index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
323
Figure 47: Connecting with a Cable Scenario 3—Recommended If the ASA data interfaces are connected to more than one set of switches, then a failover link can be connected to one of the switches, preferably the switch on the secure (inside) side of network, as shown in the following figure. Figure 48: Connecting with a ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
324
However, if the secondary unit boots without detecting the primary unit, then the secondary unit becomes the active unit and usesits own MAC addresses, because it does not know the primary unit MAC addresses. When the primary unit becomes available, the secondary (active) unit changes the MAC addresses to those of the ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
325
Some configuration elements for clientless SSL VPN (such as bookmarks and customization) use the VPN failover subsystem, which is part of Stateful Failover. You must use Stateful Failover to synchronize these elements between the members of the failover pair. Stateless failover is not recommended for clientless SSL VPN...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
326
• ICMP connection state—ICMP connection replication is enabled only if the respective interface is assigned to an asymmetric routing group. • Static and dynamic routing tables—StatefulFailover participatesin dynamic routing protocols, like OSPF and EIGRP,so routesthat are learned through dynamic routing protocols on th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
327
• IPv6 clientless or Secure Client sessions • Citrix authentication (Citrix users must reauthenticate after failover) Bridge Group Requirements for Failover There are special considerations for failover when using bridge groups. Bridge Group Requirements for Appliances, ASAv When the active unit fails over to the stand...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
328
Unit Health Monitoring The ASA determines the health of the other unit by monitoring the failover link with hello messages. When a unit does not receive three consecutive hello messages on the failover link, the unitsends LANTEST messages on each data interface, including the failover link, to validate whether or not t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
329
1. Link Up/Down test—A test of the interface status. If the Link Up/Down test indicates that the interface is down, then the ASA considers it failed, and testing stops. If the status is Up, then the ASA performs the Network Activity test. 2. Network Activity test—A received network activity test. At the start of the te...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
330
• Interface failure on the active device exceeds the threshold configured. By default, failure of a single interface causes failover. You can change the default value by configuring a threshold for the number of interfaces or a percentage of monitored interfaces that must fail for the failover to occur. If the threshol...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
331
In Active/Active failover, whichever unit boots second obtains the running configuration from the unit that boots first, regardless of the primary or secondary designation of the booting unit. After both units are up, commands entered in the system execution space are replicated from the unit on which failover group 1 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
332
Command Replication After startup, commands that you enter on the active unit are immediately replicated on the standby unit. You do not have to save the active configuration to flash memory to replicate the commands. In Active/Active failover, commands entered in the system execution space are replicated from the unit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
333
• ASA multiple context mode supports the Config-Sync Optimization feature by sharing the context order during full configuration synchronization, allowing comparison of context order during subsequent node-rejoin. • If you configure passphrase and failover IPsec key, then Config-Sync Optimization is not effective as th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
334
• The primary unit always becomes the active unit if both units start up at the same time (and are of equal operational health). • The primary unit MAC addresses are always coupled with the active IP addresses. The exception to this rule occurs when the secondary unit becomes active and cannot obtain the primary unit M...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
335
Failure Event Policy Active Unit Action Standby Unit Action Notes State information becomes out of date, and sessions are terminated if a failover occurs. State link failed No failover No action No action Interface failure on active unit Failover Mark active as failed Become active None. above threshold When the standb...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
336
unit becomes active when both units start simultaneously. Instead, the primary/secondary designation does two things: • The primary unit provides the running configuration to the pair when they boot simultaneously. • Each failover group in the configuration is configured with a primary or secondary unit preference. Whe...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
337
Notes Standby Group Action Active Group Failure Event Policy Action When the standby failover group is marked as failed, the active failover group does not attempt to fail over, even if the interface failure threshold is surpassed. Mark standby group as failed Interface failure on standby failover No failover No action...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
338
A valid permanent key is required; in rare instances on the ISA 3000, your PAK authentication key can be removed. If your key consists of all 0’s, then you need to reinstall a valid authentication key before failover can be enabled. Note Guidelines for Failover Context Mode • Active/Active mode is supported only in mul...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
339
This workaround applies to switches connected to both routed mode and bridge group interfaces. The PortFast feature immediately transitions the port into STP forwarding mode upon linkup. The port still participates in STP. So if the port is to be a part of the loop, the port eventually transitions into STP blocking mod...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
340
Example: firepower#show clock 01:00:52 UTC Mar 1 2022 ... 01:01:18 UTC Mar 1 2022 <======= Incorrect (previous) clock Cold Standby Sync Config Detected an Active mate 19:38:21 UTC Apr 9 2022 <======= Updated clock Sync Config Sync File System Detected an Active mate ... firepower/sec/stby#show clock 19:38:40 UTC Apr 9 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
341
• No HTTP replication in Stateful Failover. • A single interface failure causes failover. • The interface poll time is 5 seconds. • The interface hold time is 25 seconds. • The unit poll time is 1 second. • The unit hold time is 15 seconds. • Virtual MAC addresses are disabled in multiple context mode. • Monitoring on ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
342
The if_name argument assigns a name to the interface. The interface_id argument can be a data physical interface, subinterface, or EtherChannel interface ID. On the Firepower 1010, the interface is a firewall interface ID; you cannot specify a switch port ID or VLAN ID. For the Firepower 4100/9300, you can use any data...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
343
ciscoasa(config)# failover interface ip statelink 172.27.49.1 255.255.255.0 standby 172.27.49.2 Or: ciscoasa(config)# failover interface ip statelink 2001:a0a:b00:a::a0a:b70/64 standby 2001:a0a:b00:a::a0a:b71 This address should be on an unused subnet, different from the failover link. This subnet can be 31-bits (255.2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
344
You cannot use both IPsec encryption and the legacy failover key encryption. If you configure both methods, IPsec is used. However, if you use the master passphrase, you must first remove the failover key using the no failover key command before you configure IPsec encryption. Failover LAN-to-LAN tunnels do not count a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
345
Configure the Secondary Unit for Active/Standby Failover The only configuration required on the secondary unit is for the failover link. The secondary unit requires these commands to communicate initially with the primary unit. After the primary unit sends its configuration to the secondary unit, the only permanent dif...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
346
Before you begin • Enable multiple context mode according to Enable or Disable Multiple Context Mode, on page 226. • We recommend that you configure standby IP addresses for all interfaces except for the failover and state links according to Routed and Transparent Mode Interfaces, on page 715. If you use a 31-bit subne...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
347
Step 4 Enable the failover link: interface failover_interface_id no shutdown Example: ciscoasa(config)# interface gigabitethernet 0/3 ciscoasa(config-if)# no shutdown Step 5 (Optional) If you want to use a separate interface for the state link, specify the interface. failover link if_name interface_id Example: ciscoasa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
348
ciscoasa(config-if)# no shutdown Skip this step if you are sharing the state link. Step 8 (Optional) Do one of the following to encrypt communications on the failover and state links: • (Preferred) Establish IPsec LAN-to-LAN tunnels on the failover and state links between the units to encrypt all failover communication...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
349
failover group 1 primary preempt [delay] Example: ciscoasa(config-fover-group)# failover group 1 ciscoasa(config-fover-group)# primary ciscoasa(config-fover-group)# preempt 1200 Typically, you assign group 1 to the primary unit, and group 2 to the secondary unit. Both failover groups become active on the unit that boot...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
350
Step 13 Save the system configuration to flash memory: write memory Examples The following example configures the failover parameters for the primary unit: failover lan unit primary failover lan interface folink gigabitethernet0/3 failover interface ip folink 172.27.48.0 255.255.255.254 standby 172.27.48.1 interface gi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
351
Procedure Step 1 Re-enter the exact same commands as on the primary unit except for the failover lanunitprimary command. You can optionally replace it with the failover lan unit secondary command, but it is not necessary because secondary is the default setting. You also do not need to enter the failover group and join...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
352
• Routed mode only Procedure Step 1 Change the unit poll and hold times: failover polltime [unit] [msec] poll_time [holdtime [msec] time] Example: ciscoasa(config)# failover polltime unit msec 200 holdtime msec 800 The polltime range is between 1 and 15 seconds or between 200 and 999 milliseconds. The holdtime range is...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
353
ciscoasa(config)# failover health-check bfd failover-temp Step 3 Change the interface link state poll time: failover polltime link-state msec poll_time Example: ciscoasa(config)# failover polltime link-state msec 300 The range is between 300 and 799 milliseconds. By default, each ASA in a failover pair checks the link ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
354
Because of a delay when deleting HTTP flows from the standby unit when using failover, the show conn count output might show different numbers on the active unit vs. the standby unit; if you wait several seconds and re-issue the command, you will see the same count on both units. Note Step 8 Set the threshold for failo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
355
To calculate the time before starting interface tests (y): a. x = (holdtime/polltime)/2, rounded to the nearest integer. (.4 and down rounds down; .5 and up rounds up.) b. y = x*polltime For example, if you use the default holdtime of 25 and polltime of 5, then y = 15 seconds. Step 10 Configure the virtual MAC address ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
356
Before you begin In multiple context mode, configure interfaces within each context. Procedure Enable or disable health monitoring for an interface: [no] monitor-interface {if_name} Example: ciscoasa(config)# monitor-interface inside ciscoasa(config)# no monitor-interface eng1 Configure Support for Asymmetrically Route...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
357
Figure 49: ASR Example 1. An outbound session passes through the ASA with the active SecAppA context. It exits interface outside ISP-A (192.168.1.1). 2. Because of asymmetric routing configured somewhere upstream, the return traffic comes back through the interface outsideISP-B (192.168.2.2) on the ASA with the active ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
358
• You cannot configure both ASR groups and traffic zones within a context. If you configure a zone in a context, none of the context interfaces can be part of an ASR group. Procedure Step 1 On the primary unit, specify the interface for which you want to allow asymmetrically routed packets: interface phy_if Example: pr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
359
no shutdown interface GigabitEthernet0/4 no shutdown interface GigabitEthernet0/5 no shutdown failover failover lan unit primary failover lan interface folink GigabitEthernet0/1 failover link folink failover interface ip folink 10.0.4.1 255.255.255.0 standby 10.0.4.11 failover group 1 primary failover group 2 secondary...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
360
Force Failover To force the standby unit to become active, perform the following procedure. Before you begin In multiple context mode, perform this procedure in the System execution space. Procedure Step 1 Force a failover when entered on the standby unit. The standby unit becomes the active unit. If you specify the gr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
361
• The standby unit/context remains in standby mode so that both units do not start passing traffic (this is called a pseudo-standby state). • The standby unit/context continues to use its standby IP addresses even though it is no longer connected to an active unit/context. • The standby unit/context continues to listen...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
362
Example: ciscoasa(config)# failover reset group 1 Restoring a failed unit to an unfailed state does not automatically make it active; restored units remain in the standby state until made active by failover (forced or natural). An exception is a failover group (Active/Active mode only) configured with failover preempti...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
363
Step 5 When you are finished, you can restore the unit to active status by enter the following command on the newly active unit: Active/Standby mode: ciscoasa(config)# no failover active Active/Active mode: ciscoasa(config)# failover active group group_id When an ASA interface goes down, for failover it is still consid...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
364
Commands that cause a command mode change do not change the prompt for the current session. You must use the show failover exec command to display the command mode the command is executed in.See Change Command Modes for more information. Change Command Modes The failover exec command maintains a command mode state that...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
365
ciscoasa(config)# sh failover exec standby Standby unit Failover EXEC is at config mode ciscoasa(config)# sh failover exec mate Active unit Failover EXEC is at interface sub-command mode Security Considerations The failover exec command usesthe failover link to send commandsto and receive the output of the command exec...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
366
Failover Messages When a failover occurs, both ASAs send out system messages. Failover Syslog Messages The ASA issues a number of syslog messages related to failover at priority level 2, which indicates a critical condition. To view these messages, see the syslog messages guide. The ranges of message IDs associated wit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
367
History for Failover Feature Name Releases Feature Information Active/Standby failover 7.0(1) This feature was introduced. Active/Active failover 7.0(1) This feature was introduced. You can now specify a hex value for failover link encryption. We modified the following command: failover key hex. Support for a hex value...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
368
Feature Name Releases Feature Information You can now lock configuration changes on the standby unit (Active/Standby failover) or the standby context (Active/Active failover)so you cannot make changes on the standby unit outside normal configuration syncing. We introduced the following command: failover standby config-...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
369
Feature Name Releases Feature Information You can enable Bidirectional Forwarding Detection (BFD) for the failover health check between two units of an Active/Standby pair on theFirepower 9300 and 4100. Using BFD for the health check is more reliable than the default health check method and uses less CPU. We introduced...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
370
CHAPTER 9 Failover for High Availability in the Public Cloud This chapter describes how to configure Active/Backup failover to accomplish high availability of the ASA virtual in a public cloud environment, such as Microsoft Azure. • About Failover in the Public Cloud, on page 311 • Licensing for Failover in the Public ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
371
nature. For this reason, an HA configuration in the public cloud requires ongoing connections be restarted when failover happens. The health of the active unit is monitored by the backup unit to determine if specific failover conditions are met. If those conditions are met, failover occurs. The failover time can vary f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
372
of the response is enforced by a receive timeout, called the hold time. If the receipt of the Hello Response times out, the active ASA virtual is considered to have failed. The polling and hold time intervals are configurable parameters; see Configure Failover Criteria and Other Settings, on page 321. Active Unit Deter...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
373
Failure Event Policy Active Action Backup Action Notes Because the backup unit is changing the route tables, it is the only unit that needs to be authenticated to Azure. It does not matter if the active unit is authenticated to Azure or not. Active Authentication failed No failover No action No action Failover cannot h...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
374
Limitations • Failover is on the order of seconds rather than milliseconds. • The HA role determination and the ability to participate as an HA unit depends on TCP connectivity between HA peers and between an HA unit and the Azure infrastructure. There are several situations where an ASA virtual will not be able partic...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
375
• Each unit must be configured individually with similar configurations for handling failover traffic. • The failover TCP control port number is 44442. • The Azure Load Balancer health probe port number is 44441. • The unit poll time is 5 seconds. • The unit hold time is 15 seconds. • The ASA virtual responds to health...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
376
Figure 50: ASA Virtual HA Deployment in Azure To be able to automatically make API calls to modify Azure route tables, the ASA virtual HA units need to have Azure Active Directory credentials. Azure employs the concept of a Service Principal which, in simple terms, is a service account. A ServicePrincipal allows you to...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
377
• Application object—An Azure AD application is defined by its one and only application object, which resides in the Azure AD tenant where the application was registered, known as the application's "home" tenant. • Service principal object—The service principal object defines the policy and permissions for an applicati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
378
Configure basic failoversettings on both the primary and secondary units. There is no synching of configuration from the primary unit to the secondary unit. Each unit must be configured individually with similar configurations for handling failover traffic. Note Configure Active/Backup Failover To configure Active/Back...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
379
Configure the Secondary Unit for Active/Backup Failover Follow the steps in this section to configure the secondary unit in an Active/Backup failover configuration. These steps provide the minimum configuration needed to enable failover to the secondary unit. Before you begin • Configure these settings in the system ex...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
380
Configure Failover Criteria and Other Settings See Defaults for Failover in the Public Cloud, on page 315 for the default settings for many parameters that you can change in this section. Before you begin • Configure these settings in the system execution space in single context mode. • Configure these settings on both...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
381
If your deployment uses an Azure Load Balancer, the active ASA virtual must respond to TCP probes from the load balancer so that incoming connections are directed to the active unit. Step 4 Specify a secondary interface for Azure Load Balancer health probes: failover cloud port probe port-number interface if-name Examp...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
382
a Service Principal. See the ASA virtual Quick Start Guide's Azure chapter for more information about the Azure Service Principal. Before you begin • Configure these settings in the system execution space in single context mode. • Configure these settings on both the primary and secondary units. There is no synching of...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
383
Example: (config)# failover cloud authentication key 5yOhH593dtD/O8gzAlWgulrkWz5dH02d2STk3LDbI4c= You need this secret key when requesting an access key from the Azure infrastructure. If the encrypt keyword is present the secret key is encrypted in the running-config. Configure Azure Route Tables The route table config...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
384
Note When you enter the route-table command the ASA virtual switches to cfg-fover-cloud-rt mode. Step 2 Configure an Azure Resource Group for a route table: rg resource-group Example: ciscoasa(cfg-fover-cloud-rt)# rg east-rg You need a resource group for the route table update requests in Azure. Step 3 Configure a rout...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
385
Procedure Step 1 Enable failover: ciscoasa(config)# failover Step 2 Save the system configuration to flash memory: ciscoasa(config)# write memory Example The following example shows a complete configuration for the primary unit: ciscoasa(config)# failover cloud unit primary ciscoasa(config)# failover cloud peer ip 10.4...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
386
ciscoasa(config)# failover Step 2 Save the system configuration to flash memory: ciscoasa(config)# write memory Example The following example shows a complete configuration for the secondary unit: ciscoasa(config)# failover cloud unit secondary ciscoasa(config)# failover cloud peer ip 10.4.3.5 ciscoasa(config)# failove...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
387
ciscoasa# failover active The standby unit becomes the active unit. Step 2 Force a failover when entered on the active unit: no failover active Example: ciscoasa# no failover active The active unit becomes the standby unit. Update Routes If the state of the routes in Azure is inconsistent with the ASA virtual in the ac...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
388
Before you begin Use this command in the system execution space in single context mode. Procedure Test the Azure authentication elements in your ASA virtual HA configuration: test failover cloud authentication Example: ciscoasa(config)# test failover cloud authentication Checking authentication to cloud provider Authen...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
389
Failover Messages Failover Syslog Messages The ASA issues a number of syslog messages related to failover at priority level 2, which indicates a critical condition. To view these messages, see the syslog messages guide. Syslog messages are in the ranges of 1045xx and 1055xx. During failover, the ASA logically shuts dow...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
390
CHAPTER 10 ASA Cluster for the Secure Firewall 3100 Clustering lets you group multiple ASAs together as a single logical device. A cluster provides all the convenience of a single device (management, integration into a network) while achieving the increased throughput and redundancy of multiple devices. Some features a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
391
When you place the cluster in your network, the upstream and downstream routers need to be able to load-balance the data coming to and from the cluster using Spanned EtherChannels. Interfaces on multiple members of the cluster are grouped into a single EtherChannel; the EtherChannel performs load balancing between unit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
392
ASA Cluster Management One of the benefits of using ASA clustering is the ease of management. This section describes how to manage the cluster. Management Network We recommend connecting all unitsto a single management network. This network isseparate from the cluster control link. Management Interface For the manageme...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
393
• SNMP • NetFlow Crypto Key Replication When you create a crypto key on the control node, the key is replicated to all data nodes. If you have an SSH session to the Main cluster IP address, you will be disconnected if the control node fails. The new control node uses the same key forSSH connections, so that you do not ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
394
Licenses for ASA Clustering Smart Software Manager Regular and On-Prem Each unit requiresthe Essentialslicense (enabled by default) and the same encryption license. We recommend licensing each unit with the licensing server before you enable clustering to avoid licensing mismatch issues, and when using the Strong Encry...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
395
new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. You should refrain from making configuration changes until the license requests are completely processed. If a unit leaves the cluster, the cached control configuration is removed, while the per-unit enti...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
396
Sizing the Data Center Interconnect for Inter-Site Clustering You should reserve bandwidth on the data center interconnect (DCI) for cluster control link traffic equivalent to the following calculation: If the number of members differs at each site, use the larger number for your calculation. The minimum bandwidth for ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
397
Firewall Mode For single mode, the firewall mode must match on all units. Failover Failover is not supported with clustering. IPv6 The cluster control link is only supported using IPv4. Switches • Make sure connected switches match the MTU for both cluster data interfaces and the cluster control link interface. You sho...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
398
EtherChannels • In Catalyst 3750-X Cisco IOS software versions earlier than 15.1(1)S2, the cluster unit did not support connecting an EtherChannel to a switch stack. With defaultswitch settings, if the cluster unit EtherChannel is connected crossstack, and if the control unitswitch is powered down, then the EtherChanne...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
399
Inter-Site Guidelines See the following guidelines for inter-site clustering: • The cluster control link latency must be less than 20 ms round-trip time (RTT). • The cluster control link must be reliable, with no out-of-order or dropped packets; for example, you should use a dedicated link. • Do not configure connectio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
400
at the same site if the original owner fails (Note: if the traffic is asymmetric across sites, and there is continuous traffic from the remote site after the original owner fails, then a node from the remote site might become the new owner if it receives a data packet within the re-hosting window.). • For director loca...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
401
are sent back to the ASA cluster. These messages can result in some units of the ASA cluster experiencing high CPU, which can affect performance. We recommend that you throttle ICMP error messages. • It takes time to replicate changes to all the units in a cluster. If you make a large change, for example, adding an acc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
402
Cluster Control Link Traffic Overview Cluster control link traffic includes both control and data traffic. Control traffic includes: • Control node election. • Configuration replication. • Health monitoring. Data traffic includes: • State replication. • Connection ownership queries and data packet forwarding. Cluster C...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
403
If your cluster has large amounts of asymmetric (rebalanced) traffic, then you should increase the cluster control link size. Note Cluster Control Link Redundancy We recommend using an EtherChannel for the cluster control link, so that you can pass traffic on multiple links in the EtherChannel while still achieving red...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
404
Spanned EtherChannels You can group one or more interfaces per chassis into an EtherChannel that spans all chassis in the cluster. The EtherChannel aggregates the traffic across all the available active interfaces in the channel. A Spanned EtherChannel can be configured in both routed and transparent firewall modes. In...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
405
On the switch, we recommend that you use one of the following algorithms: source-dest-ip or source-dest-ip-port (see the Cisco Nexus OS or Cisco IOS port-channel load-balance command). Do not use a vlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the ASAs in a cluster. Not...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
406
Cable the Cluster Units and Configure Upstream and Downstream Equipment Before configuring clustering, cable the cluster control link network, management network, and data networks. Procedure Step 1 Cable the cluster control link network, management network, and data networks. At a minimum, an active cluster control li...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
407
Configure the Cluster Interface Mode on Each Unit Before you enable clustering, you need to convert the firewall to use Spanned EtherChannels. Because clustering limits the types of interfaces you can use, this process lets you check your existing configuration for incompatible interfaces and then prevents you from con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
408
Configure Interfaces on the Control Unit You must modify any interface that is currently configured with an IP address to be cluster-ready before you enable clustering. For other interfaces, you can configure them before or after you enable clustering; we recommend pre-configuring all of your interfaces so that the com...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
409
interface interface_id Example: ciscoasa(config)# interface management 1/1 Step 3 Set the interface to management-only mode so that it does not pass through traffic: management-only By default, Management type interfaces are configured as management-only. In transparent mode, this command is always enabled for a Manage...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
410
Examples The following example configures the Ethernet 1/3 and Ethernet 1/4 interfaces as a device-local EtherChannel, and then configures the EtherChannel as an Individual interface: ip local pool mgmt 10.1.1.2-10.1.1.9 ipv6 local pool mgmtipv6 2001:DB8:45:1002/64 8 interface ethernet 1/3 channel-group 1 mode active n...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
411
The physical_interface ID includes the type, slot, and port number as type slot/port. This first interface in the channel group determines the type and speed for all other interfaces in the group. Step 2 Assign this interface to an EtherChannel: channel-group channel_id mode active Example: ciscoasa(config-if)# channel...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
412
Example: ciscoasa(config)# context admin ciscoasa(config)# allocate-interface port-channel1 ciscoasa(config)# changeto context admin ciscoasa(config-if)# interface port-channel 1 For multiple context mode, the rest of the interface configuration occurs within each context. Step 8 Name the interface: nameif name Example...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
413
Example: ciscoasa(config-if)# security-level 50 Where number is an integer between 0 (lowest) and 100 (highest). Step 11 Configure a global MAC addressfor aSpanned EtherChannel to avoid potential network connectivity problems: mac-address mac_address Example: ciscoasa(config-if)# mac-address 000C.F142.4CDE With a manua...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
414
Before you begin • Back up your configurations in case you later want to leave the cluster, and need to restore your configuration. • For multiple context mode, complete these procedures in the system execution space. To change from the context to the system execution space, enter the changeto system command. • You mus...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
415
c) Enable the interface: no shutdown You only need to enable the interface; do not configure a name for the interface, or any other parameters. d) (For an EtherChannel) Repeat for each additional interface you want to add to the EtherChannel: Example: ciscoasa(config)# interface ethernet 1/7 ciscoasa(config-if)# channe...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
416
cluster-interface interface_id ip ip_address mask Example: ciscoasa(cfg-cluster)# cluster-interface port-channel2 ip 192.168.1.1 255.255.255.0 INFO: Non-cluster interface config is cleared on Port-Channel2 Subinterfaces and Management interfaces are not allowed. Specify an IPv4 address for the IP address; IPv6 is not s...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
417
All ASAsin the cluster use the same system ID: auto-generated by the control node (the default) and replicated to all secondaries; or manually specified in this command in the form H.H.H, where H is a 16-bit hexadecimal digit. (For example, the MAC address 00-0A-00-00-AA-AA is entered as 000A.0000.AAAA.) You might want...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
418
ip local pool mgmt 10.1.1.2-10.1.1.9 ipv6 local pool mgmtipv6 2001:DB8::1002/32 8 interface management 1/1 nameif management ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt ipv6 address 2001:DB8::1001/32 cluster-pool mgmtipv6 security-level 100 management-only no shutdown interface ethernet 1/6 channel-group 1 mode...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
419
ciscoasa(config)# interface ethernet 1/7 ciscoasa(config-if)# channel-group 1 mode on ciscoasa(config-if)# no shutdown Step 2 Specify the same MTU that you configured for the control node: Example: ciscoasa(config)# mtu cluster 9198 Step 3 Identify the same cluster name that you configured for the control node: Example...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
420
ciscoasa(cfg-cluster)# priority 2 Set the priority between 1 and 100, where 1 is the highest priority. Step 8 Set the same authentication key that you set for the control node: Example: ciscoasa(cfg-cluster)# key chuntheunavoidable Step 9 Enable clustering: enable as-data-node You can avoid any configuration incompatib...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
421
Configure Basic ASA Cluster Parameters You can customize cluster settings on the control node. Before you begin • For multiple context mode, complete this procedure in the system execution space on the control node. To change from the context to the system execution space, enter the changeto system command. Procedure S...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
422
Example: ciscoasa(config)# cluster group test ciscoasa(cfg-cluster)# Step 2 Customize the cluster node health check feature. health-check [holdtime timeout] [vss-enabled] To determine node health, the ASA cluster nodes send heartbeat messages on the cluster control link to other nodes. If a node does not receive any he...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf