<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is PBR actually pushing traffic down VTI tunnels on FTD? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273763#M1120205</link>
    <description>Ok thanks. I only did the PBR part. Is the route map required always aswell&lt;BR /&gt;As the flex config? Which parts are essential?&lt;BR /&gt;</description>
    <pubDate>Fri, 21 Mar 2025 06:18:05 GMT</pubDate>
    <dc:creator>NetworkMonkey101</dc:creator>
    <dc:date>2025-03-21T06:18:05Z</dc:date>
    <item>
      <title>Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273618#M1120189</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have three VTI tunnels using ECMP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to push traffic from 10.167.0.0/19 down these tunnels using PBR.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1742490560018.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242147iE1BBF2606CF8BA72/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1742490560018.png" alt="NetworkMonkey101_0-1742490560018.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After making the change users can still get to the internet but I am unsure if PBR is working or is the traffic just going out thr OUTSIDE interface and not the VTI (via the OUTSIDE) Interface&lt;/P&gt;&lt;P&gt;I did a packet tracer and here are the results.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_1-1742490636542.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242150i33228B8B7E9B0D20/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_1-1742490636542.png" alt="NetworkMonkey101_1-1742490636542.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_2-1742490682912.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242151i6B7634F2079610C4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_2-1742490682912.png" alt="NetworkMonkey101_2-1742490682912.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_3-1742490713608.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242152i5BEF211382885E0F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_3-1742490713608.png" alt="NetworkMonkey101_3-1742490713608.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_4-1742490744382.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242153iA4E59E53D028AB3D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_4-1742490744382.png" alt="NetworkMonkey101_4-1742490744382.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can i test and prove this is working as expected?&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 17:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273618#M1120189</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-03-20T17:12:39Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273714#M1120196</link>
      <description>&lt;P&gt;What is your Route-map and routing look like :&lt;/P&gt;
&lt;P&gt;Check some example PBR to get an idea of how you can create:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.defenseorchestrator.com/cdfmc/t-configuration-example-for-policy-based-routing.html" target="_blank"&gt;https://docs.defenseorchestrator.com/cdfmc/t-configuration-example-for-policy-based-routing.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/217588-configure-pbr-with-ip-slas-for-dual-isp.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/217588-configure-pbr-with-ip-slas-for-dual-isp.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 00:27:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273714#M1120196</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-21T00:27:03Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273763#M1120205</link>
      <description>Ok thanks. I only did the PBR part. Is the route map required always aswell&lt;BR /&gt;As the flex config? Which parts are essential?&lt;BR /&gt;</description>
      <pubDate>Fri, 21 Mar 2025 06:18:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273763#M1120205</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-03-21T06:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273793#M1120210</link>
      <description>&lt;P&gt;check the document which explain how you can do.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 07:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273793#M1120210</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-03-21T07:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273806#M1120211</link>
      <description>&lt;P&gt;I have read the document but I am trying to send the traffic down 3 VTIs using ECMP.. Can that not be done using static routes?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 08:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273806#M1120211</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-03-21T08:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273810#M1120212</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Yes, &lt;STRONG&gt;PBR (Policy-Based Routing)&lt;/STRONG&gt; can push traffic down &lt;STRONG&gt;VTI (Virtual Tunnel Interface)&lt;/STRONG&gt; tunnels on &lt;STRONG&gt;FTD (Firepower Threat Defense)&lt;/STRONG&gt;, but it depends on the specific configuration. PBR allows for routing traffic based on policies, which can include routing traffic over a VTI tunnel, depending on the conditions specified in the policy.&lt;/P&gt;&lt;P&gt;To confirm it's working, make sure the following are in place:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Correct PBR Policy&lt;/STRONG&gt; – Ensure the PBR policy is set to direct traffic to the VTI tunnel.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;VTI Configuration&lt;/STRONG&gt; – The VTI should be properly configured for IPsec VPN or other relevant tunneling protocols.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Routing Table&lt;/STRONG&gt; – Verify that the routing table reflects the PBR changes and directs the traffic as intended.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;You can check the traffic flow and logs to ensure the traffic is indeed using the VTI tunnel when the PBR policy is applied. If you’re still facing issues, it might help to verify your policy conditions or inspect the tunnel's status.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Mar 2025 08:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273810#M1120212</guid>
      <dc:creator>jameswood32</dc:creator>
      <dc:date>2025-03-21T08:58:39Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273812#M1120214</link>
      <description>&lt;P&gt;Are you saying that static routes and route maps are not required to get this to work and it can all be done via device &amp;gt; routing &amp;gt; pbr&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 09:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273812#M1120214</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-03-21T09:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273858#M1120222</link>
      <description>&lt;P&gt;I have setup PBR and ran a packet capture here are the results. I am unsure if the traffic for 10.167.0.0/19 is being pushed down the VTI tunnels or just leaving the OUTSIDE interface. As mentioned the VTIs use the OUTSIDE interface so would they should as a hop or would it just state VTI?&lt;/P&gt;&lt;P&gt;Interface: Ethernet1/1.1505&lt;BR /&gt;VLAN ID:&lt;BR /&gt;Protocol: TCP&lt;BR /&gt;Source Type: IPv4&lt;BR /&gt;Source IP value: 10.167.10.1&lt;BR /&gt;Source Port: 1&lt;BR /&gt;Source SPI:&lt;BR /&gt;Destination Type: IPv4&lt;BR /&gt;Destination IP value: 8.8.8.8&lt;BR /&gt;Destination port: 443&lt;BR /&gt;Inline Tag:&lt;BR /&gt;Treat simulated packet as IPsec/SSL VPN decrypt: false&lt;BR /&gt;Bypass all security checks for simulated packet: false&lt;BR /&gt;Allow simulated packet to transmit from device: false&lt;BR /&gt;Select Device: SRHT-DC2-PFW-GAMMA&lt;BR /&gt;Run trace on all cluster members: false&lt;/P&gt;&lt;P&gt;Device details&lt;BR /&gt;Name: SRHT-DC2-PFW-GAMMA&lt;BR /&gt;ID: bd7d4e02-62a9-11ee-9301-d6c0937bc89e&lt;BR /&gt;Type: Device&lt;/P&gt;&lt;P&gt;Phase 1&lt;BR /&gt;ID: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: Implicit Rule&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x14e0b75f50c0, priority=1, domain=permit, deny=false hits=3490144848, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=VRF_GAMMA_GUEST, output_ifc=any&lt;BR /&gt;Elapsed Time: 10235 ns&lt;/P&gt;&lt;P&gt;Phase 2&lt;BR /&gt;ID: 2&lt;BR /&gt;Type: SUBOPTIMAL-LOOKUP&lt;BR /&gt;Subtype: suboptimal next-hop&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Input route lookup returned ifc GAMMA_OUTSIDE:GAMMA_OUTSIDE is not same as existing ifc Secure_Boundary:RM3-NCA-RN5_Gam1ADoing adjacency lookup on existing ifc Secure_Boundary:RM3-NCA-RN5_Gam1A&lt;BR /&gt;Elapsed Time: 13350 ns&lt;/P&gt;&lt;P&gt;Phase 3&lt;BR /&gt;ID: 3&lt;BR /&gt;Type: SUBOPTIMAL-LOOKUP&lt;BR /&gt;Subtype: suboptimal next-hop&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Input route lookup returned ifc GAMMA_OUTSIDE:GAMMA_OUTSIDE is not same as existing ifc Secure_Boundary:RM3-NCA-RN6_Gam1BDoing adjacency lookup on existing ifc Secure_Boundary:RM3-NCA-RN6_Gam1B&lt;BR /&gt;Elapsed Time: 890 ns&lt;/P&gt;&lt;P&gt;Phase 4&lt;BR /&gt;ID: 4&lt;BR /&gt;Type: SUBOPTIMAL-LOOKUP&lt;BR /&gt;Subtype: suboptimal next-hop&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Input route lookup returned ifc GAMMA_OUTSIDE:GAMMA_OUTSIDE is not same as existing ifc Secure_Boundary:RM3-NCA-RN7_Gam1CDoing adjacency lookup on existing ifc Secure_Boundary:RM3-NCA-RN7_Gam1C&lt;BR /&gt;Elapsed Time: 1335 ns&lt;/P&gt;&lt;P&gt;Phase 5&lt;BR /&gt;ID: 5&lt;BR /&gt;Type: PBR-LOOKUP&lt;BR /&gt;Subtype: policy-route&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: route-map FMC_GENERATED_PBR_1741891693329 permit 5 match ip address Allow-WIFI-Guest set adaptive-interface cost RM3-NCA-RN5_Gam1A RM3-NCA-RN6_Gam1B RM3-NCA-RN7_Gam1C&lt;BR /&gt;Additional Information: Matched route-map FMC_GENERATED_PBR_1741891693329, sequence 5, permit&lt;BR /&gt;Elapsed Time: 890 ns&lt;/P&gt;&lt;P&gt;Phase 6&lt;BR /&gt;ID: 6&lt;BR /&gt;Type: IMPORTED-ROUTE&lt;BR /&gt;Subtype: vrf imported route&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: in 0.0.0.0 0.0.0.0 via 0.0.0.0, GAMMA_OUTSIDE (Imported Route) - 12&lt;BR /&gt;Elapsed Time: 1335 ns&lt;/P&gt;&lt;P&gt;Phase 7&lt;BR /&gt;ID: 7&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found next-hop 0.0.0.0 using egress ifc GAMMA_OUTSIDE(vrfid:0)&lt;BR /&gt;Elapsed Time: 445 ns&lt;/P&gt;&lt;P&gt;Phase 8&lt;BR /&gt;ID: 8&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: access-group CSM_FW_ACL_ globalaccess-list CSM_FW_ACL_ advanced permit ip any any rule-id 268451843 access-list CSM_FW_ACL_ remark rule-id 268451843: ACCESS POLICY: GAMMA_PFW_ACP - Mandatoryaccess-list CSM_FW_ACL_ remark rule-id 268451843: L7 RULE: ICMP Everywhere&lt;BR /&gt;Additional Information: This packet will be sent to snort for additional processing where a verdict will be reached Forward Flow based lookup yields rule: in id=0x14e0b95b4a80, priority=12, domain=permit, deny=false hits=573906595, user_data=0x14e195ffcc00, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, ifc=any, vlan=0, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 2581 ns&lt;/P&gt;&lt;P&gt;Phase 9&lt;BR /&gt;ID: 9&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: class-map class-default match anypolicy-map global_policy class class-default set connection advanced-options UM_STATIC_TCP_MAPservice-policy global_policy global&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x14e0bbb85c20, priority=7, domain=conn-set, deny=false hits=202268459, user_data=0x14e0b5d61760, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=VRF_GAMMA_GUEST(vrfid:1), output_ifc=any&lt;BR /&gt;Elapsed Time: 2581 ns&lt;/P&gt;&lt;P&gt;Phase 10&lt;BR /&gt;ID: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: nat (VRF_GAMMA_GUEST,GAMMA_OUTSIDE) source static SCO-Guest-Range obj-164.39.215.59&lt;BR /&gt;Additional Information: Static translate 10.167.10.1/1 to 164.39.215.59/1 Forward Flow based lookup yields rule: in id=0x14e1d60880e0, priority=6, domain=nat, deny=false hits=156724505, user_data=0x14e1d49d76f0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.167.0.0, mask=255.255.224.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=VRF_GAMMA_GUEST(vrfid:1), output_ifc=GAMMA_OUTSIDE(vrfid:0)&lt;BR /&gt;Elapsed Time: 2581 ns&lt;/P&gt;&lt;P&gt;Phase 11&lt;BR /&gt;ID: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x14e1b59269c0, priority=0, domain=nat-per-session, deny=false hits=2141715424, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 2581 ns&lt;/P&gt;&lt;P&gt;Phase 12&lt;BR /&gt;ID: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x14e0b49cb6c0, priority=0, domain=inspect-ip-options, deny=true hits=208145808, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=VRF_GAMMA_GUEST(vrfid:1), output_ifc=any&lt;BR /&gt;Elapsed Time: 2581 ns&lt;/P&gt;&lt;P&gt;Phase 13&lt;BR /&gt;ID: 13&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: in id=0x14e0b8e53260, priority=20, domain=lu, deny=false hits=123574343, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=VRF_GAMMA_GUEST(vrfid:1), output_ifc=any&lt;BR /&gt;Elapsed Time: 8900 ns&lt;/P&gt;&lt;P&gt;Phase 14&lt;BR /&gt;ID: 14&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config: nat (VRF_GAMMA_GUEST,GAMMA_OUTSIDE) source static SCO-Guest-Range obj-164.39.215.59&lt;BR /&gt;Additional Information: Forward Flow based lookup yields rule: out id=0x14e1d24ceb30, priority=6, domain=nat-reverse, deny=false hits=159691429, user_data=0x14e1dd1a5a40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.167.0.0, mask=255.255.224.