs with ASA (while keeping one VTI with FPR1010) and added one VTI with FPR1010 on far end. They don't work. New VTI runs for around 20 seconds and drops while the original VTI doesn't come up (it was working before I added new VTI).&amp;nbsp;&lt;/P&gt;&lt;P&gt;My local FRP1010 runs version 7.0.1 while all far end FPR1010 runs version 7.1.0. I'll try to upgrade the local FPR1010 to the version 7.1.0 and check if it helps.&lt;/P&gt;</description>
    <pubDate>Mon, 22 May 2023 04:43:26 GMT</pubDate>
    <dc:creator>NUSFETLEN</dc:creator>
    <dc:date>2023-05-22T04:43:26Z</dc:date>
    <item>
      <title>FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4838664#M1100531</link>
      <description>&lt;P&gt;I use FTD (FPR1010) for VTI tunnels to remote sites. When I have 10 tunnels, they are all stable, however, as soon as I add new tunnel it works but flopping periodically. As more new tunnels are added, they flop more frequently. At the same time, the original 10 tunnels are still stable (only new tunnels are flopping). It looks weird to me. Does the FPR1010 have a limit on number of VTI tunnels? Should I switch to the next version (FPR1012) to have more than 10 tunnels (actually I need around 50 tunnels from the FTD)? With ASA 5506 I could have around 25 VTI tunnels without any issue.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 22:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4838664#M1100531</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-18T22:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4838695#M1100532</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 900px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/185042iF43C1F90ED490A9F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;the Firepower 1010 support up to 300 mbps vpn throughput.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 23:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4838695#M1100532</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-18T23:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4838862#M1100542</link>
      <description>&lt;P&gt;You can create up to 100 VTIs per source interface, and a maximum of 1000 VTIs.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/670/fdm/fptd-fdm-config-guide-670/fptd-fdm-s2svpn.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/670/fdm/fptd-fdm-config-guide-670/fptd-fdm-s2svpn.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;you 1010 only support up to 75 vpn tunnel and if you requirement is more then this in that case you might have to consider to upgrade your FTD unit. the way you describe your issue it seems the FTD 1010 can not handel the traffic flow it might doing more cpu processes on the other part (either control plane/mgmt plane) doing the IPS inspection. so yes could be this is the issue. did you check when you had these issues on the vpn what is the processes utlization on the box?&lt;/P&gt;
&lt;P&gt;what is the presentation of your Internet line? was it the same internet line you used for the ASA too?&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2023 09:08:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4838862#M1100542</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-19T09:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839223#M1100559</link>
      <description>&lt;P&gt;I've disabled IPS inspection, but it doesn't help. The 10 VTI tunnels work perfect. As soon as I add a new VTI tunnel, it doesn't work stable and also affect one existing VTI tunnel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Data Plane and System memories are the same as before while Snort memory has increased from 24% to 38%. The Control Plane CPU has increased from 0.3 to 0.7.&lt;/P&gt;&lt;P&gt;BTW, the FTD version is 7.0.1 while FMC version is 7.1.0.&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2023 19:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839223#M1100559</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-19T19:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839519#M1100589</link>
      <description>&lt;P&gt;Probably I should open a ticket with Cisco TAC on this.&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2023 16:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839519#M1100589</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-20T16:00:38Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839530#M1100592</link>
      <description>&lt;P&gt;I am sure the unit FTD 1010 is definitely capable to support more than 10 VTI. it could be some how software bug playing up with this. But if you have cisco TAC support please open case with them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your CPU processor look normal in given circusmstance. worth giving tac a shout on this.&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2023 16:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839530#M1100592</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-20T16:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839531#M1100593</link>
      <description>&lt;P&gt;It can we look in different direction'&lt;/P&gt;
&lt;P&gt;It can that the vti effect fpr routing and effect all other vti.&lt;/P&gt;
&lt;P&gt;You say that over 10 vti' disable old vti and enable new vti and see if the fpr show same issue or not.&lt;/P&gt;</description>
      <pubDate>Sat, 20 May 2023 16:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839531#M1100593</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-20T16:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839961#M1100630</link>
      <description>&lt;P&gt;10 VTIs work perfect. As soon as I add the 11th VTI, it doesn't work stable (it stays Up for around 20 seconds and drops). Also, one of the old VTIs stars flopping as soon as the 11th VTI is added. As soon as the 11th VTI is deleted, the original 10 VTIs become stable again.&lt;/P&gt;&lt;P&gt;I'll try to add the 11th VTI and remove one of the original VTIs and see if the new 10 VTIs are stable.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 04:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839961#M1100630</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-22T04:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839962#M1100631</link>
      <description>&lt;P&gt;OK, let me provide some updates. It seems FPR1010 doesn't like more than one VTI with FPR1010 on far end. 9 of 10 VTIs are with ASA 5506 on far end with only one VTI with FPR1010 on far end. I've removed all my 9 VTIs with ASA (while keeping one VTI with FPR1010) and added one VTI with FPR1010 on far end. They don't work. New VTI runs for around 20 seconds and drops while the original VTI doesn't come up (it was working before I added new VTI).&amp;nbsp;&lt;/P&gt;&lt;P&gt;My local FRP1010 runs version 7.0.1 while all far end FPR1010 runs version 7.1.0. I'll try to upgrade the local FPR1010 to the version 7.1.0 and check if it helps.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 04:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4839962#M1100631</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-22T04:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840073#M1100642</link>
