index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
323 | Figure 47: Connecting with a Cable
Scenario 3—Recommended
If the ASA data interfaces are connected to more than one set of switches, then a failover link can be connected
to one of the switches, preferably the switch on the secure (inside) side of network, as shown in the following
figure.
Figure 48: Connecting with a ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
324 | However, if the secondary unit boots without detecting the primary unit, then the secondary unit becomes the
active unit and usesits own MAC addresses, because it does not know the primary unit MAC addresses. When
the primary unit becomes available, the secondary (active) unit changes the MAC addresses to those of the
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
325 | Some configuration elements for clientless SSL VPN (such as bookmarks and customization) use the VPN
failover subsystem, which is part of Stateful Failover. You must use Stateful Failover to synchronize these
elements between the members of the failover pair. Stateless failover is not recommended for clientless SSL
VPN... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
326 | • ICMP connection state—ICMP connection replication is enabled only if the respective interface is
assigned to an asymmetric routing group.
• Static and dynamic routing tables—StatefulFailover participatesin dynamic routing protocols, like OSPF
and EIGRP,so routesthat are learned through dynamic routing protocols on th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
327 | • IPv6 clientless or Secure Client sessions
• Citrix authentication (Citrix users must reauthenticate after failover)
Bridge Group Requirements for Failover
There are special considerations for failover when using bridge groups.
Bridge Group Requirements for Appliances, ASAv
When the active unit fails over to the stand... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
328 | Unit Health Monitoring
The ASA determines the health of the other unit by monitoring the failover link with hello messages. When
a unit does not receive three consecutive hello messages on the failover link, the unitsends LANTEST messages
on each data interface, including the failover link, to validate whether or not t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
329 | 1. Link Up/Down test—A test of the interface status. If the Link Up/Down test indicates that the interface
is down, then the ASA considers it failed, and testing stops. If the status is Up, then the ASA performs
the Network Activity test.
2. Network Activity test—A received network activity test. At the start of the te... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
330 | • Interface failure on the active device exceeds the threshold configured.
By default, failure of a single interface causes failover. You can change the default value by configuring
a threshold for the number of interfaces or a percentage of monitored interfaces that must fail for the
failover to occur. If the threshol... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
331 | In Active/Active failover, whichever unit boots second obtains the running configuration from the unit that
boots first, regardless of the primary or secondary designation of the booting unit. After both units are up,
commands entered in the system execution space are replicated from the unit on which failover group 1 ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
332 | Command Replication
After startup, commands that you enter on the active unit are immediately replicated on the standby unit. You
do not have to save the active configuration to flash memory to replicate the commands.
In Active/Active failover, commands entered in the system execution space are replicated from the unit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
333 | • ASA multiple context mode supports the Config-Sync Optimization feature by sharing the context order
during full configuration synchronization, allowing comparison of context order during subsequent
node-rejoin.
• If you configure passphrase and failover IPsec key, then Config-Sync Optimization is not effective as
th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
334 | • The primary unit always becomes the active unit if both units start up at the same time (and are of equal
operational health).
• The primary unit MAC addresses are always coupled with the active IP addresses. The exception to this
rule occurs when the secondary unit becomes active and cannot obtain the primary unit M... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
335 | Failure Event Policy Active Unit Action Standby Unit Action Notes
State information becomes out of
date, and sessions are terminated if a
failover occurs.
State link failed No failover No action No action
Interface failure on active unit Failover Mark active as failed Become active None.
above threshold
When the standb... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
336 | unit becomes active when both units start simultaneously. Instead, the primary/secondary designation does
two things:
• The primary unit provides the running configuration to the pair when they boot simultaneously.
• Each failover group in the configuration is configured with a primary or secondary unit preference. Whe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
337 | Notes
Standby Group
Action
Active Group
Failure Event Policy Action
When the standby failover group is
marked as failed, the active failover
group does not attempt to fail over,
even if the interface failure threshold
is surpassed.
Mark standby
group as failed
Interface failure on standby failover No failover No action... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
338 | A valid permanent key is required; in rare instances on the ISA 3000, your PAK authentication key can be
removed. If your key consists of all 0’s, then you need to reinstall a valid authentication key before failover
can be enabled.
Note
Guidelines for Failover
Context Mode
• Active/Active mode is supported only in mul... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
339 | This workaround applies to switches connected to both routed mode and bridge group interfaces. The
PortFast feature immediately transitions the port into STP forwarding mode upon linkup. The port still
participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP
blocking mod... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
340 | Example:
firepower#show clock
01:00:52 UTC Mar 1 2022
...
01:01:18 UTC Mar 1 2022 <======= Incorrect (previous) clock
Cold Standby Sync Config Detected an Active mate
19:38:21 UTC Apr 9 2022 <======= Updated clock
Sync Config Sync File System Detected an Active mate
...
firepower/sec/stby#show clock
19:38:40 UTC Apr 9 ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
341 | • No HTTP replication in Stateful Failover.
• A single interface failure causes failover.
• The interface poll time is 5 seconds.
• The interface hold time is 25 seconds.
• The unit poll time is 1 second.
• The unit hold time is 15 seconds.
• Virtual MAC addresses are disabled in multiple context mode.
• Monitoring on ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
342 | The if_name argument assigns a name to the interface.
The interface_id argument can be a data physical interface, subinterface, or EtherChannel interface ID. On
the Firepower 1010, the interface is a firewall interface ID; you cannot specify a switch port ID or VLAN ID.
For the Firepower 4100/9300, you can use any data... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
343 | ciscoasa(config)# failover interface ip statelink 172.27.49.1 255.255.255.0 standby
172.27.49.2
Or:
ciscoasa(config)# failover interface ip statelink 2001:a0a:b00:a::a0a:b70/64 standby
2001:a0a:b00:a::a0a:b71
This address should be on an unused subnet, different from the failover link. This subnet can be 31-bits
(255.2... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
344 | You cannot use both IPsec encryption and the legacy failover key encryption. If you configure both
methods, IPsec is used. However, if you use the master passphrase, you must first remove the failover
key using the no failover key command before you configure IPsec encryption.
Failover LAN-to-LAN tunnels do not count a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
345 | Configure the Secondary Unit for Active/Standby Failover
The only configuration required on the secondary unit is for the failover link. The secondary unit requires
these commands to communicate initially with the primary unit. After the primary unit sends its configuration
to the secondary unit, the only permanent dif... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
346 | Before you begin
• Enable multiple context mode according to Enable or Disable Multiple Context Mode, on page 226.
• We recommend that you configure standby IP addresses for all interfaces except for the failover and
state links according to Routed and Transparent Mode Interfaces, on page 715. If you use a 31-bit subne... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
347 | Step 4 Enable the failover link:
interface failover_interface_id
no shutdown
Example:
ciscoasa(config)# interface gigabitethernet 0/3
ciscoasa(config-if)# no shutdown
Step 5 (Optional) If you want to use a separate interface for the state link, specify the interface.
failover link if_name interface_id
Example:
ciscoasa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
348 | ciscoasa(config-if)# no shutdown
Skip this step if you are sharing the state link.
Step 8 (Optional) Do one of the following to encrypt communications on the failover and state links:
• (Preferred) Establish IPsec LAN-to-LAN tunnels on the failover and state links between the units to
encrypt all failover communication... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
349 | failover group 1
primary
preempt [delay]
Example:
ciscoasa(config-fover-group)# failover group 1
ciscoasa(config-fover-group)# primary
ciscoasa(config-fover-group)# preempt 1200
Typically, you assign group 1 to the primary unit, and group 2 to the secondary unit. Both failover groups
become active on the unit that boot... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
350 | Step 13 Save the system configuration to flash memory:
write memory
Examples
The following example configures the failover parameters for the primary unit:
failover lan unit primary
failover lan interface folink gigabitethernet0/3
failover interface ip folink 172.27.48.0 255.255.255.254 standby 172.27.48.1
interface gi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
351 | Procedure
Step 1 Re-enter the exact same commands as on the primary unit except for the failover lanunitprimary command.
You can optionally replace it with the failover lan unit secondary command, but it is not necessary because
secondary is the default setting. You also do not need to enter the failover group and join... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
352 | • Routed mode only
Procedure
Step 1 Change the unit poll and hold times:
failover polltime [unit] [msec] poll_time [holdtime [msec] time]
Example:
ciscoasa(config)# failover polltime unit msec 200 holdtime msec 800
The polltime range is between 1 and 15 seconds or between 200 and 999 milliseconds. The holdtime range
is... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
353 | ciscoasa(config)# failover health-check bfd failover-temp
Step 3 Change the interface link state poll time:
failover polltime link-state msec poll_time
Example:
ciscoasa(config)# failover polltime link-state msec 300
The range is between 300 and 799 milliseconds. By default, each ASA in a failover pair checks the link ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
354 | Because of a delay when deleting HTTP flows from the standby unit when using failover, the
show conn count output might show different numbers on the active unit vs. the standby unit;
if you wait several seconds and re-issue the command, you will see the same count on both units.
Note
Step 8 Set the threshold for failo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
355 | To calculate the time before starting interface tests (y):
a. x = (holdtime/polltime)/2, rounded to the nearest integer. (.4 and down rounds down; .5 and up rounds
up.)
b. y = x*polltime
For example, if you use the default holdtime of 25 and polltime of 5, then y = 15 seconds.
Step 10 Configure the virtual MAC address ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
356 | Before you begin
In multiple context mode, configure interfaces within each context.
Procedure
Enable or disable health monitoring for an interface:
[no] monitor-interface {if_name}
Example:
ciscoasa(config)# monitor-interface inside
ciscoasa(config)# no monitor-interface eng1
Configure Support for Asymmetrically Route... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
357 | Figure 49: ASR Example
1. An outbound session passes through the ASA with the active SecAppA context. It exits interface outside
ISP-A (192.168.1.1).
2. Because of asymmetric routing configured somewhere upstream, the return traffic comes back through
the interface outsideISP-B (192.168.2.2) on the ASA with the active ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
358 | • You cannot configure both ASR groups and traffic zones within a context. If you configure a zone in a
context, none of the context interfaces can be part of an ASR group.
Procedure
Step 1 On the primary unit, specify the interface for which you want to allow asymmetrically routed packets:
interface phy_if
Example:
pr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
359 | no shutdown
interface GigabitEthernet0/4
no shutdown
interface GigabitEthernet0/5
no shutdown
failover
failover lan unit primary
failover lan interface folink GigabitEthernet0/1
failover link folink
failover interface ip folink 10.0.4.1 255.255.255.0 standby 10.0.4.11
failover group 1
primary
failover group 2
secondary... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
360 | Force Failover
To force the standby unit to become active, perform the following procedure.
Before you begin
In multiple context mode, perform this procedure in the System execution space.
Procedure
Step 1 Force a failover when entered on the standby unit. The standby unit becomes the active unit.
If you specify the gr... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
361 | • The standby unit/context remains in standby mode so that both units do not start passing traffic (this is
called a pseudo-standby state).
• The standby unit/context continues to use its standby IP addresses even though it is no longer connected
to an active unit/context.
• The standby unit/context continues to listen... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
362 | Example:
ciscoasa(config)# failover reset group 1
Restoring a failed unit to an unfailed state does not automatically make it active; restored units remain in the
standby state until made active by failover (forced or natural). An exception is a failover group (Active/Active
mode only) configured with failover preempti... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
363 | Step 5 When you are finished, you can restore the unit to active status by enter the following command on the newly
active unit:
Active/Standby mode:
ciscoasa(config)# no failover active
Active/Active mode:
ciscoasa(config)# failover active group group_id
When an ASA interface goes down, for failover it is still consid... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
364 | Commands that cause a command mode change do not change the prompt for the current session. You must
use the show failover exec command to display the command mode the command is executed in.See Change
Command Modes for more information.
Change Command Modes
The failover exec command maintains a command mode state that... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
365 | ciscoasa(config)# sh failover exec standby
Standby unit Failover EXEC is at config mode
ciscoasa(config)# sh failover exec mate
Active unit Failover EXEC is at interface sub-command mode
Security Considerations
The failover exec command usesthe failover link to send commandsto and receive the output of the command
exec... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
366 | Failover Messages
When a failover occurs, both ASAs send out system messages.
Failover Syslog Messages
The ASA issues a number of syslog messages related to failover at priority level 2, which indicates a critical
condition. To view these messages, see the syslog messages guide. The ranges of message IDs associated
wit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
367 | History for Failover
Feature Name Releases Feature Information
Active/Standby failover 7.0(1) This feature was introduced.
Active/Active failover 7.0(1) This feature was introduced.
You can now specify a hex value for failover link encryption.
We modified the following command: failover key hex.
Support for a hex value... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
368 | Feature Name Releases Feature Information
You can now lock configuration changes on the standby unit
(Active/Standby failover) or the standby context (Active/Active
failover)so you cannot make changes on the standby unit outside
normal configuration syncing.
We introduced the following command: failover standby
config-... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
369 | Feature Name Releases Feature Information
You can enable Bidirectional Forwarding Detection (BFD) for
the failover health check between two units of an Active/Standby
pair on theFirepower 9300 and 4100. Using BFD for the health
check is more reliable than the default health check method and
uses less CPU.
We introduced... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
370 | CHAPTER 9
Failover for High Availability in the Public Cloud
This chapter describes how to configure Active/Backup failover to accomplish high availability of the ASA
virtual in a public cloud environment, such as Microsoft Azure.
• About Failover in the Public Cloud, on page 311
• Licensing for Failover in the Public ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
371 | nature. For this reason, an HA configuration in the public cloud requires ongoing connections be restarted
when failover happens.
The health of the active unit is monitored by the backup unit to determine if specific failover conditions are
met. If those conditions are met, failover occurs. The failover time can vary f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
372 | of the response is enforced by a receive timeout, called the hold time. If the receipt of the Hello Response
times out, the active ASA virtual is considered to have failed.
The polling and hold time intervals are configurable parameters; see Configure Failover Criteria and Other
Settings, on page 321.
Active Unit Deter... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
373 | Failure Event Policy Active Action Backup Action Notes
Because the backup unit is changing
the route tables, it is the only unit that
needs to be authenticated to Azure.
It does not matter if the active unit is
authenticated to Azure or not.
Active Authentication failed No failover No action No action
Failover cannot h... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
374 | Limitations
• Failover is on the order of seconds rather than milliseconds.
• The HA role determination and the ability to participate as an HA unit depends on TCP connectivity
between HA peers and between an HA unit and the Azure infrastructure. There are several situations
where an ASA virtual will not be able partic... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
375 | • Each unit must be configured individually with similar configurations for handling failover traffic.
• The failover TCP control port number is 44442.
• The Azure Load Balancer health probe port number is 44441.
• The unit poll time is 5 seconds.
• The unit hold time is 15 seconds.
• The ASA virtual responds to health... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
376 | Figure 50: ASA Virtual HA Deployment in Azure
To be able to automatically make API calls to modify Azure route tables, the ASA virtual HA units need to
have Azure Active Directory credentials. Azure employs the concept of a Service Principal which, in simple
terms, is a service account. A ServicePrincipal allows you to... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
377 | • Application object—An Azure AD application is defined by its one and only application object, which
resides in the Azure AD tenant where the application was registered, known as the application's "home"
tenant.
• Service principal object—The service principal object defines the policy and permissions for an
applicati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
378 | Configure basic failoversettings on both the primary and secondary units. There is no synching of configuration
from the primary unit to the secondary unit. Each unit must be configured individually with similar
configurations for handling failover traffic.
Note
Configure Active/Backup Failover
To configure Active/Back... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
379 | Configure the Secondary Unit for Active/Backup Failover
Follow the steps in this section to configure the secondary unit in an Active/Backup failover configuration.
These steps provide the minimum configuration needed to enable failover to the secondary unit.
Before you begin
• Configure these settings in the system ex... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
380 | Configure Failover Criteria and Other Settings
See Defaults for Failover in the Public Cloud, on page 315 for the default settings for many parameters that
you can change in this section.
Before you begin
• Configure these settings in the system execution space in single context mode.
• Configure these settings on both... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
381 | If your deployment uses an Azure Load Balancer, the active ASA virtual must respond to TCP probes from
the load balancer so that incoming connections are directed to the active unit.
Step 4 Specify a secondary interface for Azure Load Balancer health probes:
failover cloud port probe port-number interface if-name
Examp... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
382 | a Service Principal. See the ASA virtual Quick Start Guide's Azure chapter for more information about the
Azure Service Principal.
Before you begin
• Configure these settings in the system execution space in single context mode.
• Configure these settings on both the primary and secondary units. There is no synching of... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
383 | Example:
(config)# failover cloud authentication key 5yOhH593dtD/O8gzAlWgulrkWz5dH02d2STk3LDbI4c=
You need this secret key when requesting an access key from the Azure infrastructure. If the encrypt keyword
is present the secret key is encrypted in the running-config.
Configure Azure Route Tables
The route table config... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
384 | Note When you enter the route-table command the ASA virtual switches to cfg-fover-cloud-rt mode.
Step 2 Configure an Azure Resource Group for a route table:
rg resource-group
Example:
ciscoasa(cfg-fover-cloud-rt)# rg east-rg
You need a resource group for the route table update requests in Azure.
Step 3 Configure a rout... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
385 | Procedure
Step 1 Enable failover:
ciscoasa(config)# failover
Step 2 Save the system configuration to flash memory:
ciscoasa(config)# write memory
Example
The following example shows a complete configuration for the primary unit:
ciscoasa(config)# failover cloud unit primary
ciscoasa(config)# failover cloud peer ip 10.4... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
386 | ciscoasa(config)# failover
Step 2 Save the system configuration to flash memory:
ciscoasa(config)# write memory
Example
The following example shows a complete configuration for the secondary unit:
ciscoasa(config)# failover cloud unit secondary
ciscoasa(config)# failover cloud peer ip 10.4.3.5
ciscoasa(config)# failove... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
387 | ciscoasa# failover active
The standby unit becomes the active unit.
Step 2 Force a failover when entered on the active unit:
no failover active
Example:
ciscoasa# no failover active
The active unit becomes the standby unit.
Update Routes
If the state of the routes in Azure is inconsistent with the ASA virtual in the ac... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
388 | Before you begin
Use this command in the system execution space in single context mode.
Procedure
Test the Azure authentication elements in your ASA virtual HA configuration:
test failover cloud authentication
Example:
ciscoasa(config)# test failover cloud authentication
Checking authentication to cloud provider
Authen... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
389 | Failover Messages
Failover Syslog Messages
The ASA issues a number of syslog messages related to failover at priority level 2, which indicates a critical
condition. To view these messages, see the syslog messages guide. Syslog messages are in the ranges of
1045xx and 1055xx.
During failover, the ASA logically shuts dow... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
390 | CHAPTER 10
ASA Cluster for the Secure Firewall 3100
Clustering lets you group multiple ASAs together as a single logical device. A cluster provides all the
convenience of a single device (management, integration into a network) while achieving the increased
throughput and redundancy of multiple devices.
Some features a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
391 | When you place the cluster in your network, the upstream and downstream routers need to be able to
load-balance the data coming to and from the cluster using Spanned EtherChannels. Interfaces on multiple
members of the cluster are grouped into a single EtherChannel; the EtherChannel performs load balancing
between unit... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
392 | ASA Cluster Management
One of the benefits of using ASA clustering is the ease of management. This section describes how to manage
the cluster.
Management Network
We recommend connecting all unitsto a single management network. This network isseparate from the cluster
control link.
Management Interface
For the manageme... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
393 | • SNMP
• NetFlow
Crypto Key Replication
When you create a crypto key on the control node, the key is replicated to all data nodes. If you have an SSH
session to the Main cluster IP address, you will be disconnected if the control node fails. The new control
node uses the same key forSSH connections, so that you do not ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
394 | Licenses for ASA Clustering
Smart Software Manager Regular and On-Prem
Each unit requiresthe Essentialslicense (enabled by default) and the same encryption license. We recommend
licensing each unit with the licensing server before you enable clustering to avoid licensing mismatch issues,
and when using the Strong Encry... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
395 | new active unit sends an entitlement authorization renewal request every 35 seconds until the license is
compliant. You should refrain from making configuration changes until the license requests are completely
processed. If a unit leaves the cluster, the cached control configuration is removed, while the per-unit
enti... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
396 | Sizing the Data Center Interconnect for Inter-Site Clustering
You should reserve bandwidth on the data center interconnect (DCI) for cluster control link traffic equivalent
to the following calculation:
If the number of members differs at each site, use the larger number for your calculation. The minimum
bandwidth for ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
397 | Firewall Mode
For single mode, the firewall mode must match on all units.