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=VRF_GAMMA_GUEST(vrfid:1), output_ifc=GAMMA_OUTSIDE(vrfid:0)&lt;BR /&gt;Elapsed Time: 2670 ns&lt;/P&gt;&lt;P&gt;Phase 15&lt;BR /&gt;ID: 15&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x14e1b59269c0, priority=0, domain=nat-per-session, deny=false hits=2141715426, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any&lt;BR /&gt;Elapsed Time: 15575 ns&lt;/P&gt;&lt;P&gt;Phase 16&lt;BR /&gt;ID: 16&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Reverse Flow based lookup yields rule: in id=0x14e1cfb65c00, priority=0, domain=inspect-ip-options, deny=true hits=1722361105, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=GAMMA_OUTSIDE(vrfid:0), output_ifc=any&lt;BR /&gt;Elapsed Time: 0 ns&lt;/P&gt;&lt;P&gt;Phase 17&lt;BR /&gt;ID: 17&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: New flow created with id 1671614994, packet dispatched to next moduleModule information for forward flow ...snp_fp_inspect_ip_optionssnp_fp_tcp_normalizersnp_fp_tcp_proxysnp_fp_snortsnp_fp_tcp_proxysnp_fp_translatesnp_fp_tcp_normalizersnp_fp_adjacencysnp_fp_fragmentsnp_fp_tracer_dropsnp_ifc_statModule information for reverse flow ...snp_fp_inspect_ip_optionssnp_fp_tcp_normalizersnp_fp_translatesnp_fp_tcp_proxysnp_fp_snortsnp_fp_tcp_proxysnp_fp_tcp_normalizersnp_fp_adjacencysnp_fp_fragmentsnp_fp_tracer_dropsnp_ifc_stat&lt;BR /&gt;Elapsed Time: 11125 ns&lt;/P&gt;&lt;P&gt;Phase 18&lt;BR /&gt;ID: 18&lt;BR /&gt;Type: EXTERNAL-INSPECT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Application: 'SNORT Inspect'&lt;BR /&gt;Elapsed Time: 9790 ns&lt;/P&gt;&lt;P&gt;Phase 19&lt;BR /&gt;ID: 19&lt;BR /&gt;Type: SNORT&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Snort Trace:Packet: TCP, SYN, seq 2113366982Session: new snort sessionAppID: service DNS over HTTPS (4624), application unknown (0)Firewall: starting AC rule matching, zone 20 -&amp;gt; 3, geo 0 -&amp;gt; 0, vlan 0, sgt 0, src sgt type 0, dest_sgt_tag 0, dest sgt type 0, user 9999997, icmpType 0, icmpCode 0Firewall: allow rule, id 268440591, allowSnort id 0, NAP id 3, IPS id 0, Verdict PASS, Blocked by SSLSnort Verdict: (pass-packet) allow this packet&lt;BR /&gt;Elapsed Time: 391600 ns&lt;/P&gt;&lt;P&gt;Phase 20&lt;BR /&gt;ID: 20&lt;BR /&gt;Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Preferred Egress interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found next-hop 164.39.215.37 using egress ifc GAMMA_OUTSIDE(vrfid:0)&lt;BR /&gt;Elapsed Time: 4005 ns&lt;/P&gt;&lt;P&gt;Phase 21&lt;BR /&gt;ID: 21&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: Resolve Nexthop IP address to MAC&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information: Found adjacency entry for Next-hop 164.39.215.37 on interface GAMMA_OUTSIDEAdjacency :ActiveMAC address 0000.0c07.ac01 hits 490719309 reference 129272&lt;BR /&gt;Elapsed Time: 1335 ns&lt;/P&gt;&lt;P&gt;Result&lt;BR /&gt;Input Interface: VRF_GAMMA_GUEST(vrfid:1)&lt;BR /&gt;Input Status: up&lt;BR /&gt;Input Line Status: up&lt;BR /&gt;Output Interface: GAMMA_OUTSIDE(vrfid:0)&lt;BR /&gt;Output Status: up&lt;BR /&gt;Output Line Status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;Time Taken: 486385 ns&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 11:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273858#M1120222</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-03-21T11:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: Is PBR actually pushing traffic down VTI tunnels on FTD?</title>
      <link>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273898#M1120225</link>
      <description>&lt;P&gt;The imported route is to the outside but I have no idea where this is coming from?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_0-1742564627117.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242187iEDB63199E8F396A6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_0-1742564627117.png" alt="NetworkMonkey101_0-1742564627117.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I have tested from a working FTD on another network and the PBR there is picking up the next hop.&lt;/P&gt;&lt;P&gt;Why is this not on mine?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NetworkMonkey101_1-1742566144043.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/242189i7353A6451F9F4FDA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NetworkMonkey101_1-1742566144043.png" alt="NetworkMonkey101_1-1742566144043.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 14:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-pbr-actually-pushing-traffic-down-vti-tunnels-on-ftd/m-p/5273898#M1120225</guid>
      <dc:creator>NetworkMonkey101</dc:creator>
      <dc:date>2025-03-21T14:09:16Z</dc:date>
    </item>
  </channel>
</rss>

