{"pageModel":{"attributes":{"id":"","name":"121339.dita","viewName":"DitaDetail"},"elements":{"ditaContent":{"name":"DITAContent","value":"<article id=\"configure-tunnels-with-cisco-adaptive-security-appliance\" class=\"topic task\">\r\n<h1 class=\"title topictitle1\">Configure Tunnels with Cisco Adaptive Security Appliance</h1>\r\n<div class=\"body taskbody\">\r\n<section class=\"section context\">\r\n<p class=\"p\">This guide walks you through connecting a Cisco Adaptive Security Appliance (ASA) firewall\r\n        to Cisco Secure Access using one or two IKEv2 IPsec tunnels via Virtual Tunnel Interfaces\r\n        (VTI).</p>\r\n</section>\r\n<div class=\"section prereq p\">\r\n<div class=\"tasklabel\">\r\n<h1 font-weight=\"bold\" class=\"sectiontitle tasklabel cB_Bold\">Before you begin</h1>\r\n</div>\r\n<table width=\"100%\" border=\"1\">\r\n<caption>\r\n<span class=\"table--title-label table title\">Table 1. </span>\r\n<span class=\"tabletitle\">Cisco Secure Access requirements</span>\r\n</caption>\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Requirement</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Details</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">Cisco Secure Access account</td>\r\n<td headers=\"\" align=\"\">A valid, active account</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Organization ID</td>\r\n<td headers=\"\" align=\"\">Refer to  <a data-scope=\"local\" target=\"\" href=\"docs/csa/olh/121404.dita\" title=\"\">Find Your Organization ID</a>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Network Tunnel Group</td>\r\n<td headers=\"\" align=\"\">Must be pre-configured in Secure Access. Refer to  <a data-scope=\"external\" target=\"_blank\" href=\"https://docs.sse.cisco.com/sse-user-guide/docs/add-network-tunnel-group\" title=\"\">Add a Network Tunnel Group</a>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-tips.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\">When adding a network tunnel group, select the data center closest to your\r\n        ASA's geographic location to minimize latency.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<table width=\"100%\" border=\"1\">\r\n<caption>\r\n<span class=\"table--title-label table title\">Table 2. </span>\r\n<span class=\"tabletitle\">Cisco ASA requirements</span>\r\n</caption>\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Requirement</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Details</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">Hardware</td>\r\n<td headers=\"\" align=\"\">Cisco ASA firewall</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Licensing</td>\r\n<td headers=\"\" align=\"\">Security K9 license and ASA Base or Security Plus license</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Software</td>\r\n<td headers=\"\" align=\"\">ASA 9.x with IKEv2 support (refer to <strong class=\"ph b\">ASA version and NAT and IKEv2\r\n                  identity</strong> below)</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<table width=\"100%\" border=\"1\">\r\n<caption>\r\n<span class=\"table--title-label table title\">Table 3. </span>\r\n<span class=\"tabletitle\">Network requirements</span>\r\n</caption>\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Requirement</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Details</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">UDP port 500</td>\r\n<td headers=\"\" align=\"\">Open outbound (IKE negotiation)</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">UDP port 4500</td>\r\n<td headers=\"\" align=\"\">Open outbound (NAT Traversal)</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Outbound connectivity</td>\r\n<td headers=\"\" align=\"\">No firewall blocks to Cisco Secure Access data center IPs</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<p class=\"p\">Your ASA software version determines how IKEv2 identity is handled and whether the ASA can\r\n        operate behind NAT.<table width=\"100%\" border=\"1\">\r\n<caption>\r\n<span class=\"table--title-label table title\">Table 4. </span>\r\n<span class=\"tabletitle\">ASA version and NAT and IKEv2 identity</span>\r\n</caption>\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\"></th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">ASA 9.16 and Earlier</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">ASA 9.17 and Later</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">NAT support</td>\r\n<td headers=\"\" align=\"\">Not supported — ASA must not be behind NAT</td>\r\n<td headers=\"\" align=\"\">Supported — ASA can be behind NAT</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">IKEv2 identity</td>\r\n<td headers=\"\" align=\"\">Automatically uses the interface IPv4 address</td>\r\n<td