Failover
Failover is not supported with clustering.
IPv6
The cluster control link is only supported using IPv4.
Switches
• Make sure connected switches match the MTU for both cluster data interfaces and the cluster control
link interface. You sho... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
398 | EtherChannels
• In Catalyst 3750-X Cisco IOS software versions earlier than 15.1(1)S2, the cluster unit did not support
connecting an EtherChannel to a switch stack. With defaultswitch settings, if the cluster unit EtherChannel
is connected crossstack, and if the control unitswitch is powered down, then the EtherChanne... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
399 | Inter-Site Guidelines
See the following guidelines for inter-site clustering:
• The cluster control link latency must be less than 20 ms round-trip time (RTT).
• The cluster control link must be reliable, with no out-of-order or dropped packets; for example, you
should use a dedicated link.
• Do not configure connectio... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
400 | at the same site if the original owner fails (Note: if the traffic is asymmetric across sites, and there is
continuous traffic from the remote site after the original owner fails, then a node from the remote site
might become the new owner if it receives a data packet within the re-hosting window.).
• For director loca... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
401 | are sent back to the ASA cluster. These messages can result in some units of the ASA cluster experiencing
high CPU, which can affect performance. We recommend that you throttle ICMP error messages.
• It takes time to replicate changes to all the units in a cluster. If you make a large change, for example,
adding an acc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
402 | Cluster Control Link Traffic Overview
Cluster control link traffic includes both control and data traffic.
Control traffic includes:
• Control node election.
• Configuration replication.
• Health monitoring.
Data traffic includes:
• State replication.
• Connection ownership queries and data packet forwarding.
Cluster C... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
403 | If your cluster has large amounts of asymmetric (rebalanced) traffic, then you should increase the cluster
control link size.
Note
Cluster Control Link Redundancy
We recommend using an EtherChannel for the cluster control link, so that you can pass traffic on multiple
links in the EtherChannel while still achieving red... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
404 | Spanned EtherChannels
You can group one or more interfaces per chassis into an EtherChannel that spans all chassis in the cluster.
The EtherChannel aggregates the traffic across all the available active interfaces in the channel. A Spanned
EtherChannel can be configured in both routed and transparent firewall modes. In... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
405 | On the switch, we recommend that you use one of the following algorithms: source-dest-ip or
source-dest-ip-port (see the Cisco Nexus OS or Cisco IOS port-channel load-balance command). Do not
use a vlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the
ASAs in a cluster.
Not... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
406 | Cable the Cluster Units and Configure Upstream and Downstream Equipment
Before configuring clustering, cable the cluster control link network, management network, and data networks.
Procedure
Step 1 Cable the cluster control link network, management network, and data networks.
At a minimum, an active cluster control li... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
407 | Configure the Cluster Interface Mode on Each Unit
Before you enable clustering, you need to convert the firewall to use Spanned EtherChannels. Because
clustering limits the types of interfaces you can use, this process lets you check your existing configuration
for incompatible interfaces and then prevents you from con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
408 | Configure Interfaces on the Control Unit
You must modify any interface that is currently configured with an IP address to be cluster-ready before you
enable clustering. For other interfaces, you can configure them before or after you enable clustering; we
recommend pre-configuring all of your interfaces so that the com... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
409 | interface interface_id
Example:
ciscoasa(config)# interface management 1/1
Step 3 Set the interface to management-only mode so that it does not pass through traffic:
management-only
By default, Management type interfaces are configured as management-only. In transparent mode, this
command is always enabled for a Manage... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
410 | Examples
The following example configures the Ethernet 1/3 and Ethernet 1/4 interfaces as a device-local
EtherChannel, and then configures the EtherChannel as an Individual interface:
ip local pool mgmt 10.1.1.2-10.1.1.9
ipv6 local pool mgmtipv6 2001:DB8:45:1002/64 8
interface ethernet 1/3
channel-group 1 mode active
n... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
411 | The physical_interface ID includes the type, slot, and port number as type slot/port. This first interface in the
channel group determines the type and speed for all other interfaces in the group.
Step 2 Assign this interface to an EtherChannel:
channel-group channel_id mode active
Example:
ciscoasa(config-if)# channel... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
412 | Example:
ciscoasa(config)# context admin
ciscoasa(config)# allocate-interface port-channel1
ciscoasa(config)# changeto context admin
ciscoasa(config-if)# interface port-channel 1
For multiple context mode, the rest of the interface configuration occurs within each context.
Step 8 Name the interface:
nameif name
Example... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
413 | Example:
ciscoasa(config-if)# security-level 50
Where number is an integer between 0 (lowest) and 100 (highest).
Step 11 Configure a global MAC addressfor aSpanned EtherChannel to avoid potential network connectivity problems:
mac-address mac_address
Example:
ciscoasa(config-if)# mac-address 000C.F142.4CDE
With a manua... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
414 | Before you begin
• Back up your configurations in case you later want to leave the cluster, and need to restore your
configuration.
• For multiple context mode, complete these procedures in the system execution space. To change from
the context to the system execution space, enter the changeto system command.
• You mus... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
415 | c) Enable the interface:
no shutdown
You only need to enable the interface; do not configure a name for the interface, or any other parameters.
d) (For an EtherChannel) Repeat for each additional interface you want to add to the EtherChannel:
Example:
ciscoasa(config)# interface ethernet 1/7
ciscoasa(config-if)# channe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
416 | cluster-interface interface_id ip ip_address mask
Example:
ciscoasa(cfg-cluster)# cluster-interface port-channel2 ip 192.168.1.1 255.255.255.0
INFO: Non-cluster interface config is cleared on Port-Channel2
Subinterfaces and Management interfaces are not allowed.
Specify an IPv4 address for the IP address; IPv6 is not s... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
417 | All ASAsin the cluster use the same system ID: auto-generated by the control node (the default) and replicated
to all secondaries; or manually specified in this command in the form H.H.H, where H is a 16-bit hexadecimal
digit. (For example, the MAC address 00-0A-00-00-AA-AA is entered as 000A.0000.AAAA.) You might
want... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
418 | ip local pool mgmt 10.1.1.2-10.1.1.9
ipv6 local pool mgmtipv6 2001:DB8::1002/32 8
interface management 1/1
nameif management
ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt
ipv6 address 2001:DB8::1001/32 cluster-pool mgmtipv6
security-level 100
management-only
no shutdown
interface ethernet 1/6
channel-group 1 mode... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
419 | ciscoasa(config)# interface ethernet 1/7
ciscoasa(config-if)# channel-group 1 mode on
ciscoasa(config-if)# no shutdown
Step 2 Specify the same MTU that you configured for the control node:
Example:
ciscoasa(config)# mtu cluster 9198
Step 3 Identify the same cluster name that you configured for the control node:
Example... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
420 | ciscoasa(cfg-cluster)# priority 2
Set the priority between 1 and 100, where 1 is the highest priority.
Step 8 Set the same authentication key that you set for the control node:
Example:
ciscoasa(cfg-cluster)# key chuntheunavoidable
Step 9 Enable clustering:
enable as-data-node
You can avoid any configuration incompatib... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
421 | Configure Basic ASA Cluster Parameters
You can customize cluster settings on the control node.
Before you begin
• For multiple context mode, complete this procedure in the system execution space on the control node.
To change from the context to the system execution space, enter the changeto system command.
Procedure
S... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
422 | Example:
ciscoasa(config)# cluster group test
ciscoasa(cfg-cluster)#
Step 2 Customize the cluster node health check feature.
health-check [holdtime timeout] [vss-enabled]
To determine node health, the ASA cluster nodes send heartbeat messages on the cluster control link to other
nodes. If a node does not receive any he... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.