      <description>&lt;P&gt;This is very Interesting. 2xFTD 1010 the VTI does not work. Are they managed FTD through FMC?&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 08:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840073#M1100642</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-22T08:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840105#M1100650</link>
      <description>&lt;P&gt;Can I see how you config the VTI&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 09:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840105#M1100650</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-22T09:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840388#M1100695</link>
      <description>&lt;P&gt;Yes, they are all managed by FMCs, separate FMC for each FTD so far.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 17:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840388#M1100695</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-22T17:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840391#M1100698</link>
      <description>&lt;P&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;Tunnel1 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel3 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel10 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel16 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel22 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel29 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel30 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel32 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel34 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel35 x.x.x.x YES CONFIG up up&lt;BR /&gt;Tunnel38 x.x.x.x YES CONFIG down down&lt;BR /&gt;Tunnel41 x.x.x.x YES CONFIG down down&lt;/P&gt;&lt;P&gt;interface Tunnel35&lt;BR /&gt;nameif Jefferson&lt;BR /&gt;ip address x.x.x.x 255.255.255.252&lt;BR /&gt;tunnel source interface outside&lt;BR /&gt;tunnel destination y.y.y.y&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel protection ipsec profile FMC_IPSEC_PROFILE_3&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel41&lt;BR /&gt;nameif Baker&lt;BR /&gt;ip address 169.254.10.154 255.255.255.252&lt;BR /&gt;tunnel source interface outside&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;#The respective IPSEC tunnel is removed&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel38&lt;BR /&gt;nameif Macon_1&lt;BR /&gt;ip address 169.254.10.142 255.255.255.252&lt;BR /&gt;tunnel source interface outside&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;#The respective IPSEC tunnel is removed&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 17:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840391#M1100698</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-22T17:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840493#M1100714</link>
      <description>&lt;P&gt;I've upgraded the FTD from version 7.0.1 to 7.1.0, but it doesn't help. The issue is still there.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840493#M1100714</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-22T19:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840496#M1100715</link>
      <description>&lt;P&gt;this same major subnet&amp;nbsp;&lt;SPAN&gt;169.254.10.x 255.255.255.x&lt;BR /&gt;check if there is conflict&amp;nbsp;in IP&amp;nbsp;&lt;BR /&gt;also this IP is 169.x is used in case of system not get ip from DHCP server, why you use it?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 19:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840496#M1100715</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-22T19:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840509#M1100716</link>
      <description>&lt;P&gt;does this VTI flap happens on both FTD units or its only happen to your side of FTD? (if you have access to Both FTD run the below command on both FTD/s as it will give more insight details to us)&lt;/P&gt;
&lt;P&gt;even after upgrading the software does not fix the issue in that cause next step is we need to collection some debug from your side of the FTD unit. If i remember the issue is at your side (apologies for that).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you need to SSH into the FTD command line. once you in the command line. &lt;SPAN&gt;To enter Privileged EXEC mode use &lt;/SPAN&gt;&lt;STRONG&gt;system support diagnostic -cli&lt;/STRONG&gt;&lt;SPAN&gt; command&lt;/SPAN&gt;. once in there. follow these command and display the output here. Ideally, we need to understand what causing this issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;debug crypto condition peer X.X.X.X  (Public IP address of the remote FTD)
debug crypto ikev2 platform 255
debug crypto ikev2 protocol 255
debug crypto ipsec
!
capture VTI type ikv2 interface outside match ip host x.x.x.x host y.y.y.y&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The capture VTI as mentioned above you can configure these capture from the FMC that would be more better and easily off-load on to the wireshark.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(Note:I assume you running IKEV2?)&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 20:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4840509#M1100716</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-22T20:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4844010#M1100945</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I've found a fix of the problem. For each tunnel with FTD at the far end, I've added a unique Local Identity Configuration Key ID. After that all tunnels are Up and stable. It seems the reason was that IP address of each remote FTD's outside interface behind NAT is the same on all remote FTDs, and each FDT uses this IP address as ID by default. This explains why only one tunnel at a time was up for about 20 seconds until another tunnel with the same ID was coming Up. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 18:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4844010#M1100945</guid>
      <dc:creator>NUSFETLEN</dc:creator>
      <dc:date>2023-05-27T18:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: FTD VTI tunnels limit</title>
      <link>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4844011#M1100946</link>
      <description>&lt;P&gt;happy ending in end&lt;BR /&gt;have a nice day&amp;nbsp;&lt;BR /&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 May 2023 19:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-vti-tunnels-limit/m-p/4844011#M1100946</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-27T19:21:29Z</dc:date>
    </item>
  </channel>
</rss>

