index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
423
for the disabled interfaces. When the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the health check feature. Example: ciscoasa(cfg-cluster)# no health-check monitor-interface management1/1 Step 4 Customize the auto-rejoin cluster settings after a health check failu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
424
• frequency seconds—Setsthe time in seconds between monitoring messages, between 10 and 360 seconds. The default is 20 seconds. • intervals intervals—Sets the number of intervals for which the ASA maintains data, between 1 and 60. The default is 30. You can monitor the traffic load for cluster members, including total ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
425
director/backup flow is created, then those flows cannot be recovered. Similarly, if traffic is rebalanced to a different node before the flow is created, then the flow cannot be recovered. You should not enable the TCP replication delay for traffic on which you disable TCP randomization. Procedure Step 1 Enable the cl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
426
enables additional director roles: a local director at the same site as the owner, and a global director that can be at any site. Keeping the owner and director at the same site improves performance. Also, if the original owner fails, the local director chooses a new connection owner at the same site. The global direct...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
427
site-redundancy Configure Per-Site Gratuitous ARP The ASA now generates gratuitous ARP (GARP) packets to keep the switching infrastructure up to date: the highest priority member at each site periodically generates GARP traffic for the global MAC/IP addresses. When using per-site MAC and IPaddresses, packets sourced fr...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
428
Data center virtual machine mobility such as VMware VMotion enables servers to migrate between data centers while maintaining connections to clients. To support such data center server mobility, routers need to be able to update the ingress route towards the server when it moves. Cisco Locator/ID Separation Protocol (L...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
429
3. Service Policy to enable flow mobility on specified traffic—You should enable flow mobility on business-critical traffic. For example, you can limit flow mobility to only HTTPS traffic, and/or to traffic to specific servers. 4. Site IDs—The ASA uses the site ID for each cluster node to determine the new owner. 5. Cl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
430
ciscoasa(config-pmap-p)# allowed-eid access-list TRACKED_EID_LISP ciscoasa(config-pmap-p)# validate-key MadMaxShinyandChrome Step 2 Configure LISP inspection for UDP traffic between the first hop router and the ITR or ETR on port 4342: a) Configure the extended ACL to identify LISP traffic: access list inspect_acl_name...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
431
Both IPv4 and IPv6 ACLs are accepted.See the command reference for exact access-list extendedsyntax. You should enable flow mobility on business-critical traffic. For example, you can limit flow mobility to only HTTPS traffic, and/or to traffic to specific servers. b) Create a class map for the ACL: class-map flow_map_...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
432
class-map LISP_CLASS match access-list LISP_ACL policy-map INSIDE_POLICY class LISP_CLASS inspect lisp LISP_EID_INSPECT service-policy INSIDE_POLICY interface inside ! access-list IMPORTANT-FLOWS extended permit tcp any 10.10.10.0 255.255.255.0 eq https class-map IMPORTANT-FLOWS-MAP match access-list IMPORTANT-FLOWS po...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
433
ciscoasa(config)# cluster group pod1 Step 2 Disable clustering: no enable If this node was the control node, a new control election takes place, and a different member becomes the control node. The cluster configuration is maintained, so that you can enable clustering again later. Deactivate a Node To deactivate a memb...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
434
to the cluster please logon to that unit and re-enable clustering Rejoin the Cluster If a node was removed from the cluster, for example for a failed interface or if you manually deactivated a member, you must manually rejoin the cluster. Before you begin • You must use the console port to reenable clustering. Other in...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
435
