01-24-2017 06:13 AM
I just read over the release notes for the new 9.7.1 release and stumbled upon this:
Virtual Tunnel Interface (VTI) support for ASA VPN module |
The ASA VPN module is enhanced with a new logical interface called Virtual Tunnel Interface (VTI), used to represent a VPN tunnel to a peer. This supports route based VPN with IPsec profiles attached to each end of the tunnel. Using VTI does away with the need to configure static crypto map access lists and map them to interfaces. We introduced the following commands: crypto ipsec profile, interface tunnel, responder-only, set ikev1 transform-set, set pfs, set security-association lifetime, tunnel destination, tunnel mode ipsec, tunnel protection ipsec profile, tunnel source interface. |
Finally a dream becomes true! Thank you Cisco! :)
09-20-2017 07:12 AM
I was able to get this tested and working using an ASA5506 and an ISR4331. I thought someone looking might find this configuration helpful to get started.
ROUTER CONFIGURATIONS FOR VTI VPN
crypto isakmp policy 10
encr aes 256
authentication pre-share
group 2
lifetime 86400
crypto isakmp key cisco1234 address 1.1.1.1
crypto ipsec transform-set SET1 esp-3des esp-sha-hmac
mode tunnel
crypto ipsec profile MY_PROFILE
set transform-set SET1
interface Tunnel0
ip address 10.1.1.2 255.255.255.0
tunnel source 1.1.1.2
tunnel mode ipsec ipv4
tunnel destination 1.1.1.1
tunnel protection ipsec profile MY_PROFILE
****************************************************************************************************************************
ASA CONFIGURATIONS FOR VTI VPN
interface Tunnel1
nameif TUNNEL1
ip address 10.1.1.1 255.255.255.0
tunnel source interface outside
tunnel destination 1.1.1.2
tunnel mode ipsec ipv4
tunnel protection ipsec profile MY_PROFILE
crypto ipsec ikev1 transform-set SET1 esp-3des esp-sha-hmac
crypto ipsec profile MY_PROFILE
set ikev1 transform-set SET1
responder-only
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
tunnel-group 1.1.1.2 type ipsec-l2l
tunnel-group 1.1.1.2 ipsec-attributes
ikev1 pre-shared-key cisco1234
11-04-2017 07:22 PM
It looks like sVTI is supported. I am trying to run remote-access vpn, does asa 9.8.1 support running dVTI ?
02-11-2018 06:23 AM
Hello,
I would like to configure Route Based VPN with Cisco ASA 5505 to Azure,
I have referred the multiple blogs and tutorial, but I was not successful,
if any buddy has an idea, about the configuration, request you to please share.
05-09-2018 12:40 AM
I have created a tutorial based on what i found in this thread, and I have a working Route based site2site tunnel with Azure, from a ASA5506-X (With asa 9.8.2) to a Azure VPN gateway
Link: https://kasperk.it/cisco/asa/cisco-asa-route-based-site-to-site-vpn-to-azure
05-09-2018 12:43 AM
08-09-2019 09:13 AM
If they add GRE tunnels and Loopback interfaces and VRF's, I might start using ASA's for IPSEC. Currently I much prefer the FlexVPN on IOS.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide