Guidelines and Limitations for Virtual Tunnel Interfaces
IPv6 Support
-
VTI supports IPv6.
-
You can use an IPv6 address for the tunnel source interface and use the same address as the tunnel endpoint.
-
The management center supports the following combinations of VTI IP (or internal networks IP version) over public IP versions:
-
IPv6 over IPv6
-
IPv4 over IPv6
-
IPv4 over IPv4
-
IPv6 over IPv4
-
-
VTI supports static and dynamic IPv6 addresses as the tunnel source and destination.
-
The tunnel source interface can have IPv6 addresses and you can specify the tunnel endpoint address. If you don’t specify the address, by default, the threat defense uses the first IPv6 global address in the list as the tunnel endpoint.
BGP IPv6 Support
VTI supports IPv6 BGP.
EIGRP IPv4 Support
VTI supports IPv4 EIGRP.
OSPFv2 and OSPFv3 IPv6/IPv4 Support
VTI supports IPv4 and IPv6 OSPF.
Multi-instance and Clustering
-
VTI is supported in multi-instance.
-
VTIs aren’t supported with clustering.
Firewall Mode
VTI is supported in routed mode only.
Limitations for Static VTI
-
Only 20 unique IPSec profiles are supported.
-
In route-based routing, you can configure VTI only as an egress interface.
Limitations for Dynamic VTI
-
Dynamic VTI does not support:
-
ECMP
-
VRF in multi-instance
-
Clustering
-
IKEv1
-
QoS
-
-
If a spoke has a dynamic IP address and a hub has a dynamic VTI behind a NAT, the tunnel status will be unknown.
-
For a dynamic extranet, when multiple spokes establish a connection, the site-to-site monitoring dashboard does not show the individual tunnels.
-
If you configure a hub with dynamic VTI behind NAT with dynamic spokes, the VPN monitoring data will not be accurate.
General Configuration Guidelines for Static and Dynamic VTI
-
If you use dynamic crypto maps and dynamic VTIs in your site-to-site VPNs, only the dynamic VTI tunnels will come up. This behaviour occurs because both the crypto maps and dynamic VTIs try to use the default tunnel group.
We recommend that you do one of the following:
-
Migrate your site-to-site VPNs to dynamic VTIs.
-
Use static crypto maps with their own tunnel-groups.
-
-
VTIs are only configurable in IPsec mode.
-
Dynamic VTI supports only the hub and spoke topology in the management center.
-
Dynamic VTI supports only threat defense devices from version 7.3.
-
We recommend that you configure only a single hub for a route-based hub and spoke topology. To configure a topology with multiple hubs for a set of spokes, with one hub as the backup hub, configure multiple topologies with a single hub and the same set of spokes. For more information, see Configure Multiple Hubs in a Route-based VPN.
-
You can use static, BGP, EIGRP IPv4, OSPFv2/v3 routes for traffic using the tunnel interface.
-
In an HA configuration with dynamic routing, the standby device cannot access the known subnets through the VTI tunnels as these tunnels are created with the active IP address.
-
You can configure a maximum of 1024 static and dynamic VTIs on a device. While calculating the VTI count, consider the following:
-
Include nameif subinterfaces to derive the total number of VTIs that can be configured on the device.
-
You can’t configure nameif on the member interfaces of a portchannel. Therefore, the tunnel count is reduced by the count of actual main portchannel interfaces alone and not any of its member interfaces.
-
The VTI count on a platform is limited to the number of VLANs configurable on that platform. For example, Firepower 1120 supports 512 VLANs, the tunnel count is 512 minus the number of physical interfaces configured.
-
-
If you’re configuring more than 400 VTIs on a device in a high-availability setup, you must configure 45 seconds as the unit holdtime for the threat defense HA.
-
The MTU for VTIs is automatically set, according to the underlying physical interface.
-
For dynamic VTI, the virtual access interface inherits the MTU from the configured tunnel source interface. If you don’t specify the tunnel source interface, the virtual access interface inherits the MTU from the source interface from which the threat defense accepts the VPN session request.
-
Static VTI supports IKE versions v1, v2, and uses IPsec for sending and receiving data between the tunnel's source and destination.
-
Dynamic VTI supports only IKE version v2, and uses IPsec for sending and receiving data between the tunnel's source and destination.
-
For static and dynamic VTI, ensure that you don’t use the borrow IP interface as the tunnel source IP address for any VTI interface.
-
When you configure a route-based site-to-site VPN using static or dynamic VTI interfaces, ensure that the value of the TTL hop is more than one if you use BGP.
-
If NAT has to be applied, the IKE and ESP packets are encapsulated in the UDP header.
-
IKE and IPsec security associations are re-keyed continuously regardless of data traffic in the tunnel. This ensures that VTI tunnels are always up.
-
Tunnel group name must match what the peer sends as its IKEv1 or IKEv2 identity.
-
For IKEv1 in LAN-to-LAN tunnel groups, you can use names which aren’t IP addresses, if the tunnel authentication method is digital certificates and/or the peer is configured to use aggressive mode.
-
VTI and crypto map configurations can coexist on the same physical interface, if the peer address configured in the crypto map and the tunnel destination for the VTI are different.
-
By default, all traffic sent through a VTI is encrypted.
-
Access rules can be applied on a VTI interface to control traffic through VTI.
-
You can associate VTI interfaces with ECMP zones and configure ECMP static routes to achieve the following:
-
Load balancing (Active/Active VTIs)—Connection can flow over any of the parallel VTI tunnels.
-
Seamless connection migration—When a VTI tunnel becomes unreachable, the flows are seamlessly migrated to another VTI interface that is configured in the same zone.
-
Asymmetric routing—Forward traffic flow through one VTI interface and configure the reverse traffic flow through another VTI interface.
For information on configuring ECMP, see Configure an Equal Cost Static Route.
-
-
For route-based VPNs, Bypass Access Control policy for decrypted traffic (sysopt connection permit-vpn) does not work. You must always create access control rules to allow route-based VPN traffic.
Backup VTI Guidelines and Limitations
-
Flow resiliency across tunnel failovers isn’t supported. For example, the clear text TCP connection gets lost after a tunnel failover, and you need to reinitiate any FTP transfer that took place during the failover.
-
Certificate authentication isn’t supported in backup VTI.
Guidelines for Dynamic VTI and Virtual Routers
-
A dynamic VTI and its corresponding protected network interface must be part of the same virtual router.
-
You must map the borrow IP interface and the dynamic VTI to the same virtual router.
-
User-defined virtual routers support only BGPv4/v6 and OSPFv2 routing protocols.
-
A tunnel source interface can be in a different user-defined virtual router than that associated with the dynamic VTI.