Procedure Step 1 For a data node, disable clustering: cluster group cluster_name no enable Example: ciscoasa(config)# cluster group cluster1 ciscoasa(cfg-cluster)# no enable You cannot make configuration changes while clustering is enabled on a data node. Step 2 Clear the cluster configuration: clear configure cluster ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
436
Change the Control Node The best method to change the control node is to disable clustering on the control node, wait for a new control election, and then re-enable clustering. If you must specify the exact node you want to become the control node, use the procedure in this section. Note, however, that for centralized ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
437
To view node names, enter cluster exec unit ? (to see all names except the current node), or enter the show cluster info command. Examples To copy the same capture file from all nodes in the cluster at the same time to a TFTP server, enter the following command on the control node: ciscoasa# cluster exec copy /pcap cap...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
438
This is "C" in state DATA_NODE ID : 0 Site ID : 1 Version : 9.4(1) Serial No.: P3000000025 CCL IP : 10.0.0.3 CCL MAC : 000b.fcf8.c192 Last join : 17:08:59 UTC Sep 26 2011 Last leave: N/A Other members in the cluster: Unit "D" in state DATA_NODE ID : 1 Site ID : 1 Version : 9.4(1) Serial No.: P3000000001 CCL IP : 10.0.0...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
439
ciscoasa(cfg-cluster)# show cluster info auto-join Unit will try to join cluster when quit reason is cleared. Quit reason: Unit is kicked out from cluster because of Application health check failure. ciscoasa(cfg-cluster)# show cluster info auto-join Unit join is pending (waiting for the smart license entitlement: ent1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
440
This unit as a receiver of broadcast messages --------------------------------------------- 0 2 3 U 111847 121862 120029 R 7503 665700 749288 ESN 5d75b4b3 6d81d23 365ddd50 RI 630 34278 40291 RO 0 582 850 ROW 0 566 850 ROB 0 16 0 RAS 1571 123289 142256 This unit as a receiver of unicast messages ------------------------...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
441
MRT Tx of unitcast messages(to member_id:0) ============================================ Message high watermark: 31% Total messages buffered at high watermark: 4059 [Per-client message usage at high watermark] --------------------------------------------------------------- Client name Total messages Percentage Cluster ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
442
To support cluster-wide troubleshooting, you can enable capture of cluster-specific traffic on the control node using the cluster exec capture command, which is then automatically enabled on all of the data nodes in the cluster. Monitoring Cluster Resources See the following command for monitoring cluster resources: sh...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
443
Ifc: 10.1.226.1/500, flags -c, idle 1m22s, uptime 1m22s, timeout 2m0s, bytes 1580, cluster sent/rcvd bytes 0/0, cluster sent/rcvd total bytes 0/0, owners (0,255) Traffic received at interface outside Locally received: 864 (10 byte/s) Traffic received at interface NP Identity Ifc Locally received: 716 (8 byte/s) To trou...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
444
The show cluster info load-monitor command shows the traffic load for cluster members for the last interval and also the average over total number of intervals configured (30 by default). Use the details keyword to view the value for each measure at each interval. ciscoasa(cfg-cluster)# show cluster info load-monitor I...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
445
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Unit ID 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Memory usage(%) captured over 30 intervals: Unit ID 0 25 25 30 30 30 35 25 25 35 30 30 30 25 25 30 25 25 35 30 30 30 25 25 25 25 20 30 30 30 30 Unit ID 1 30 25 35 25 30 30 25 25 35 25 30 35 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
446
25 20 30 30 30 30 Unit ID 1 30 25 35 25 30 30 25 25 35 25 30 35 30 30 35 30 30 30 25 20 30 25 25 30 20 30 35 30 30 35 • show cluster {access-list | conn | traffic | user-identity | xlate} [options] Displays aggregated data for the entire cluster. The options available depends on the data type. See the following output ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
447
ciscoasa# show cluster conn count Usage Summary In Cluster:********************************************* 200 in use (cluster-wide aggregated) cl2(LOCAL):*********************************************************** 100 in use, 100 most used cl1:****************************************************************** 100 in use...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
448
Monitoring Cluster Interfaces See the following commands for monitoring cluster interfaces: • show cluster interface-mode Shows the cluster interface mode. • show port-channel Includes information about whether a port-channel is spanned. • show lacp cluster {system-mac | system-id} Shows the cLACP system ID and priorit...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
449
Feb 02 14:19:47.456 [DBUG]Receive CCP message: CCP_MSG_LOAD_BALANCE Feb 02 14:19:47.456 [DBUG]Send CCP message to all: CCP_MSG_KEEPALIVE from 80-1 at CONTROL_NODE For example, if you see the following messages showing that two nodes with the same local-unit name are acting as the control node, it could mean that either...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
450
channel-group 1 mode on no shutdown ! interface Port-channel1 description Clustering Interface ! cluster group Moya local-unit A cluster-interface Port-channel1 ip 10.0.0.1 255.255.255.0 priority 10 key emphyri0 enable noconfirm ASA2 Data Unit Bootstrap Configuration interface Ethernet1/6 channel-group 1 mode on no shu...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
451
! interface Port-channel10 mac-address aaaa.bbbb.cccc nameif inside security-level 100 ip address 209.165.200.225 255.255.255.224 ! interface Port-channel11 mac-address aaaa.dddd.cccc nameif outside security-level 0 ip address 209.165.201.1 255.255.255.224 Cisco IOS Switch Configuration interface GigabitEthernet1/0/15 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
452
Firewall on a Stick Data traffic from different security domains are associated with different VLANs, for example, VLAN 10 for the inside network and VLAN 20 for the outside network. Each ASA has a single physical port connected to the external switch or router. Trunking is enabled so that all packets on the physical l...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
453
cluster group cluster1 local-unit asa1 cluster-interface ethernet1/8 ip 192.168.1.1 255.255.255.0 priority 1 key chuntheunavoidable enable noconfirm Unit 2 Data Unit Bootstrap Configuration interface ethernet1/8 no shutdown description CCL cluster group cluster1 local-unit asa2 cluster-interface ethernet1/8 ip 192.168....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
454
ipv6 address 2001:DB8:1::5/64 mac-address 000C.F142.4CDE interface port-channel 1.20 vlan 20 nameif outside ip address 209.165.201.1 255.255.255.224 ipv6 address 2001:DB8:2::8/64 mac-address 000C.F142.5CDE Traffic Segregation You may prefer physical separation of traffic between the inside and outside network. As shown...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
455
Unit 1 Control Unit Bootstrap Configuration interface ethernet 1/6 channel-group 1 mode on no shutdown interface ethernet 1/7 channel-group 1 mode on no shutdown interface port-channel 1 description CCL cluster group cluster1 local-unit asa1 cluster-interface port-channel1 ip 192.168.1.1 255.255.255.0 priority 1 key ch...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
456
enable as-data-node Control Unit Interface Configuration ip local pool mgmt 10.1.1.2-10.1.1.9 ipv6 local pool mgmtipv6 2001:DB8::1002/64 8 interface management 1/1 nameif management ip address 10.1.1.1 255.255.255.0 cluster-pool mgmt ipv6 address 2001:DB8::1001/32 cluster-pool mgmtipv6 security-level 100 management-onl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
457
30 permit any aaaa.1111.1234 0000.0000.0000 40 permit any aaaa.2222.1234 0000.0000.0000 vlan access-map Local 10 match mac address HSRP_VMAC action drop vlan access-map Local 20 match mac address ALL_MACs action forward vlan filter Local vlan-list 3151-3152 //To block global MAC with ARP inspection: arp access-list HSR...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
458
OTV Filter Modifications Required Because of Site Failure If a site goes down, the filters need to be removed from OTV because you do not want to block the global MAC address anymore. There are some additional configurations required. You need to add a static entry for the ASA global MAC address on the OTV switch in th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
459
OTV ARP Cache Monitoring OTV maintains an ARP cache to proxy ARP for IP addresses that it learned across the OTV interface. cluster-N7k6-OTV# show otv arp-nd-cache OTV ARP/ND L3->L2 Address Mapping Cache Overlay Interface Overlay1 VLAN MAC Address Layer-3 Address Age Expires In 3151 0050.5660.9412 10.0.0.2 1w0d 00:00:3...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
460
Spanned EtherChannel Transparent Mode North-South Inter-Site Example The following example shows 2 cluster members at each of 2 data centers placed between inside and outside routers (North-South insertion). The cluster members are connected by the cluster control link over the DCI. The cluster members at each site con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
461
across the DCI if the DCI can handle the extra traffic. In this case, traffic is distributed across the data centers, so it is essential for the DCI to be very robust. • Local VSS, vPC, StackWise, or StackWise Virtual at each site—For better switch redundancy, you can install 2 separate redundant switch pairs at each s...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
462
Virtualization (OTV) (or something similar). You must add filters to prevent traffic from traversing the DCI to the other site when the traffic is destined for the gateway router. If the gateway router at one site becomes unreachable, you must remove the filters so traffic can be sent to the other site’s gateway router...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
463
• IPsec passthrough • MGCP • MMP • RTSP • SCCP (Skinny) • WAAS • WCCP • Botnet Traffic Filter • Auto Update Server • DHCP client, server, and proxy. DHCP relay is supported. • VPN load balancing • Failover • Integrated Routing and Bridging • FIPS mode Centralized Features for Clustering The following features are only ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
464
• SNMP • SQLNET • SUNRPC • TFTP • XDMCP • Static route monitoring • Authentication and Authorization for network access. Accounting is decentralized. • Filtering Services • Site-to-site VPN • IGMP multicast control plane protocol processing (data plane forwarding is distributed acrossthe cluster) • PIM multicast contro...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
465
Accounting is implemented as a distributed feature in a cluster. Accounting is done on a per-flow basis, so the cluster node owning a flow willsend accounting start and stop messagesto the AAA server when accounting is configured for a flow. Connection Settings and Clustering Connection limits are enforced cluster-wide...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
466
amounts of traffic on the cluster control link. Note that the receiving node does not create a forwarding flow to the owner, because the NAT owner may not end up creating a connection for the packet depending on the results of security and policy checks. If you still want to use NAT in clustering, then consider the fol...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
467
uses multi-session. You can configure per-session NAT rules to change these defaults for TCP and UDP, but you cannot configure per-session PAT for ICMP. For traffic that benefits from multi-session PAT, such as H.323, SIP, or Skinny, you can disable per-session PAT for the associated TCP ports (the UDP portsfor those H...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
468
Figure 51: Dynamic Routing in Spanned EtherChannel Mode After the data node learn the routesfrom the control node, each node makesforwarding decisionsindependently. The OSPF LSA database is not synchronized from the control node to data nodes. If there is a control node switchover, the neighboring router will detect a ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
469
You should always use the Local address, and not the Main cluster IPaddress forSNMPpolling. If theSNMP agent polls the Main cluster IP address, if a new control node is elected, the poll to the new control node will fail. When using SNMPv3 with clustering, if you add a new cluster node after the initial cluster formati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
470
For example, if your model can handle approximately 10 Gbps of traffic when running alone, then for a cluster of 8 units, the maximum combined throughput will be approximately 80% of 80 Gbps (8 units x 10 Gbps): 64 Gbps. Control Node Election Nodes of the cluster communicate over the cluster control link to elect a con...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
471
in this scenario. After the cluster control link is restored, then the control node that has the higher priority will keep the control node’s role. See Control Node Election, on page 411 for more information. Interface Monitoring Each node monitors the link status of all named hardware interfaces in use, and reports st...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
472
resolve the problem with the data interface, you have to manually enable clustering at the console port by entering cluster group name, and then enable. This behavior is configurable. • Failed node—If the node was removed from the cluster because of a node health check failure, then rejoining the cluster depends on the...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
473
• Owner—Usually, the node that initially receives the connection. The owner maintains the TCP state and processes packets. A connection has only one owner. If the original owner fails, then when new nodes receive packets from the connection, the director chooses a new owner from those nodes. • Backup owner—The node tha...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
474
required.) For short-lived flows such as DNS and ICMP, instead of querying, the forwarder immediately sends the packet to the director, which then sends them to the owner. A connection can have multiple forwarders; the most efficient throughput is achieved by a good load-balancing method where there are no forwarders a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
475
1. The SYN packet originates from the client and is delivered to one ASA (based on the load balancing method), which becomes the owner. The owner creates a flow, encodes owner information into a SYN cookie, and forwards the packet to the server. 2. The SYN-ACK packet originates from the server and is delivered to a dif...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
476
1. Figure 52: ICMP and UDP Data Flow The first UDP packet originates from the client and is delivered to one ASA (based on the load balancing method). 2. The node that received the first packet queries the director node that is chosen based on a hash of the source/destination IP address and ports. 3. The director finds...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
477
Because this command only rebalances based on connections per second, the total number of established connections on each node is not considered, and the total number of connections may not be equal. Once a connection is offloaded to a different node, it becomes an asymmetric connection. Do not configure connection reb...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
478
CHAPTER 11 ASA Cluster for the Firepower 4100/9300 Clustering lets you group multiple Firepower 4100/9300 chassis ASAs together as a single logical device. The Firepower 4100/9300 chassis series includes the Firepower 9300 and Firepower 4100 series. A cluster provides all the convenience of a single device (management,...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
479
When you deploy the cluster, the chassis supervisor pushes a minimal bootstrap configuration to each unit that includes the cluster name, cluster control link interface, and other cluster settings. Some parts of the bootstrap configuration may be user-configurable within the application if you want to customize your cl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
480
thus the remaining healthy unit fails. If you connect the cluster control link through a switch, then the cluster control link remains up for the healthy unit. Cluster control link traffic includes both control and data traffic. Control traffic includes: • Control node election. • Configuration replication. • Health mo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
481
Cluster Control Link Reliability To ensure cluster control link functionality, be sure the round-trip time (RTT) between units is less than 20 ms. This maximum latency enhances compatibility with cluster members installed at different geographical sites. To check your latency, perform a ping on the cluster control link...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
482
Configuration Replication All nodes in the cluster share a single configuration. You can only make configuration changes on the control node (with the exception of the bootstrap configuration), and changes are automatically synced to all other nodes in the cluster. Secure Firewall ASA Cluster Management One of the bene...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
483
Crypto Key Replication When you create a crypto key on the control node, the key is replicated to all data nodes. If you have an SSH session to the Main cluster IP address, you will be disconnected if the control node fails. The new control node uses the same key forSSH connections, so that you do not need to update th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
484
Inter-Site Clustering For inter-site installations, you can take advantage of ASA clustering as long as you follow the recommended guidelines. You can configure each cluster chassis to belong to a separate site ID. Site IDs work with site-specific MAC addresses and IP addresses. Packets egressing the cluster use a site...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
485
