
21-12
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 21 Configuring Advanced Connection Features
Configuring TCP State Bypass
through the session management path, then there is no entry in the accelerated path for the connection,
and the packets are dropped.
Figure 21-1
shows an asymmetric routing example where the outbound
traffic goes through a different FWSM than the inbound traffic:
Figure 21-1
Asymmetric Routing
If you have asymmetric routing configured on upstream routers, and traffic alternates between two
FWSMs, then you can configure TCP state bypass for specific traffic. TCP state bypass alters the way
sessions are established in the accelerated path and disables the accelerated path checks. This feature
treats TCP traffic much as it treats a UDP connection: when a non-SYN packet matching the specified
networks enters the FWSM, and there is not an accelerated path entry, then the packet goes through the
session management path to establish the connection in the accelerated path. Once in the accelerated
path, the traffic bypasses the accelerated path checks.
Unsupported Features
The following features are not supported when you use TCP state bypass:
•
Application inspection—Application inspection requires both inbound and outbound traffic to go
through the same FWSM, so application inspection is not supported with TCP state bypass.
•
AAA authenticated sessions—When a user authenticates with one FWSM, traffic returning via the
other FWSM will be denied because the user did not authenticate with that FWSM.
Compatibility with NAT
Because the translation session is established separately for each FWSM, be sure to configure static NAT
on both FWSMs for TCP state bypass traffic; if you use dynamic NAT, the address chosen for the session
on FWSM 1 will differ from the address chosen for the session on FWSM 2.
ISP A
Inside
network
Outbound Traffic
Return Traffic
ISP B
FWSM 1
FWSM 2
200119
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......