<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-1621 How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-1621 How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa</link><pubDate>Tue, 31 Jul 2018 23:21:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Current Revision posted to Appian Knowledge Base by Parmida Borhani on 7/31/2018 11:21:18 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, how-to, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-1621 How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/15</link><pubDate>Tue, 31 Jul 2018 19:21:05 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 15 posted to Appian Knowledge Base by Parmida Borhani on 7/31/2018 7:21:05 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-1621 How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/14</link><pubDate>Tue, 31 Jul 2018 15:48:30 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>khalid.sharara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 14 posted to Appian Knowledge Base by khalid.sharara on 7/31/2018 3:48:30 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/13</link><pubDate>Tue, 31 Jul 2018 11:50:36 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>khalid.sharara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 13 posted to Appian Knowledge Base by khalid.sharara on 7/31/2018 11:50:36 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-1621 How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/12</link><pubDate>Tue, 31 Jul 2018 11:47:54 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>khalid.sharara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 12 posted to Appian Knowledge Base by khalid.sharara on 7/31/2018 11:47:54 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-1620 How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/11</link><pubDate>Tue, 31 Jul 2018 11:47:30 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>khalid.sharara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 11 posted to Appian Knowledge Base by khalid.sharara on 7/31/2018 11:47:30 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/10</link><pubDate>Tue, 31 Jul 2018 11:45:25 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>khalid.sharara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 10 posted to Appian Knowledge Base by khalid.sharara on 7/31/2018 11:45:25 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/9</link><pubDate>Tue, 31 Jul 2018 09:23:40 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Vamsi Sunkara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 9 posted to Appian Knowledge Base by Vamsi Sunkara on 7/31/2018 9:23:40 AM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/p&gt;
&lt;p&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints.&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/p&gt;
&lt;p&gt;&amp;nbsp;A more detailed discussions about this setting is below:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/p&gt;
&lt;p&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/8</link><pubDate>Mon, 30 Jul 2018 21:39:15 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 8 posted to Appian Knowledge Base by Parmida Borhani on 7/30/2018 9:39:15 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting is below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Reference:&amp;nbsp;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/a&gt;&lt;/span&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>[DRAFT] KB-XXXX How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/7</link><pubDate>Mon, 30 Jul 2018 21:35:07 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 7 posted to Appian Knowledge Base by Parmida Borhani on 7/30/2018 9:35:07 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting is below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX How to enable preservation of VPN flows on a Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/6</link><pubDate>Mon, 30 Jul 2018 21:34:41 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 6 posted to Appian Knowledge Base by Parmida Borhani on 7/30/2018 9:34:41 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Purpose&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Instructions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting is below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, Cloud, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX Enable Preservation of VPN Flows on Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/5</link><pubDate>Mon, 30 Jul 2018 21:32:27 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Parmida Borhani</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 5 posted to Appian Knowledge Base by Parmida Borhani on 7/30/2018 9:32:27 PM&lt;br /&gt;
&lt;h2&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Data sources created in the Appian Administration Console rely on persistent TCP connections in a database connection pool.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;&lt;strong&gt;sysopt connection preserve-vpn-flows&lt;/strong&gt;&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting is below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all versions of Appian Cloud deployments that connect to a business data source over a VPN tunnel to a Cisco ASA.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX Enable Preservation of VPN Flows on Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/1</link><pubDate>Mon, 30 Jul 2018 14:53:09 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Vamsi Sunkara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Vamsi Sunkara on 7/30/2018 2:53:09 PM&lt;br /&gt;

&lt;h1&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections on rekey.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;sysopt connection preserve-vpn-flows&amp;#39; should be set to allow persistent connections to the database. This will allow the connections to survive a tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting are below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Components that rely on an on-premise database &amp;nbsp;(such as records or reports) fail or perform poorly every time there is a VPN rekey. They fail with a generic error that says that &amp;quot;An Error Has Occurred&amp;quot;. The system recovers itself in a few minutes after the failures occur.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to Appian Cloud deployments that connect to a secondary DS over the VPN&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX Enable Preservation of VPN Flows on Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/4</link><pubDate>Mon, 30 Jul 2018 11:08:37 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Vamsi Sunkara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 4 posted to Appian Knowledge Base by Vamsi Sunkara on 7/30/2018 11:08:37 AM&lt;br /&gt;
&lt;h1&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections during a short-lived tunnel drop. Datasources created in the Administration Console rely on persistent TCP connections in a database connection pool.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;sysopt connection preserve-vpn-flows&amp;#39; should be set to allow persistent connections to the database. This will allow established connections to survive a short-lived tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting are below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to Appian Cloud deployments that connect to a secondary DS over the VPN&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX Enable Preservation of VPN Flows on Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/3</link><pubDate>Mon, 30 Jul 2018 10:53:53 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Vamsi Sunkara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 3 posted to Appian Knowledge Base by Vamsi Sunkara on 7/30/2018 10:53:53 AM&lt;br /&gt;
&lt;h1&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections on rekey.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;sysopt connection preserve-vpn-flows&amp;#39; should be set to allow persistent connections to the database. This will allow the connections to survive a tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting are below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Components that rely on an on-premise database &amp;nbsp;(such as records or reports) fail or perform poorly every time there is a VPN rekey. They fail with a generic error that says that &amp;quot;An Error Has Occurred&amp;quot;. The system recovers itself in a few minutes after the failures occur.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to Appian Cloud deployments that connect to a secondary DS over the VPN&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, VPN&lt;/div&gt;
</description></item><item><title>KB-XXXX Enable Preservation of VPN Flows on Cisco ASA</title><link>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa/revision/2</link><pubDate>Mon, 30 Jul 2018 10:53:33 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:118b16fe-b6a8-44b4-b55f-662ba6ed468b</guid><dc:creator>Vamsi Sunkara</dc:creator><comments>https://community.appian.com/support/w/kb/1041/kb-1621-how-to-enable-preservation-of-vpn-flows-on-a-cisco-asa#comments</comments><description>Revision 2 posted to Appian Knowledge Base by Vamsi Sunkara on 7/30/2018 10:53:33 AM&lt;br /&gt;
&lt;h1&gt;&lt;span style="font-size:inherit;"&gt;Best Practice&lt;/span&gt;&lt;/h1&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;When the terminating endpoint on the remote side is a Cisco ASA that keeps track of persistent TCP connections over a tunnel, there is a chance that the device will terminate these connections on rekey.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The feature that keeps track of the state of the connections should be turned off as TCP connections should ideally only be torn down by either of the endpoints. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The setting &amp;#39;sysopt connection preserve-vpn-flows&amp;#39; should be set to allow persistent connections to the database. This will allow the connections to survive a tunnel drop (whatever the cause may be).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;A more detailed discussions about this setting are below:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, the security appliance preserves and resumes stateful (TCP) tunneled flows after the tunnel drops, then recovers. All other flows are dropped when the tunnel drops and must reestablish when a new tunnel comes up. Preserving the TCP flows allows some older or sensitive applications to keep working through a short-lived tunnel drop.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/roadmap/asa_new_features.html#ID-2994-00000e6b&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem arises because of the built-in functionality on how the ASA works. The ASA monitors every connection that passes through it and maintains an entry in its state table according to the application inspection feature. The encrypted traffic details that pass through the VPN are maintained in the form of a security association (SA) database. For this document&amp;#39;s scenario, it maintains two different traffic flows. One is the encrypted traffic between the VPN gateways and the other is the traffic flow between the Server at the head office and the end-user at the branch office. When the VPN is terminated, the flow details for this particular SA are deleted. However, the state table entry maintained by the ASA for this TCP connection becomes stale because of no activity, which hampers the download. This means the ASA will still retain the TCP connection for that particular flow while the user application terminates. However, the TCP connections will become stray and eventually timeout after the TCP idle-timer expires.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This problem has been resolved by introducing a feature called Persistent IPSec Tunneled Flows. A new command has been integrated into the Cisco ASA to retain the state table information at the re-negotiation of the VPN tunnel.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113014-asa-userapp-vpntunnel.html&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;With the persistent IPsec tunneled flows feature enabled, as long as the tunnel is recreated within the timeout dialog box, data continues flowing successfully because the security appliance still has access to the state information.&lt;/span&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/vpn/asdm-78-vpn-config/vpn-asdm-setup.html#ID-2188-00000005&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Components that rely on an on-premise database &amp;nbsp;(such as records or reports) fail or perform poorly every time there is a VPN rekey. They fail with a generic error that says that &amp;quot;An Error Has Occurred&amp;quot;. The system recovers itself in a few minutes after the failures occur.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to Appian Cloud deployments that connect to a secondary DS over the VPN&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last Reviewed: July 2018&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: database, VPN&lt;/div&gt;
</description></item></channel></rss>