• Must include the same interface configuration for interfaces you assign to the cluster, such as the same Management interface, EtherChannels, active interfaces, speed and duplex, and so on. You can use different network module types on the chassis as long as the capacity matches for the same interface IDs and interfa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
486
• For 2 members at 2 sites: • 2 cluster members total • 1 member at each site • 10 Gbps cluster control link per member Reserved DCI bandwidth = 10 Gbps (1/2 x 10 Gbps = 5 Gbps; but the minimum bandwidth should not be less than the size of the cluster control link (10 Gbps)). Licenses for Clustering on the Firepower 41...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
487
• Strong Encryption (3DES) (for pre-2.3.0 Cisco Smart Software Manager On-Prem deployment, or for tracking purposes)—This license is a per-unit entitlement, and each unit requests its own license from the server. If a new control unit is elected, the new control unit continues to use the aggregated license. It also use...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
488
• If you change the load-balancing algorithm of the EtherChannel on the switch, the EtherChannel interface on the switch temporarily stops forwarding traffic, and the Spanning Tree Protocol restarts. There will be a delay before traffic starts flowing again. • Switches on the cluster control link path should not verify...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
489
• Device-local EtherChannels—For cluster unit Device-local EtherChannels including any EtherChannels configured for the cluster control link, be sure to configure discrete EtherChannels on the switch; do not combine multiple cluster unit EtherChannels into one EtherChannel on the switch. CLI Book 1: Cisco Secure Firewa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
490
Inter-Site Clustering See the following guidelines for inter-site clustering: • The cluster control link latency must be less than 20 ms round-trip time (RTT). • The cluster control link must be reliable, with no out-of-order or dropped packets; for example, you should use a dedicated link. • Do not configure connectio...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
491
at the same site if the original owner fails (Note: if the traffic is asymmetric across sites, and there is continuous traffic from the remote site after the original owner fails, then a node from the remote site might become the new owner if it receives a data packet within the re-hosting window.). • For director loca...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
492
messages are sent back to the cluster. These messages can result in some units of the cluster experiencing high CPU, which can affect performance. We recommend that you throttle ICMP error messages. • We recommend connecting EtherChannels to a VSS, vPC, StackWise, or StackWise Virtual for redundancy. • Within a chassis...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
493
Create an ASA Cluster Set the scope to the image version. You can easily deploy the cluster from the Firepower 4100/9300 chassis supervisor. All initial configuration is automatically generated for each unit. For clustering on multiple chassis, you must configure each chassis separately. Deploy the cluster on one chass...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
494
• Gateway IP address Procedure Step 1 Configure interfaces. a) Add at least one Data type interface or EtherChannel (also known as a port-channel) before you deploy the cluster. See Add an EtherChannel (Port Channel), on page 173 or Configure a Physical Interface, on page 171. For clustering on multiple chassis, all da...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
495
-------------- asa 9.9.1 cisco Native Application No asa 9.10.1 cisco Native Application Yes ftd 6.2.3 cisco Native Application Yes ftd 6.3.0 cisco Native,Container Application Yes b) Set the scope to the image version. scope app asa application_version Example: Firepower /ssa # scope app asa 9.10.1 Firepower /ssa/app ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
496
Firepower /ssa/logical-device* # Step 5 Configure the cluster bootstrap parameters. These settings are meant for initial deployment only, or for disaster recovery. For normal operation, you can later change most values in the application CLI configuration. a) Create the cluster bootstrap object. enter cluster-bootstrap...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
497
f) Set the cluster group name in the security module configuration. set service-type cluster_name The name must be an ASCII string from 1 to 38 characters. Example: Firepower /ssa/logical-device/cluster-bootstrap* # set service-type cluster1 Firepower /ssa/logical-device/cluster-bootstrap* # g) (Optional) Set the clust...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
