Cisco ASA VTI not importing ipsec or gateway info

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.

Cisco ASA VTI not importing ipsec or gateway info

L1 Bithead

We have a healthy mix of VTI and Crypto Map tunnels on our firewalls and when checking the import, the policy maps are all there as expected (outside of the naming). However the VTIs only show up as tunnel interfaces with no IPSec tunnel or IKE Gateway association.


Does Expedition support migrating VTI ipsec tunnels to the equivalent Palo config? This seems as though it should be pretty straightforward and included since the config is only slightly different between the two.


Am I missing something, is this a known issue, or is this transition simply not supported?


L6 Presenter

@jjsimpson You should be able to view your migrated ipsec tunnel configuration in below page:


Screen Shot 2022-04-04 at 10.06.20 AM.png

L1 Bithead

When I look at the imported VPN configs, the only VPN tunnels I see there are the policy map tunnels.


Under Interfaces, I see both the VTI and policy map configs:


tunnel.100 is a VTI interface

tunnel.4 is a policy map interface




the IPsec tunnel for tun.4 exists



but the last configured tunnel is for tun.42, which is also a policy map



So it appears that the tunnel-group and group-policy ASA settings are not being imported for VTIs as they are for the policy maps.

  • 2 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!