<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asymmetric Flow on ASA5506 VTI tunnel interfaces VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3908064#M26555</link>
    <description>&lt;P&gt;What I ended up doing is advertising a higher BGP cost over one tunnel versus the other (my scenario involved BGP so that worked for me). But it's IMO not ideal...&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2019 12:42:27 GMT</pubDate>
    <dc:creator>om2010</dc:creator>
    <dc:date>2019-08-14T12:42:27Z</dc:date>
    <item>
      <title>Asymmetric Flow on ASA5506 VTI tunnel interfaces VPN</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3834528#M26553</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've configured an ASA 5506X with 2 VTI tunnel interfaces to a cloud provider, and I'm getting asymmetric routing (which is to be expected at times). Now, the issue I would like to solve is to tell the ASA to be able to perform stateful inspection across two different VTI tunnels. I've thought that I could use this :&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/conns-connlimits.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-config/conns-connlimits.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;for example to use a policy-map to do a TCP State Bypass, but what about UDP? And what about ICMP? Moreover, this doesn't work on VTI or at least I'm not sure how to do this on VTI interfaces. I'm using 9.8.x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any clue?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2019 21:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3834528#M26553</guid>
      <dc:creator>om2010</dc:creator>
      <dc:date>2019-04-08T21:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric Flow on ASA5506 VTI tunnel interfaces VPN</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3908041#M26554</link>
      <description>I have the same problem.&lt;BR /&gt;&lt;BR /&gt;I'm thinking IP SLA or BGP rather than static routes so only one route is in the ASA's table at a time.&lt;BR /&gt;&lt;BR /&gt;Would love to enable asymmetric across two VTI's though</description>
      <pubDate>Wed, 14 Aug 2019 12:08:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3908041#M26554</guid>
      <dc:creator>Mark Woollam</dc:creator>
      <dc:date>2019-08-14T12:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric Flow on ASA5506 VTI tunnel interfaces VPN</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3908064#M26555</link>
      <description>&lt;P&gt;What I ended up doing is advertising a higher BGP cost over one tunnel versus the other (my scenario involved BGP so that worked for me). But it's IMO not ideal...&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 12:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/3908064#M26555</guid>
      <dc:creator>om2010</dc:creator>
      <dc:date>2019-08-14T12:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetric Flow on ASA5506 VTI tunnel interfaces VPN</title>
      <link>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/4874684#M1102664</link>
      <description>&lt;P&gt;Hi Oliver, what do you mean by higher cost. I guess you prepend the ASPATH on VTI-1 and leave the defaults on the VTI-2?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jul 2023 18:38:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetric-flow-on-asa5506-vti-tunnel-interfaces-vpn/m-p/4874684#M1102664</guid>
      <dc:creator>perpey</dc:creator>
      <dc:date>2023-07-14T18:38:38Z</dc:date>
    </item>
  </channel>
</rss>