headers=\"\" align=\"\">Supports per-tunnel identity and FQDN identity</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">External interface IP</td>\r\n<td headers=\"\" align=\"\">Must be a static, publicly routable IPv4 address configured directly on the\r\n                  ASA interface</td>\r\n<td headers=\"\" align=\"\">No restriction</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Secure Access tunnel type</td>\r\n<td headers=\"\" align=\"\">Standard configuration</td>\r\n<td headers=\"\" align=\"\">Set <span class=\"ph uicontrol\">Tunnel Type</span> to <code class=\"ph codeph\">Other</code> and\r\n                    <span class=\"ph uicontrol\">Authentication</span> to <code class=\"ph codeph\">FQDN</code>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Additional ASA config</td>\r\n<td headers=\"\" align=\"\">None</td>\r\n<td headers=\"\" align=\"\">Add to IPsec profile: <code class=\"ph codeph\">set ikev2 local-identity email-id\r\n                    &lt;tunnel-identity&gt;@&lt;org-id&gt;.sse.com</code>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</p>\r\n<p class=\"p\">On ASA 9.16 and earlier, the ASA automatically uses its external interface IPv4 address as\r\n        the IKEv2 identity. This identity, combined with the pre-shared key (PSK), authenticates the\r\n        tunnel. If NAT translates this address, the IKEv2 identity will not match what Secure Access\r\n        expects, and authentication will fail. </p>\r\n<p class=\"p\">ASA 9.17 introduced the ability to explicitly set a per-tunnel FQDN identity, decoupling\r\n        the IKEv2 identity from the interface address. This resolves the NAT identity mismatch.</p>\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-notes.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\">If your ASA is on version 9.16 or earlier and is behind NAT, the tunnel\r\n        will not establish. Either assign a static public IP directly on the ASA's external\r\n        interface, or upgrade to ASA 9.17 or later.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-notes.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\">Note: The <code class=\"ph codeph\">&lt;tunnel-identity&gt;</code> and <code class=\"ph codeph\">&lt;org-id&gt;</code> values\r\n        in the <code class=\"ph codeph\">set ikev2 local-identity</code> command are generated when you configure\r\n        the network tunnel group in Secure Access. Refer to  <a data-scope=\"external\" target=\"_blank\" href=\"https://docs.sse.cisco.com/sse-user-guide/docs/add-network-tunnel-group\" title=\"\">Add a Network Tunnel Group</a> for details.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n<div>\r\n<h3>\r\n<h3 font-weight=\"bold\" class=\"sectiontitle tasklabel cB_Bold\">Procedure</h3>\r\n</h3>\r\n</div>\r\n<table class=\"stepTable\" border=\"0\">\r\n<tbody>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">1</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">Gather the following from the Cisco Secure Access dashboard after you create your\r\n          Network Tunnel Group. Refer to  <a data-scope=\"external\" target=\"_blank\" href=\"https://docs.sse.cisco.com/sse-user-guide/docs/add-network-tunnel-group\" title=\"\">Add a Network Tunnel Group</a> for instructions.</p>\r\n<div class=\"itemgroup info\">\r\n<table width=\"100%\" border=\"1\">\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Value</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Description</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Used in</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">Primary data center IP</td>\r\n<td headers=\"\" align=\"\">IP address of the primary Secure Access data center</td>\r\n<td headers=\"\" align=\"\">Steps 3, 5</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Secondary data center IP</td>\r\n<td headers=\"\" align=\"\">IP address of the secondary Secure Access data center</td>\r\n<td headers=\"\" align=\"\">Step 6</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Primary tunnel ID</td>\r\n<td headers=\"\" align=\"\">Tunnel identity for the primary tunnel</td>\r\n<td headers=\"\" align=\"\">Steps 3, 5</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Secondary tunnel ID</td>\r\n<td headers=\"\" align=\"\">Tunnel identity for the secondary tunnel</td>\r\n<td headers=\"\" align=\"\">Step 6</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Passphrase</td>\r\n<td headers=\"\" align=\"\">Pre-shared key configured for the tunnel group</td>\r\n<td headers=\"\" align=\"\">Step 3</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">2</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Configure the IKEv2 policy</strong>\r\n</p>\r\n<ol type=\"a\" class=\"ol substeps\">\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Define the IKEv2 policy settings according to the  <a data-scope=\"local\" target=\"\" href=\"docs/csa/olh/120435.dita\" title=\"\">Supported IPsec Parameters</a>.