<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disabling TCP State Inspaction and TCP Maps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disabling-tcp-state-inspaction-and-tcp-maps/m-p/2916970#M154859</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;On the Cisco ASA firewall I'd like to disable TCP state inspection for intranet traffic that goes through a site2site IPsec VPN tunnel. From my understanding this can be done like that:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list tcp_bypass extended permit tcp &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Intranet1&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Intranet2&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map tcp_bypass&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; match access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list tcp_bypass&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;policy&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; tcp_bypass&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;  &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;set&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; connection advanced&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;options tcp&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;state&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;bypass&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;But I also need to allow TCP options 76-78 for Riverbed Steelhead autodiscovery which is done like that:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;tcp&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map riverbed&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; tcp&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;options range &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;76&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;78&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; allow&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;policy&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;  &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;set&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; connection advanced&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;options riverbed&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Unfortunately this doesn't seem to work. When the first class in the policy-map matches, the following classes are not processed. And trying to put both advanced-options in the same class, results in an error:&amp;nbsp;&lt;SPAN&gt;"ERROR: This option cannot coexist with tcp-map option!"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So why is this not possible?&lt;/P&gt;
&lt;P&gt;What other options are there for IPsec VPN connectivity that does not TCP state inspection? This causes problems with Riverbed SteelHead path selection functionality where it should be able to switch open TCP sessions from one VPN tunnel to another.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Bernd&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:36:48 GMT</pubDate>
    <dc:creator>Network Diver</dc:creator>
    <dc:date>2019-03-12T07:36:48Z</dc:date>
    <item>
      <title>Disabling TCP State Inspaction and TCP Maps</title>
      <link>https://community.cisco.com/t5/network-security/disabling-tcp-state-inspaction-and-tcp-maps/m-p/2916970#M154859</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;On the Cisco ASA firewall I'd like to disable TCP state inspection for intranet traffic that goes through a site2site IPsec VPN tunnel. From my understanding this can be done like that:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list tcp_bypass extended permit tcp &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Intranet1&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;object&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;group&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="typ"&gt;Intranet2&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map tcp_bypass&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; match access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list tcp_bypass&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;policy&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; tcp_bypass&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;  &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;set&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; connection advanced&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;options tcp&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;state&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;bypass&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;But I also need to allow TCP options 76-78 for Riverbed Steelhead autodiscovery which is done like that:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;tcp&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map riverbed&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; tcp&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;options range &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;76&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;78&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; allow&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;policy&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;map global_policy&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;class&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;default&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="pln"&gt;  &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;set&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; connection advanced&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;options riverbed&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;Unfortunately this doesn't seem to work. When the first class in the policy-map matches, the following classes are not processed. And trying to put both advanced-options in the same class, results in an error:&amp;nbsp;&lt;SPAN&gt;"ERROR: This option cannot coexist with tcp-map option!"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So why is this not possible?&lt;/P&gt;
&lt;P&gt;What other options are there for IPsec VPN connectivity that does not TCP state inspection? This causes problems with Riverbed SteelHead path selection functionality where it should be able to switch open TCP sessions from one VPN tunnel to another.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Bernd&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:36:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-tcp-state-inspaction-and-tcp-maps/m-p/2916970#M154859</guid>
      <dc:creator>Network Diver</dc:creator>
      <dc:date>2019-03-12T07:36:48Z</dc:date>
    </item>
  </channel>
</rss>

