Configure TCP State Bypass
To bypass TCP state checking in asymetrical routing environments, carefully define a traffic class that applies to the affected hosts or networks only, then enable TCP State Bypass on the traffic class using a service policy. You must also configure a corresponding prefilter fastpath policy for the same traffic to ensure the traffic also bypasses inspection.
Because bypass reduces the security of the network, limit its application as much as possible.
Procedure
Step 1 | Create the extended ACL that defines the traffic class. For example, to define a traffic class for TCP traffic from 10.1.1.1 to 10.2.2.2, do the following:
|
Step 2 | Configure the TCP state bypass service policy rule. For example, to configure TCP state bypass for this traffic class globally, do the following:
|
Step 3 | Configure a prefilter fastpath rule for the traffic class. You cannot use the ACL object in the prefilter rule, so you need to recreate the traffic class either directly in the prefilter rule, or by first creating network objects that define the class. The following procedure assumes that you already have a prefilter policy attached to the access control policy. If you have not created a prefilter policy yet, go to and first create the policy. You can then follow this procedure to attach it to the access control policy and create the rule.Keeping with our example, this procedure creates a fastpath rule for TCP traffic from 10.1.1.1 to 10.2.2.2. |