</p>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Choose the policy number based on your ASA's existing policies. In the following\r\n              example, the policy number is <code class=\"ph codeph\">10</code>.</p>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Replace <code class=\"ph codeph\">outside</code> with the name of the public-facing interface your\r\n              ASA uses for VPN connectivity, if different.</p>\r\n</li>\r\n</ol>\r\n<div class=\"itemgroup info\">\r\n<pre class=\"pre codeblock text\">\r\n<code>crypto ikev2 policy 10\r\n  encryption aes-gcm-256\r\n  integrity null\r\n  group 19\r\n  lifetime seconds 86400\r\ncrypto ikev2 enable outside</code>\r\n</pre>\r\n</div>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">3</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Configure the Group Policy and Tunnel Group</strong>\r\n</p>\r\n<ol type=\"a\" class=\"ol substeps\">\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Configure the group policy and tunnel group for the primary data center\r\n              connection.</p>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Replace the following placeholders. Refer to  <a data-scope=\"local\" target=\"\" href=\"docs/csa/olh/120415.dita\" title=\"Configure and deploy a network tunnel group in Secure Access to connect multiple IPsec tunnels from your branch network devices to primary and secondary Secure Access data center hubs for high-availability connectivity.\">Add a Network Tunnel Group</a>.</p>\r\n<div class=\"itemgroup info\">\r\n<table width=\"100%\" border=\"1\">\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Placeholder</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Replace With</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">&lt;Primary data center IP address&gt;</code>\r\n</td>\r\n<td headers=\"\" align=\"\">IP address of the primary Secure Access data center</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">&lt;Portal_Tunnel_Passphrase&gt;</code>\r\n</td>\r\n<td headers=\"\" align=\"\">The passphrase you configured for the network tunnel group</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<pre class=\"pre codeblock text\">\r\n<code>group-policy sse-policy internal\r\ngroup-policy sse-policy attributes \r\n   vpn-tunnel-protocol ikev2\r\n \r\ntunnel-group &lt;Primary data center IP address&gt; type ipsec-l2l\r\ntunnel-group &lt;Primary data center IP address&gt; general-attributes \r\n  default-group-policy sse-policy\r\ntunnel-group &lt;Primary data center IP address&gt; ipsec-attributes \r\n  ikev2 remote-authentication pre-shared-key 0 \\[Portal_Tunnel_Passphrase\\]\r\n  ikev2 local-authentication pre-shared-key 0 \\[Portal_Tunnel_Passphrase\\]</code>\r\n</pre>\r\n</div>\r\n<div class=\"itemgroup info\">\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-tips.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\">Validate that the <code class=\"ph codeph\">crypto isakmp identity</code> command is\r\n                set to the default value <code class=\"ph codeph\">auto</code>. This ensures the correct ID method\r\n                is used for ISAKMP peers.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n</li>\r\n</ol>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">4</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Configure the IPsec Proposal and Profile (Primary tunnel)</strong>\r\n</p>\r\n<ol type=\"a\" class=\"ol substeps\">\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Define the IPsec proposal and profile according to the  <a data-scope=\"local\" target=\"\" href=\"docs/csa/olh/120435.dita\" title=\"\">Supported IPsec Parameters</a>.</p>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Replace <code class=\"ph codeph\">&lt;Primary tunnel ID&gt;</code> with the tunnel identity for\r\n              your primary tunnel from the Secure Access dashboard.</p>\r\n</li>\r\n</ol>\r\n<div class=\"itemgroup info\">\r\n<pre class=\"pre codeblock text\">\r\n<code>crypto ipsec ikev2 ipsec-proposal Secure-Access-Ipsec-Proposal\r\n  protocol esp encryption aes-gcm-256\r\n  protocol esp integrity sha-1\r\n\r\ncrypto ipsec profile Secure-Access-Primary\r\n  set ikev2 ipsec-proposal Secure-Access-Ipsec-Proposal\r\n  !\r\n  !Note: below command applies for v9.17+ only\r\n  set ikev2 local-identity email-id &lt;Primary tunnel ID&gt;</code>\r\n</pre>\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-notes.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\">The <code class=\"ph codeph\">set ikev2 local-identity</code> command applies to ASA\r\n            9.17 and later only. Omit this line for ASA 9.16 and earlier.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">5</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Create the Virtual Tunnel Interface (Primary tunnel)</strong>\r\n</p>\r\n<ol type=\"a\" class=\"ol substeps\">\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Create a VTI for the primary tunnel.</p>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Replace the following placeholders:</p>\r\n<div class=\"itemgroup info\">\r\n<table width=\"100%\" border=\"1\">\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Placeholder</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Replace With</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">&lt;Primary data center IP address&gt;</code>\r\n</td>\r\n<td headers=\"\" align=\"\">IP address of the primary Secure Access data center</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">&lt;VTI IP address&gt; &lt;subnet mask&gt;</code>\r\n</td>\r\n<td headers=\"\" align=\"\">An unused IP address and subnet not assigned to any existing VLAN,\r\n                        subnet, or interface in your network (for example, 169.254.1.1\r\n                        255.255.255.252)</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<pre class=\"pre codeblock text\">\r\n<code>interface Tunnel1\r\n   nameif vti\r\n   ip address &lt;VTI IP address&gt; &lt;subnet mask&gt;\r\n   tunnel source interface outside\r\n   tunnel destination &lt;Primary data center IP address&gt;\r\n   tunnel mode ipsec ipv4\r\n   tunnel protection ipsec profile Secure-Access-Primary</code>\r\n</pre>\r\n</div>\r\n</li>\r\n</ol>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">6</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Configure the Secondary tunnel</strong>\r\n</p>\r\n<div class=\"itemgroup info\">\r\n<p class=\"p\">To add a secondary tunnel for redundancy, repeat Steps 3 through 5 with the following\r\n            changes:</p>\r\n<table width=\"100%\" border=\"1\">\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Parameter</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Primary tunnel</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Secondary tunnel</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">Data center IP</td>\r\n<td headers=\"\" align=\"\">Primary data center IP</td>\r\n<td headers=\"\" align=\"\">Secondary data center IP</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">Tunnel ID</td>\r\n<td headers=\"\" align=\"\">Primary tunnel ID</td>\r\n<td headers=\"\" align=\"\">Secondary tunnel ID</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">IPsec profile name</td>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">Secure-Access-Primary</code>\r\n</td>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">Secure-Access-Secondary</code>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">VTI interface name</td>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">Tunnel1 / vti-primary</code>\r\n</td>\r\n<td headers=\"\" align=\"\">\r\n<code class=\"ph codeph\">Tunnel2 / vti-secondary</code>\r\n</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">VTI IP address</td>\r\n<td headers=\"\" align=\"\">From one unused subnet</td>\r\n<td headers=\"\" align=\"\">From a different unused subnet</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-notes.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\">The group policy (<code class=\"ph codeph\">sse-policy</code>) and IPsec proposal\r\n              (<code class=\"ph codeph\">Secure-Access-Ipsec-Proposal</code>) created in Steps 2 and 3 can be\r\n            reused. You must create a separate IPsec profile and VTI for the secondary\r\n            tunnel.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">7</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Configure policy-based routing (PBR)</strong>\r\n</p>\r\n<ol type=\"a\" class=\"ol substeps\">\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Configure PBR to direct internal traffic through the tunnel interface to Secure\r\n              Access.</p>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">In the following example:</p>\r\n<div class=\"itemgroup info\">\r\n<ul class=\"ul\">\r\n<li class=\"li\">LAN subnet: <code class=\"ph codeph\">192.168.20.0/24</code>\r\n</li>\r\n<li class=\"li\">LAN interface: <code class=\"ph codeph\">GigabitEthernet1/2</code>\r\n</li>\r\n<li class=\"li\">Next-hop IP: An IP address in the same subnet assigned to the primary VTI</li>\r\n</ul>\r\n</div>\r\n</li>\r\n</ol>\r\n<div class=\"itemgroup info\">\r\n<pre class=\"pre codeblock text\">\r\n<code>access-list ACL-sse line 1 extended permit ip 192.168.20.0 255.255.255.0 any4\r\n \r\nroute-map sse-PBR permit 10\r\n  match ip address ACL-sse\r\n  set ip next-hop x.x.x.2\r\n \r\ninterface GigabitEthernet1/2\r\n  policy-route route-map sse-PBR</code>\r\n</pre>\r\n</div>\r\n</td>\r\n</tr>\r\n<tr class=\"li step\">\r\n<td align=\"center\" valign=\"middle\" class=\"ordered-number\">8</td>\r\n<td align=\"left\" valign=\"top\" border=\"0\">\r\n<p class=\"ph cmd\">\r\n<strong class=\"ph b\">Verify the tunnel</strong>\r\n</p>\r\n<ol type=\"a\" class=\"ol substeps\">\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Check IKEv2 and IPsec status: Run the following commands from the ASA CLI.</p>\r\n<div class=\"itemgroup info\">\r\n<pre class=\"pre codeblock text\">\r\n<code>show crypto ikev2 sa detail\r\nshow crypto ipsec sa detail</code>\r\n</pre>\r\n</div>\r\n</li>\r\n<li class=\"li substep substepexpand\">\r\n<p class=\"ph cmd\">Simulate traffic with packet tracer: Use the <code class=\"ph codeph\">packet-tracer</code> command\r\n              to confirm that traffic from the inside interface routes through the tunnel.</p>\r\n<div class=\"itemgroup info\">\r\n<pre class=\"pre codeblock text\">\r\n<code>packet-tracer input inside tcp &lt;source IP&gt; &lt;source port&gt; &lt;destination IP&gt; &lt;destination port&gt; detailed</code>\r\n</pre>\r\n<p class=\"p\">Example:</p>\r\n</div>\r\n<div class=\"itemgroup info\">\r\n<pre class=\"pre codeblock\">\r\n<code>packet-tracer input inside tcp 192.168.20.13 3520 72.163.4.161 443 detailed</code>\r\n</pre>\r\n</div>\r\n</li>\r\n</ol>\r\n<div class=\"itemgroup stepresult\">In a successful configuration, the output includes the following key\r\n            phases:<table width=\"100%\" border=\"1\">\r\n<thead class=\"thead\">\r\n<tr>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Phase</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Type</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">Expected result</th>\r\n<th id=\"\" font-weight=\"bold\" align=\"\">What it confirms</th>\r\n</tr>\r\n</thead>\r\n<tbody class=\"tbody\">\r\n<tr>\r\n<td headers=\"\" align=\"\">1</td>\r\n<td headers=\"\" align=\"\">ACCESS-LIST</td>\r\n<td headers=\"\" align=\"\">ALLOW</td>\r\n<td headers=\"\" align=\"\">Traffic is permitted on the inside interface</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">2</td>\r\n<td headers=\"\" align=\"\">PBR-LOOKUP</td>\r\n<td headers=\"\" align=\"\">ALLOW</td>\r\n<td headers=\"\" align=\"\">Policy-based routing matches the route map and identifies the VTI as the\r\n                    egress interface</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">5</td>\r\n<td headers=\"\" align=\"\">VPN (encrypt)</td>\r\n<td headers=\"\" align=\"\">ALLOW</td>\r\n<td headers=\"\" align=\"\">Traffic is selected for encryption on the VTI</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">6</td>\r\n<td headers=\"\" align=\"\">VPN (ipsec-tunnel-flow)</td>\r\n<td headers=\"\" align=\"\">ALLOW</td>\r\n<td headers=\"\" align=\"\">IPsec tunnel flow is established</td>\r\n</tr>\r\n<tr>\r\n<td headers=\"\" align=\"\">9</td>\r\n<td headers=\"\" align=\"\">FLOW-CREATION</td>\r\n<td headers=\"\" align=\"\">ALLOW</td>\r\n<td headers=\"\" align=\"\">A new traffic flow is created and dispatched</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<p class=\"p\">The final <code class=\"ph codeph\">Result</code> section should\r\n            show:</p>\r\n<pre class=\"pre codeblock\">\r\n<code>output-interface: vti\r\nAction: allow</code>\r\n</pre>\r\n<table class=\"olh_note\" border=\"0\" role=\"note\">\r\n<tbody>\r\n<tr>\r\n<td width=\"5%\" class=\"olh_note\" role=\"heading\" border=\"0\" valign=\"top\">\r\n<img src=\"https://www.cisco.com/c/dam/en/us/td/i/esp/icons/icon-notes.svg\">\r\n<br> </td>\r\n<td border=\"0\" class=\"olh_note\">\r\n<div class=\"note__content\"> If any phase shows <code class=\"ph codeph\">DROP</code> or if the\r\n            output interface is not <code class=\"ph codeph\">vti</code>, review your PBR configuration, tunnel\r\n            group settings, and IPsec profile.</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n</div>\r\n</td>\r\n</tr>\r\n</tbody>\r\n</table>\r\n<section class=\"section result\">After completing this guide, your ASA will: <ul class=\"ul\">\r\n<li class=\"li\">Establish two authenticated IKEv2 IPsec tunnels to Secure Access</li>\r\n<li class=\"li\">Route designated internal traffic through the tunnel via policy-based routing</li>\r\n<li class=\"li\">Authenticate using a pre-shared key combined with IKEv2 identity</li>\r\n<li class=\"li\">Connect to the nearest Cisco Secure Access data center(s)</li>\r\n</ul>\r\n</section>\r\n</div>\r\n</article>\r\n","ditaVal":"","format":"html"},"bookTitle":{"value":""},"shortDescription":{"value":""}}},"parameters":{"appId":"SecureAccess","topicAlias":"configure-tunnels-cisco-asa"}}