Flow Offload Limitations
Not all flows can be offloaded. Even after offload, a flow can be removed from being offloaded under certain conditions. Following are some of the limitations:
- Device Limitations
-
The feature is supported on the following devices:
-
Firepower 4100/9300 running FXOS 1.1.3 or higher.
-
Secure Firewall 3100
-
- Flows that cannot be offloaded
-
The following types of flows cannot be offloaded.
-
Any flows that do not use IPv4 addressing, such as IPv6 addressing.
-
Flows for any protocol other than TCP, UDP, and GRE.
NotePPTP GRE connections cannot be offloaded.
-
Flows on interfaces configured in passive, inline, or inline tap mode. Routed and switched interfaces are the only types supported.
-
(Secure Firewall 3100.) Offload based on inner header for tunnelled flows.
-
(Secure Firewall 3100.) Multi-instance offload.
-
Flows that require inspection by Snort or other inspection engines. In some cases, such as FTP, the secondary data channel can be offloaded although the control channel cannot be offloaded.
-
IPsec and TLS/DTLS VPN connections that terminate on the device.
-
Flows that require encryption or decryption. For example, connections decrypted due to a decryption policy.
-
Multicast flows in routed mode. They are supported in transparent mode if there are only two member interfaces in a bridge group.
-
TCP Intercept flows.
-
TCP state bypass flows. You cannot configure flow offload and TCP state bypass on the same traffic.
-
Flows tagged with security groups.
-
Reverse flows that are forwarded from a different cluster node, in the case of asymmetric flows in a cluster.
-
Centralized flows in a cluster, if the flow owner is not the control unit.
-
Flows that include IP options cannot be dynamically offloaded.
-
- Additional Limitations
-
-
Flow offload and Dead Connection Detection (DCD) are not compatible. Do not configure DCD on connections that can be offloaded.
-
If more than one flow that matches flow offload conditions are queued to be offloaded at the same time to the same location on the hardware, only the first flow is offloaded. The other flows are processed normally. This is called a collision. Use the show flow-offload flow command in the CLI to display statistics for this situation.
-
Dynamic flow offload disables all TCP normalizer checks.
-
Although offloaded flows pass through FXOS interfaces, statistics for these flows do not appear on the logical device interface. Thus, logical device interface counters and packet rates do not reflect offloaded flows.
-
- Dynamic flow offload not supported on certain devices
- Dynamic flow offload is not supported on the Secure Firewall 3100.
- Conditions for reversing offload
-
After a flow is offloaded, packets within the flow are returned to the threat defense for further processing if they meet the following conditions:
-
They include TCP options other than Timestamp.
-
They are fragmented.
-
They are subject to Equal-Cost Multi-Path (ECMP) routing, and ingress packets move from one interface to another.
-