498
Example: Firepower /ssa/logical-device/cluster-bootstrap* # set ipv4 gateway 10.1.1.254 Firepower /ssa/logical-device/cluster-bootstrap* # set ipv4 pool 10.1.1.11 10.1.1.27 Firepower /ssa/logical-device/cluster-bootstrap* # set ipv6 gateway 2001:DB8::AA Firepower /ssa/logical-device/cluster-bootstrap* # set ipv6 pool 2...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
499
Firepower /ssa/logical-device/mgmt-bootstrap/bootstrap-key-secret* # set value Enter a value: floppylampshade Confirm the value: floppylampshade Firepower /ssa/logical-device/mgmt-bootstrap/bootstrap-key-secret* # exit Firepower /ssa/logical-device/mgmt-bootstrap* # c) Specify the firewall mode, routed or transparent. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
500
Native In Cluster Control Node ftd cluster1 3 Disabled Not Available 7.3.0.49 Native Not Applicable None Step 8 To add another chassis to the cluster, repeat this procedure except you must configure a unique chassis-id and the correct site-id; otherwise, use the same configuration for both chassis. Make sure the interf...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
501
scope ssa enter logical-device ASA1 asa "1,2,3" clustered enter cluster-bootstrap set chassis-id 1 set ipv4 gateway 10.1.1.254 set ipv4 pool 10.1.1.11 10.1.1.27 set ipv6 gateway 2001:DB8::AA set ipv6 pool 2001:DB8::11 2001:DB8::27 set key Key: f@arscape set mode spanned-etherchannel set service-type cluster1 set virtua...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
502
exit exit exit commit-buffer scope ssa enter logical-device ASA1 asa "1,2,3" clustered enter cluster-bootstrap set chassis-id 2 set ipv4 gateway 10.1.1.254 set ipv4 pool 10.1.1.11 10.1.1.15 set ipv6 gateway 2001:DB8::AA set ipv6 pool 2001:DB8::11 2001:DB8::19 set key Key: f@rscape set mode spanned-etherchannel set serv...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
503
Step 2 To add another chassis to the cluster, repeat the procedure in Create an ASA Cluster, on page 434 except you must configure a unique chassis-id and the correct site-id; otherwise, use the same configuration for the new chassis. ASA: Change the Firewall Mode and Context Mode By default, the FXOS chassis deploys a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
504
• port-channel integer • ethernet slot/port Example: ciscoasa(config)# interface port-channel 1 Step 2 Enable the interface: no shutdown Step 3 (Optional) If you are creating VLAN subinterfaces on this interface, do so now. Example: ciscoasa(config)# interface port-channel 1.10 ciscoasa(config-if)# vlan 10 The rest of ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
505
ciscoasa(config-if)# ip address 10.1.1.1 255.255.255.0 ciscoasa(config-if)# ipv6 address 2001:DB8::1001/32 DHCP, PPPoE, and IPv6 autoconfig are not supported. For point-to-point connections, you can specify a 31-bit subnet mask (255.255.255.254). In this case, no IP addresses are reserved for the network or broadcast a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
506
Example: ciscoasa(config-if)# mac-address aaaa.1111.1234 ciscoasa(config-if)# mac-address aaaa.1111.aaaa site-id 1 site-ip 10.9.9.1 ciscoasa(config-if)# mac-address aaaa.1111.bbbb site-id 2 site-ip 10.9.9.2 ciscoasa(config-if)# mac-address aaaa.1111.cccc site-id 3 site-ip 10.9.9.3 ciscoasa(config-if)# mac-address aaaa....
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
507
Version : 9.5(2) Serial No.: FCH19057ML0 CCL IP : 127.2.1.3 CCL MAC : 0015.c500.018f Last join : 20:29:57 UTC Nov 4 2015 Last leave: 20:24:55 UTC Nov 4 2015 Unit "unit-1-1" in state DATA_NODE ID : 1 Version : 9.5(2) Serial No.: FCH19057ML0 CCL IP : 127.2.1.1 CCL MAC : 0015.c500.017f Last join : 20:20:53 UTC Nov 4 2015 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
508
• informational—Informational events (severity=3) • debug—Debugging events (severity=4) Step 6 (Optional) (Firepower 9300 only) Ensure that the security modules in a chassis join the cluster simultaneously, so that traffic is evenly distributed between the modules. If a module joins very much in advance of other module...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
509
Procedure Step 1 Enter cluster configuration mode: cluster group name Step 2 Customize the cluster unit health check feature: health-check [holdtime timeout] The holdime determines the amount of time between unit heartbeat status messages, between .3 and 45 seconds; The default is 3 seconds. To determine unit health, t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
510
