Use Cases for SD-WAN Capabilities in Cisco Secure Firewall

PDF

Verify SASE Umbrella Tunnel Deployment

Updated: February 5, 2026

Overview

Provides instructions to verify correct forwarding of traffic to Cisco Umbrella and if SIG tunnels are active.

In the Management Center, choose Notifications > Tasks to view the status of the Umbrella tunnel deployment and policy deployment on the Threat Defense device (NGFWBR1).

Deployment notifications

To check the SASE auto tunnel status in the Management Center, choose Devices > VPN > Site To Site.

Umbrella SASE VPN topology in the Site To Site summary page

To check the updated SASE topology in the Management Center, choose Devices > VPN > Site To Site > Edit SASE Topology. The local Tunnel ID is updated after the deployment to Umbrella.

Local Tunnel ID of the Umbrella SASE topology

To view the Site To Site VPN dashboard in the Management Center, choose Overview > Dashboard > Site to Site VPN​.

Umbrella SASE topology tunnels in the Site To Site VPN dashboard

Use the following CLI commands to verify SASE Umbrella Tunnel on threat defense:

  • To verify the details of the SASE tunnel, use the following command:

    > show running-config interface tunnel 1​
    !​
    interface Tunnel1​
     nameif Outside_static_vti_1​
     ip address 169.254.2.1 255.255.255.252 ​
     tunnel source interface Outside​
     tunnel destination 146.112.117.8​
     tunnel mode ipsec ipv4​
     tunnel protection ipsec profile FMC_IPSEC_PROFILE_1​
  • To verify the IPSec profile and the associated proposal, use the following command:

    > show running-config crypto ipsec​
    crypto ipsec ikev2 ipsec-proposal CSM_IP_1​
     protocol esp encryption aes-gcm-256​
     protocol esp integrity sha-256​
    crypto ipsec profile FMC_IPSEC_PROFILE_1​
     set ikev2 ipsec-proposal CSM_IP_1​
     set ikev2 local-identity email-id FTDvChandigarh@41xxxxx-xxxxxxxxx-umbrella.com​
     set reverse-route​
    crypto ipsec security-association pmtu-aging infinite​
  • To verify the IKeV2 policy set​, use the following command:

    > show running-config crypto ikev2​
    crypto ikev2 policy 15​
     encryption aes-gcm-256​
     integrity null​
     group 20 19​
     prf sha256​
     lifetime seconds 86400​
    crypto ikev2 enable Outside​
  • To verify the tunnel statistics including Tx and Rx data​, use the following command:

    > show vpn-sessiondb l2l​
    Session Type: LAN-to-LAN​
    Connection   : 146.112.117.8​
    Index        : 19                     IP Addr      : 146.112.117.8​
    Protocol     : IKEv2 IPsecOverNatT​
    Encryption   : IKEv2: (1)AES-GCM-256  IPsecOverNatT: (1)AES-GCM-256​
    Hashing      : IKEv2: (1)none  IPsecOverNatT: (1)none​
    Bytes Tx     : 234                      Bytes Rx     : 446​
    Login Time   : 19:14:51 UTC Thu Apr 27 2023​
    Duration     : 0h:55m:16s​
    Tunnel Zone  : 0​
  • To check the tunnel status​, use the following command:

    > show interface ip brief​
    
    Interface                  IP-Address      OK? Method Status                Protocol​
    Internal-Control0/0        127.0.1.1       YES unset  up                    up  ​
    Internal-Control0/1        unassigned      YES unset  up                    up  ​
    Internal-Data0/0           unassigned      YES unset  down                  up  ​
    Internal-Data0/0           unassigned      YES unset  up                    up  ​
    Internal-Data0/1           169.254.1.1     YES unset  up                    up  ​
    Internal-Data0/2           unassigned      YES unset  up                    up  ​
    Management0/0              203.0.113.130   YES unset  up                    up  ​
    TenGigabitEthernet0/0      172.16.2.10     YES manual up                    up  ​
    TenGigabitEthernet0/1      172.16.3.10     YES manual up                    up  ​
    TenGigabitEthernet0/2      unassigned      YES unset  administratively down up  ​
    Tunnel1                    169.254.2.1     YES manual up                    up 
  • To check the IPSec SA associated to the ​VTI tunnel, use the following command:

    > show crypto ipsec sa
    interface: outside_static_vti_1
        Crypto map tag: __vti-crypto-map-Tunnel1-0-1, seq num: 65280, local addr: 198.18.128.81
    
          Protected vrf (ivrf): Global
          local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
          remote ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
          current_peer: 146.112.117.8
    
    
          #pkts encaps: 705, #pkts encrypt: 705, #pkts digest: 705
          #pkts decaps: 743, #pkts decrypt: 743, #pkts verify: 743
          #pkts compressed: 0, #pkts decompressed: 0
          #pkts not compressed: 705, #pkts comp failed: 0, #pkts decomp failed: 0
          #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
          #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
          #TFC rcvd: 0, #TFC sent: 0
          #Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0
          #send errors: 0, #recv errors: 0
    
          local crypto endpt.: 198.18.128.81/4500, remote crypto endpt.: 146.112.117.8/4500
          path mtu 1500, ipsec overhead 63(44), media mtu 1500
          PMTU time remaining (sec): 0, DF policy: copy-df
          ICMP error validation: disabled, TFC packets: disabled
          current outbound spi: C76F91B4
          current inbound spi : 64907273
    
        inbound esp sas:
          spi: 0x2BF92601 (737748481)
             SA State: active
             transform: esp-aes-gcm-256 esp-null-hmac no compression
             in use settings ={L2L, Tunnel,  NAT-T-Encaps, IKEv2, VTI, }
             slot: 0, conn_id: 32, crypto-map: __vti-crypto-map-Tunnel1-0-1
             sa timing: remaining key lifetime (kB/sec): (4331520/27987)
             IV size: 8 bytes
             replay detection support: Y
             Anti replay bitmap:
              0x00000000 0x00000001
        outbound esp sas:
          spi: 0xCA2DC006 (3391995910)
             SA State: active
             transform: esp-aes-gcm-256 esp-null-hmac no compression
             in use settings ={L2L, Tunnel,  NAT-T-Encaps, IKEv2, VTI, }
             slot: 0, conn_id: 32, crypto-map: __vti-crypto-map-Tunnel1-0-1
             sa timing: remaining key lifetime (kB/sec): (4101072/27987)
             IV size: 8 bytes
             replay detection support: Y
             Anti replay bitmap:
              0x00000000 0x00000001
    

To view the SASE tunnel in Umbrella, log in to Cisco Umbrella and navigate to Deployments > Core Identities > Network Tunnels. The network tunnel from the threat defense to Umbrella is displayed as shown in the figure below.

Network Tunnels in Umbrella dashboard

Expand the section to view the details of the tunnel.

Details of the Umbrella tunnels in the Umbrella dashboard