Use Cases for SD-WAN Capabilities in Cisco Secure Firewall

PDF

Verify the Primary and Secondary Tunnels

Updated: February 5, 2026

Overview

Provides instructions to verify routing and state of primary and secondary DVTI VPN tunnels between hub and spoke devices in Firewall Management Center (FMC).

Verify that both the primary and secondary VTI tunnels between the branch node and the hub node are configured, up, and active.

  • Verify Tunnel Status on the Site-to-site VPN Dashboard

    To verify that the VPN tunnel is up and green, choose Overview > Dashboards > Site-to-site VPN.

    Verify tunnel status in the Site-to-site VPN dashboard
  • Verify Routing on the Hub and Branch Nodes

    1. Choose Devices > Device Management.

    2. To edit NGFW1, click the Edit icon.

    3. Click the Device tab.

    4. Click the CLI button in the General card. The CLI Troubleshoot window appears

    5. Enter show interface ip brief in the Command field and click Execute to view the dynamic Virtual Access interfaces that were created from the DVTI on the hub.

      Note

      The Virtual-Access2 interface gets generated from the same DVTI when NGFWBR1 connects to NGFW1 over the secondary VTI connection.

      Output of show interface ip brief command
    6. Repeat Steps 2 through 5 for the NGFWBR1 node to view the static VTI interfaces Tunnel1 and Tunnel2 as shown in the figure below.

      Output of show interface ip brief command
    7. Enter show route in the Command field and click Execute to view the routes after the addition of the secondary VTI tunnel.

      Output of show route command
      • Note that the Corporate_LAN (198.19.10.0/24) has been learnt over OSPF on both the primary (outside_static_vti_1) and secondary (outside_static_vti_2) VTIs.

      • Note that the DVTI Tunnel IP (198.48.133.81) has also been learnt over OSPF on both the primary and secondary VTIs.

  • Verify Failover to Secondary Tunnel When the Primary Tunnel Goes Down

    1. In this example, to validate failover to the secondary tunnel, packet loss can be induced by restricting outbound traffic sourced from the outside3 interface going to internet either through an access control list on the upstream device or by shutting down the outside3 interface for threat defense from the management center.

      Note

      Shutting down an interface is network intrusive and must not be tried in a production network.

    2. In the Site-to-site VPN Dashboard, the primary tunnel is down as shown in the figure below.

      Site-to-site VPN dashboard
    3. Initiate traffic from Branch to Hub. Log in to the WKST BR workstation and SSH to the host behind NGFW1. Ensure that you are able to SSH successfully to the host.

    4. Verify the egress path of the traffic using the Unified Event Viewer:

      1. Choose Analysis > Unified Events.

      2. Add the VPN Action, Encrypt Peer, Decrypt Peer, and Egress Interface columns using the column picker.

      3. Reorder and resize the new columns along with the columns, Destination Port/ICMP Code, Access Control Rule, Access Control Policy, and Device as seen in the figure below.

        Screenshot of Unified Events dashboard

        Notice that the egress interface on the NGFWBR1 for the SSH (Port 22) is now displayed as the secondary interface (outside_static_vti_2).