Local tunnel ID
support
|
9.17(1)
|
ASA supports unique local tunnel ID that
allows ASA to have multiple IPsec tunnel behind a NAT to connect to Cisco Umbrella
Secure Internet Gateway (SIG). The local identity is used to configure a unique
identity per IKEv2 tunnel, instead of a global identity for all the tunnels.
New/Modified commands:
local-identity-from-cryptomap ,
|
Support for IPv6 on Static VTI
|
9.16(1)
|
ASA supports IPv6 addresses in Virtual Tunnel Interfaces (VTI) configurations.
A VTI tunnel source interface can have an IPv6 address, which you can configure to
use as the tunnel endpoint. If the tunnel source interface has multiple IPv6
addresses, you can specify which address to be used, else the first IPv6 global
address in the list is used by default.
The tunnel mode can be either IPv4 or IPv6, but it must be the same as IP address
type configured on VTI for the tunnel to be active. An IPv6 address can be assigned
to the tunnel source or the tunnel destination interface in a VTI.
New/Modified commands: tunnel source
interface , tunnel destination ,
tunnel mode
|
Support for 1024 VTI interfaces per device
|
9.16(1)
|
The number of maximum VTIs to be configured on
a device has been increased from 100 to 1024.
Even if a platform supports more than 1024
interfaces, the VTI count is limited to the number
of VLANs configurable on that platform. For
example, ASA 5510 supports 100 VLANs, the tunnel
count would be 100 minus the number of physical
interfaces configured.
New/Modified commands: None
|
DHCP Relay Server Support on VTI
|
9.14(1)
|
ASA allows VTI interfaces to be configured
as DHCP relay server connecting
interfaces.
We modified
the following commands: dhcprelay
server
ip_address
vti_ifc_name .
|
Support for IKEv2,
certificate based authentication, and ACL in
VTI
|
9.8.(1)
|
Virtual Tunnel Interface (VTI) now supports BGP
(static VTI). You can now use IKEv2 in standalone
and high availability modes. You can use
certificate based authentication by setting up a
trustpoint in the IPsec profile. You can also
apply access lists on VTI using access-group
commands to filter ingress traffic.
We introduced the following
command in the IPsec profile configuration mode:
set trustpoint.
|
Virtual
Tunnel Interface (VTI) support
|
9.7.(1)
|
The ASA is enhanced with a new logical
interface called Virtual Tunnel Interface (VTI),
used to represent a VPN tunnel to a peer. This
supports route based VPN with IPsec profiles
attached to each end of the tunnel. Using VTI does
away with the need to configure static crypto map
access lists and map them to interfaces.
We introduced the following commands: crypto ipsec profile, interface tunnel, responder-only, set ikev1 transform-set, set pfs, set security-association lifetime,
tunnel destination, tunnel mode ipsec, tunnel protection ipsec profile, tunnel source interface.
|