<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multi Route Based VPN's to Azure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3814847#M6646</link>
    <description>&lt;P&gt;Personally I would create the tunnels and establish BGP neighbourship across it and let the azure end advertise the relevant vnets towards your organisation&lt;/P&gt;</description>
    <pubDate>Wed, 06 Mar 2019 11:17:41 GMT</pubDate>
    <dc:creator>Dennis Mink</dc:creator>
    <dc:date>2019-03-06T11:17:41Z</dc:date>
    <item>
      <title>Multi Route Based VPN's to Azure</title>
      <link>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3813599#M6643</link>
      <description>&lt;P&gt;Hi we have 5 Site to site VPN's to Microsoft Azure, which are setup as Route based the Azure end, and Policy based VPN on the ASA 5515-x Latest Firmware&lt;/P&gt;
&lt;P&gt;The site to site VPN's Connect OK and pass traffic Fine but sometimes stop passing traffic, we have to disconnect the VPNs and let them reconnect a few times before they start to pass traffic again.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have been advised too setup route based the ASA end, but i need to know how the ASA is going to determine which VPN to send traffic down when all the Configuration examples we have&amp;nbsp; stat 0.0.0.0/0 for both source and destination&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also is this going to have an impact on generally internet Traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3813599#M6643</guid>
      <dc:creator>twstevensuk</dc:creator>
      <dc:date>2020-02-21T16:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Route Based VPN's to Azure</title>
      <link>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3813887#M6644</link>
      <description>&lt;P&gt;The barebones concept of VTI and tunnel-protection is that any traffic that is routed to the tunnel interface is encrypted and send to the other end. So in your case, you can have 5 VTI interfaces with tunnel-protection enabled. Since they seem to be working using policy based VPN's today, the Azure networks have independent network ranges. All you would have to do is create routes for those networks pointing to the VTI ip address of the other end. Or if you have the ability to run BGP on Azure, this should automatically add routes to the ASA's routing table to send it to the right tunnel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tried looking for sample configurations with Azure and the closest I could find was this:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.geekshangout.com/azure-site-to-site-vpn-with-a-cisco-asa-using-asdm/" target="_blank"&gt;https://www.geekshangout.com/azure-site-to-site-vpn-with-a-cisco-asa-using-asdm/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 22:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3813887#M6644</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2019-03-04T22:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Route Based VPN's to Azure</title>
      <link>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3814457#M6645</link>
      <description>&lt;P&gt;Configure a VTI on the ASA, i had the same issue when i created a ipsec IKEV2 tunnel&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 19:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3814457#M6645</guid>
      <dc:creator>trevstan</dc:creator>
      <dc:date>2019-03-05T19:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Multi Route Based VPN's to Azure</title>
      <link>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3814847#M6646</link>
      <description>&lt;P&gt;Personally I would create the tunnels and establish BGP neighbourship across it and let the azure end advertise the relevant vnets towards your organisation&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 11:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multi-route-based-vpn-s-to-azure/m-p/3814847#M6646</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2019-03-06T11:17:41Z</dc:date>
    </item>
  </channel>
</rss>