health-check {data-interface | cluster-interface | system} auto-rejoin [unlimited | auto_rejoin_max] auto_rejoin_interval auto_rejoin_interval_variation • system—Specifies the auto-rejoin settings for internal errors. Internal failures include: application sync timeout; inconsistent application statuses; and so on. • u...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
511
Example: ciscoasa(cfg-cluster)# app-agent heartbeat interval 300 Step 7 (Optional) Configure traffic load monitoring. load-monitor [frequency seconds] [intervals intervals] • frequency seconds—Setsthe time in seconds between monitoring messages, between 10 and 360 seconds. The default is 20 seconds. • intervals interva...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
512
Step 2 (Optional) Enable connection rebalancing for TCP traffic: conn-rebalance [frequency seconds] Example: ciscoasa(cfg-cluster)# conn-rebalance frequency 60 This command is disabled by default. If enabled, ASAs exchange information about the connections per second periodically, and offload new connections from devic...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
513
Procedure Step 1 Enter cluster configuration mode: cluster group name Example: ciscoasa(config)# cluster group cluster1 ciscoasa(cfg-cluster)# Step 2 Enable director localization: director-localization Enable Site Redundancy To protect flows from a site failure, you can enable site redundancy. If the connection backup ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
514
your switches for the global MAC address. After a timeout, traffic destined for the global MAC address will be flooded across the entire switching infrastructure, which can cause performance and security concerns. GARPis enabled by default when you set the site ID for each unit and the site MAC address for eachSpanned ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
515
example, when a server moves to a new site and a client sends traffic to the server, the router redirects traffic to the new location. LISP requires routers and servers in certain roles, such as the LISP egress tunnel router (ETR), ingress tunnel router (ITR), first hop routers, map resolver (MR), and map server (MS). ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
516
5. Cluster-level configuration to enable flow mobility—You must also enable flow mobility at the cluster level. This on/off toggle lets you easily enable or disable flow mobility for a particular class of traffic or applications. Configure LISP Inspection You can inspect LISP traffic to enable flow mobility when a serv...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
517
access list inspect_acl_name extended permit udp source_address mask destination_address mask eq 4342 You must specify UDP port 4342. Both IPv4 and IPv6 ACLs are accepted. See the command reference for exact access-list extended syntax. b) Create a class map for the ACL: class-map inspect_class_name match access-list i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
518
c) Specify the same policy map on which you enabled LISP inspection, the flow class map, and enable flow mobility: policy-map policy_map_name class flow_map_name cluster flow-mobility lisp Example: ciscoasa(config)# access-list IMPORTANT-FLOWS extended permit tcp any 10.10.10.0 255.255.255.0 eq https ciscoasa(config)# ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
519
policy-map INSIDE_POLICY class IMPORTANT-FLOWS-MAP cluster flow-mobility lisp ! cluster group cluster1 flow-mobility lisp Configure Distributed Site-to-Site VPN By default, the ASA cluster uses Centralized Site-to-Site VPN mode. To take advantage of the scalability of clustering, you can enable DistributedSite-to-Site ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
520
• In an S2S VPN hub and spoke configuration, when clients connect through the ASA cluster (called hair-pinning), the session traffic flowing in and the session traffic flowing out may be on different cluster members. • You can require that the backup session to be allocated on a security module in another chassis; this...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
521
• CTIQBE • DCERPC • H323, H225, and RAS • IPsec pass-through • MGCP • MMP • NetBIOS • PPTP • RADIUS • RSH • RTSP • SCCP (Skinny) • SUNRPC • TFTP • WAAS • WCCP • XDMCP IPsec IKEv2 Modifications IKEv2 is modified while in Distributed S2S VPN mode in the following ways: • An identity is used in place of IP/port tuples. Th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
522
Firewall Mode Distributed S2S VPN is supported in routed mode only. Context Mode DistributedS2S VPN operatesin both single and multiple context modes. However, in multiple context mode, active session redistribution is done at the system level, not at the context level. This prevents an active session associated with a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf