index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
523 | • Your S2S VPN configuration must be set.
Procedure
Step 1 On the control unit of the cluster, enter cluster configuration mode.
cluster group name
Example:
ciscoasa(config)# cluster group cluster1
ciscoasa(cfg-cluster)#
Step 2 Enable Distributed S2S VPN.
vpn-mode distributed backup flat
or
vpn-mode distributed backup ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
524 | Before you begin
• Enable system logs if you would like to monitor redistribution activity.
• This procedure must be carried out on the control unit of the cluster.
Procedure
Step 1 Execute the show cluster vpn-sessiondb distribution command on the control unit in the cluster to view
how active and backup sessions are ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
525 | Syslog Phrase Notes
Cluster topology change detected. VPN session redistribution
aborted.
Step 3 Use the output of show cluster vpn distribution to see the results of the redistribution activity.
FXOS: Remove a Cluster Node
The following sections describe how to remove nodes temporarily or permanently from the cluster.... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
526 | • Shut down the security module/engine—At the FXOS CLI, see the following example:
Firepower-chassis# scope service-profile server 1/1
Firepower-chassis /org/service-profile # power down soft-shut-down
Firepower-chassis /org/service-profile* # commit-buffer
Firepower-chassis /org/service-profile #
To power up:
Firepowe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
527 | Before you begin
• You must use the console port; you cannot enable or disable clustering from a remote CLI connection.
• For multiple context mode, perform this procedure in the system execution space. If you are not already
in the System configuration mode, enter the changeto system command.
Procedure
Step 1 Enter cl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
528 | The bootstrap configuration remains intact, as well as the last configuration synched from the control node,
so that you can later re-add the node without losing your configuration. If you enter this command on a data
node to remove the control node, a new control node is elected.
To view member names, enter cluster re... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
529 | Change the Control Unit
The best method to change the control node is to disable clustering on the control node, wait for a new control
election, and then re-enable clustering. If you must specify the exact node you want to become the control
node, use the procedure in this section. Note, however, that for centralized ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
530 | To view member names, enter cluster exec unit ? (to see all names except the current unit), or enter the show
cluster info command.
Examples
To copy the same capture file from all units in the cluster at the same time to a TFTP server, enter
the following command on the control unit:
ciscoasa# cluster exec copy /pcap c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
531 | With no keywords, the show cluster info command shows the status of all members of the cluster.
The show cluster info health command shows the current health of interfaces, units, and the cluster
overall.
See the following output for the show cluster info command:
asa(config)# show cluster info
Cluster cluster1: On
Int... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
532 | ciscoasa(cfg-cluster)# show cluster info auto-join
Unit will try to join cluster when quit reason is cleared.
Quit reason: Chassis-blade health check failed.
ciscoasa(cfg-cluster)# show cluster info auto-join
Unit will try to join cluster when quit reason is cleared.
Quit reason: Service chain application became down.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
533 | RE 0 0 0 0
RDC 699789 934969 740874 756490
RA 385525 281198 204021 205384
RFR 27626 56397 0 0
RTR 34051 107199 111411 110821
RDP 0 0 0 0
RDPR 0 0 0 0
This unit as a receiver of broadcast messages
---------------------------------------------
0 2 3
U 111847 121862 120029
R 7503 665700 749288
ESN 5d75b4b3 6d81d23 365ddd5... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
534 | Legend:
F - MRT messages sending when buffer is full
L - MRT messages sending when cluster node leave
R - MRT messages sending in Rx thread
----------------------------------------------------------------------------
Client name Total messages Percentage F L R
VPN Clustering HA Client 1 100% 0 0 0
MRT Tx of unitcast me... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
535 | Capturing Packets Cluster-Wide
See the following command for capturing packets in a cluster:
cluster exec capture
To support cluster-wide troubleshooting, you can enable capture of cluster-specific traffic on the control node
using the cluster exec capture command, which is then automatically enabled on all of the data... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
536 | X - inspected by service module,
x - per session, Y - director stub flow, y - backup stub flow,
Z - Scansafe redirection, z - forwarding stub flow
Cluster units to ID mappings:
ID 0: unit-2-1
ID 1: unit-1-1
ID 2: unit-1-2
ID 3: unit-2-2
ID 4: unit-2-3
ID 255: The default cluster member ID which indicates no ownership o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
537 | 0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Unit ID 1
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Buffer drops captured over 30 intervals:
Unit ID 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Unit ID 1
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Memory usage(%) captured over 30 ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
538 | 30 25 35 25 30 30
25 25 35 25 30 35
30 30 35 30 30 30
25 20 30 25 25 30
20 30 35 30 30 35
CPU usage(%) captured over 30 intervals:
Unit ID 0
25 25 30 30 30 35
25 25 35 30 30 30
25 25 30 25 25 35
30 30 30 25 25 25
25 20 30 30 30 30
Unit ID 1
30 25 35 25 30 30
25 25 35 25 30 35
30 30 35 30 30 30
25 20 30 25 25 30
20 30 3... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
539 | (hitcnt=2, 0, 0, 1, 1) 0xc1ce5c49
access-list 101 line 8 extended permit tcp host 192.168.1.177 host 192.168.43.192
(hitcnt=3, 0, 1, 1, 1) 0xb6f59512
access-list 101 line 9 extended permit tcp host 192.168.1.177 host 192.168.43.44
(hitcnt=0, 0, 0, 0, 0) 0xdc104200
access-list 101 line 10 extended permit tcp host 192.16... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
540 | 33.44.33.105 2
33.44.33.201 2
11.22.11.1 4
11.22.11.2 4
L2:*******************************************************************
LISP EID Site ID
33.44.33.105 2
33.44.33.201 2
11.22.11.1 4
11.22.11.2 4
• show asp table classify domain inspect-lisp
This command is useful for troubleshooting.
Monitoring Distributed S2S VPN... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
541 | The show cluster info trace command shows the debug information for further troubleshooting.
See the following output for the show cluster info trace command:
ciscoasa# show cluster info trace
Feb 02 14:19:47.456 [DBUG]Receive CCP message: CCP_MSG_LOAD_BALANCE
Feb 02 14:19:47.456 [DBUG]Receive CCP message: CCP_MSG_LOAD... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
542 | Situation Notification
If the cluster is unable to create a backup session: Failed to create the backup for an IKEv2 session.
IKEv2 Negotiation aborted due to ERROR: Stale backup
session found on backup
IKEv2 Initial Contact (IC) processing error:
Failed to send session redistribution message to
member-name
Failed to r... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
543 | Firewall on a Stick
Data traffic from different security domains are associated with different VLANs, for example, VLAN 10 for
the inside network and VLAN 20 for the outside network. Each ASA has a single physical port connected to
the external switch or router. Trunking is enabled so that all packets on the physical l... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
544 | Traffic Segregation
You may prefer physical separation of traffic between the inside and outside network.
As shown in the diagram above, there is one Spanned EtherChannel on the left side that connects to the inside
switch, and the other on the right side to outside switch. You can also create VLAN subinterfaces on eac... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
545 | mac access-list ALL_MACs
10 permit any any
mac access-list HSRP_VMAC
10 permit aaaa.1111.1234 0000.0000.0000 any
20 permit aaaa.2222.1234 0000.0000.0000 any
30 permit any aaaa.1111.1234 0000.0000.0000
40 permit any aaaa.2222.1234 0000.0000.0000
vlan access-map Local 10
match mac address HSRP_VMAC
action drop
vlan acces... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
546 | //OTV flood not required for ARP inspection:
otv flood mac 0050.56A8.3D22 vlan 3151
OTV Filter Modifications Required Because of Site Failure
If a site goes down, the filters need to be removed from OTV because you do not want to block the global
MAC address anymore. There are some additional configurations required.
Y... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
547 | * 202 885a.92f6.4b8f dynamic 5 F F Eth8/3
O 3151 0050.5660.9412 dynamic - F F Overlay1
* 3151 aaaa.1111.1234 dynamic 50 F F Eth8/3
OTV ARP Cache Monitoring
OTV maintains an ARP cache to proxy ARP for IP addresses that it learned across the OTV interface.
cluster-N7k6-OTV# show otv arp-nd-cache
OTV ARP/ND L3->L2 Address... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
548 | Spanned EtherChannel Transparent Mode North-South Inter-Site Example
The following example shows 2 cluster members at each of 2 data centers placed between inside and outside
routers (North-South insertion). The cluster members are connected by the cluster control link over the DCI.
The cluster members at each site con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
549 | across the DCI if the DCI can handle the extra traffic. In this case, traffic is distributed across the data
centers, so it is essential for the DCI to be very robust.
• Local VSS, vPC, StackWise, or StackWise Virtual at each site—For better switch redundancy, you can
install 2 separate redundant switch pairs at each s... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
550 | Virtualization (OTV) (or something similar). You must add filters to prevent traffic from traversing the DCI
to the other site when the traffic is destined for the gateway router. If the gateway router at one site becomes
unreachable, you must remove the filters so traffic can be sent to the other site’s gateway router... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
551 | • H323, H225, and RAS
• IPsec passthrough
• MGCP
• MMP
• RTSP
• SCCP (Skinny)
• WAAS
• WCCP
• Botnet Traffic Filter
• Auto Update Server
• DHCP client, server, and proxy. DHCP relay is supported.
• VPN load balancing
• Failover
• Integrated Routing and Bridging
• Dead Connection Detection (DCD)
• FIPS mode
Centralized ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
552 | • RADIUS
• RSH
• SNMP
• SQLNET
• SUNRPC
• TFTP
• XDMCP
• Static route monitoring
• Authentication and Authorization for network access. Accounting is decentralized.
• Filtering Services
• Site-to-site VPN
In centralized mode, VPN connections are established with the control node of the cluster only. This is
the default... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
553 | replication of the data structures to the cluster data nodes. If a control node is elected, the new control node
will have all the information it needs to continue uninterrupted operation of the established authenticated users
and their associated authorizations. Idle and absolute timeouts for user authentications are ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
554 | • PAT with Port Block Allocation—See the following guidelines for this feature:
• Maximum-per-host limit is not a cluster-wide limit, and is enforced on each node individually. Thus,
in a 3-node cluster with the maximum-per-host limit configured as 1, if the traffic from a host is
load-balanced across all 3 nodes, then... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
555 | • No static PAT for the following inspections—
• FTP
• PPTP
• RSH
• SQLNET
• TFTP
• XDMCP
• SIP
• If you have an extremely large number of NAT rules, over ten thousand, you should enable the
transactional commit model using the asprule-engine transactional-commitnat command in the device
CLI. Otherwise, the node might ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
556 | SCTP and Clustering
An SCTP association can be created on any node (due to load balancing); its multi-homing connections must
reside on the same node.
SIP Inspection and Clustering
A control flow can be created on any node (due to load balancing); its child data flows must reside on the
same node.
TLS Proxy configurati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
557 | VPN functionality islimited to the control unit and does not take advantage of the cluster high availability
capabilities. If the control unit fails, all existing VPN connections are lost, and VPN connected users see
a disruption in service. When a new control unit is elected, you must reestablish the VPN connections.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
558 | You can manually force a unit to become the control unit. For centralized features, if you force a control unit
change, then all connections are dropped, and you have to re-establish the connections on the new control
unit.
Note
High Availability Within the Cluster
Clustering provides high availability by monitoring ch... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
559 | For clustering on multiple chassis, if you add or delete an EtherChannel from the cluster, interface
health-monitoring is suspended for 95 seconds to ensure that you have time to make the changes on each
chassis.
Decorator Application Monitoring
When you install a decorator application on an interface, such as the Radw... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
560 | • Internal error—Internal failures include: application sync timeout; inconsistent application statuses; and
so on. A unit will attempt to rejoin the cluster automatically at the following intervals: 5 minutes, 10
minutes, and then 20 minutes. This behavior is configurable.
Data Path Connection State Replication
Every ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
561 | As long as the director (see below) is not the same node as the owner, then the director is also the backup
owner. If the owner chooses itself as the director, then a separate backup owner is chosen.
For clustering on the Firepower 9300, which can include up to 3 cluster nodes in one chassis, if the
backup owner is on ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
562 | We do not recommend disabling TCP sequence randomization when using
clustering. There is a small chance that some TCP sessions won't be established,
because the SYN/ACK packet might be dropped.
Note
• Fragment Owner—For fragmented packets, cluster nodes that receive a fragment determine a fragment
owner using a hash of... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
563 | 1. The SYN packet originates from the client and is delivered to one ASA (based on the load balancing
method), which becomes the owner. The owner creates a flow, encodes owner information into a SYN
cookie, and forwards the packet to the server.
2. The SYN-ACK packet originates from the server and is delivered to a dif... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
564 | 1. Figure 54: ICMP and UDP Data Flow
The first UDP packet originates from the client and is delivered to one ASA (based on the load balancing
method).
2. The node that received the first packet queries the director node that is chosen based on a hash of the
source/destination IP address and ports.
3. The director finds... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
565 | Because this command only rebalances based on connections per second, the total number of established
connections on each node is not considered, and the total number of connections may not be equal.
Once a connection is offloaded to a different node, it becomes an asymmetric connection.
Do not configure connection reb... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
566 | Feature Name Version Feature Information
You can now monitor the traffic load for cluster members, including total connection count,
CPU and memory usage, and buffer drops. If the load is too high, you can choose to manually
disable clustering on the unit if the remaining units can handle the load, or adjust the load
b... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
567 | Feature Name Version Feature Information
When an interface status update occurs, the ASA waits the number of milliseconds specified in
the health-check monitor-interface debounce-time command or the ASDM Configuration >
Device Management > High Availability andScalability > ASA Cluster screen before marking
the interfa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
568 | Feature Name Version Feature Information
An ASA cluster on theFirepower 9300 supportsSite-to-Site VPN in distributed mode. Distributed
mode provides the ability to have many Site-to-Site IPsec IKEv2 VPN connections distributed
across members of an ASA cluster, not just on the control unit (as in centralized mode). This... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
569 | Feature Name Version Feature Information
To improve performance and keep traffic within a site for inter-site clustering for data centers,
you can enable director localization. New connections are typically load-balanced and owned
by cluster members within a given site. However, the ASA assigns the director role to a m... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
570 | Feature Name Version Feature Information
This feature helps eliminate the “unnecessary work” related to short-lived flows by delaying the
director/backup flow creation.
We introduced the following command: cluster replication delay
Cluster replication delay 9.5(2)
for TCP connections
Cisco Locator/ID Separation Protoco... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
571 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
512
High Availability and Scalability
History for ASA Clustering on the Firepower 4100/9300 | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
572 | CHAPTER 12
ASA Cluster for the ASA Virtual for the Private
Cloud
Clustering lets you group multiple ASA virtual's together as a single logical device. A cluster provides all the
convenience of a single device (management, integration into a network) while achieving the increased
throughput and redundancy of multiple de... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
573 | • Isolated network for intra-cluster communication, known as the cluster control link, using VXLAN
interfaces. VXLANs, which act as Layer 2 virtual networks over Layer 3 physical networks, let the ASA
virtual send broadcast/multicast messages over the cluster control link.
• Management access to each firewall for confi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
574 | Individual interfaces are normal routed interfaces, each with their own Local IP address. Because interface
configuration must be configured only on the control node, the interface configuration lets you set a pool of
IP addresses to be used for a given interface on the cluster nodes, including one for the control node... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
575 | http://www.cisco.com/en/US/products/ps6599/products_white_paper09186a00800a4409.shtml
Equal-Cost Multi-Path Routing
When using Individual interfaces, each ASA interface maintains its own IP address and MAC address. One
method of load balancing is Equal-Cost Multi-Path (ECMP) routing.
We recommend this method if you are... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
576 | • Control node election.
• Configuration replication.
• Health monitoring.
Data traffic includes:
• State replication.
• Connection ownership queries and data packet forwarding.
Cluster Control Link Failure
If the cluster control link line protocol goes down for a unit, then clustering is disabled; data interfaces are
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
577 | If you use static addressing, you can use a Main cluster IP address that is a fixed address for the cluster that
always belongs to the current control node. For each interface, you also configure a range of addresses so that
each node, including the current control node, can use a Local address from the range. The Main... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
578 | inter-site clustering for data centers, and site redundancy for connections where a backup owner of a traffic
flow is always at a different site from the owner.
See the following sections for more information about inter-site clustering:
• Sizing the Data Center Interconnect—Requirements and Prerequisites for ASA Virtu... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
579 | • New cluster members must use the same SSL encryption setting (the ssl encryption command) as the
control node for initial cluster control link communication before configuration replication.
Guidelines for ASA Virtual Clustering
Failover
Failover is not supported with clustering.
IPv6
The cluster control link is only... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
580 | Configure the ASA Virtual Clustering Using a Day0 Configuration
Control Node Day0 Configuration
The following Day0 configuration for the control node includes the bootstrap configuration followed by
interface configuration that will be replicated to the data nodes. Bold textshowsthe values you need to change
for the da... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
581 | no shutdown
!
! Alternate Management Using Static IP
! ip local pool mgmt_pool 10.1.1.1 10.10.10.4
! interface management 0/0
! nameif management
! ip address 10.1.1.25 255.255.255.0 cluster-pool mgmt_pool
! no shutdown
!
! Cluster Config
cluster group cluster1
local-unit A
cluster-interface vni1 ip 10.2.2.1 255.255.25... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
582 | !
! Cluster control link physical interface (VXLAN tunnel endpoint (VTEP) src interface)
interface gigabitethernet 0/7
description CCL VTEP src ifc
nve-only cluster
nameif ccl
security-level 0
ip address 10.6.6.52 255.255.255.0
no shutdown
!
! VXLAN Network Identifier (VNI) interface
interface vni1
segment-id 1
vtep-nv... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
583 | Configure ASA Virtual Clustering after Deployment
To configure clustering after you deploy your ASA virtuals, perform the following tasks.
Configure Interface Settings
Configure the cluster interface mode on each node as well as interfaces on the control node. The interface
configuration will be replicated to data node... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
584 | There is no default setting; you must explicitly choose the mode. If you have not set the mode, you cannot
enable clustering.
The force option changes the mode without checking your configuration for incompatible settings. You need
to manually fix any configuration issues after you change the mode. Because any interfac... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
585 | The pool needs as many addresses as there are members of the cluster, including
the control node; the original .1 addressisthe main cluster IPaddressthat belongs
to the current control node.
Note
5. After you join the cluster, the old, temporary addresses are relinquished and can be used
elsewhere.
Procedure
Step 1 Con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
586 | Step 4 Set the Main cluster IP address and identify the cluster pool:
(IPv4)
ip address ip_address [mask] cluster-pool poolname
(IPv6)
ipv6 address ipv6-address/prefix-length cluster-pool poolname
Example:
ciscoasa(config-if)# ip address 192.168.1.1 255.255.255.0 cluster-pool ins
ciscoasa(config-if)# ipv6 address 2001:... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
587 | ip local pool ins 192.168.1.2-192.168.1.9
ipv6 local pool insipv6 2001:DB8:45:1003/64 8
interface gigabitethernet 0/1
nameif inside
ip address 192.168.1.1 255.255.255.0 cluster-pool ins
ipv6 address 2001:DB8:45:1003::99/64 cluster-pool insipv6
security-level 100
no shutdown
Create the Bootstrap Configuration
Each node ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
588 | The underlying IP network between VTEPs is independent of the cluster control link network that the
VNI interfaces use. Each VTEPsource interface has an IPaddress on the same subnet. This subnet should
be isolated from all other traffic, and should include only the cluster control link interfaces.
Example:
The followin... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
589 | ciscoasa(cfg-nve)# source-interface ccl
ciscoasa(cfg-nve)# peer-group cluster-peers
d) Specify the maximum transmission unit for the VTEPsource interface to be at least 154 bytes higher than
the highest MTU of the data interfaces.
mtu interface_name bytes
Because the cluster control link traffic includes data packet fo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
590 | Example:
ciscoasa(config)# cluster group pod1
The name must be an ASCII string from 1 to 38 characters. You can only configure one cluster group per
node. All members of the cluster must use the same name.
Step 3 Name this member of the cluster:
local-unit node_name
Use a unique ASCII string from 1 to 38 characters. Ea... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
591 | Example:
ciscoasa(cfg-cluster)# enable
INFO: Clustering is not compatible with following commands:
policy-map global_policy
class inspection_default
inspect skinny
policy-map global_policy
class inspection_default
inspect sip
Would you like to remove these commands? [Y]es/[N]o:Y
INFO: Removing incompatible commands fro... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
592 | ip local pool ins 192.168.1.2-192.168.1.9
ipv6 local pool insipv6 2001:DB8:45:1003/64 8
interface gigabitethernet 0/1
nameif inside
ip address 192.168.1.1 255.255.255.0 cluster-pool ins
ipv6 address 2001:DB8:45:1003::99/64 cluster-pool insipv6
security-level 100
no shutdown
object-group network cluster-peers
network-ob... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
593 | • Enable jumbo frame reservation for use with the cluster control link, so you can set the cluster control
link MTU to the recommended value. See the jumbo-frame reservation command. Enabling jumbo
frames causes the ASA to reload, so you must perform this step before continuing with this procedure.
Procedure
Step 1 Con... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
594 | INFO: Non-cluster interface config is cleared on VNI1
Specify an IPv4 address for the IP address; IPv6 is not supported for this interface. This interface cannot have
a nameif configured.
Step 5 If you use inter-site clustering, set the site ID for this node so it uses a site-specific MAC address:
site-id number
Exampl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
595 | network-object host 10.6.6.54
interface gigabitethernet 0/7
nve-only cluster
nameif ccl
ip address 10.6.6.52 255.255.255.0
no shutdown
nve 1
source-interface ccl
peer-group cluster-peers
mtu ccl 1654
interface vni 1
segment-id 1000
vtep-nve 1
cluster group pod1
local-unit node2
cluster-interface vni1 ip 192.168.1.2 255... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
596 | • critical—Critical events (severity=1)
• warning—Warnings (severity=2)
• informational—Informational events (severity=3)
• debug—Debugging events (severity=4)
Configure Health Monitoring and Auto-Rejoin Settings
This procedure configures node and interface health monitoring.
You might want to disable health monitoring... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
597 | The interface health check monitors for link failures. The amount of time before the ASA removes a member
from the cluster depends on whether the node is an established member or is joining the cluster. Health check
is enabled by default for all interfaces. You can disable it per interface using the no form of this com... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
598 | Set the debounce time between 300 and 9000 ms. The default is 500 ms. Lower values allow for faster detection
of interface failures. Note that configuring a lower debounce time increases the chances of false-positives.
When an interface status update occurs, the ASA waits the number of milliseconds specified before mar... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
599 | Configure Connection Rebalancing and the Cluster TCP Replication Delay
You can configure connection rebalancing. If the load balancing capabilities of the upstream or downstream
routers result in unbalanced flow distribution, you can configure overloaded nodes to redirect new TCP flows
to other nodes. No existing flows... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
600 | Configure Inter-Site Features
For inter-site clustering, you can customize your configuration to enhance redundancy and stability.
Enable Director Localization
To improve performance and reduce round-trip time latency for inter-site clustering for data centers, you can
enable director localization. New connections are ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
601 | Procedure
Step 1 Enter cluster configuration mode.
cluster group name
Example:
ciscoasa(config)# cluster group cluster1
ciscoasa(cfg-cluster)#
Step 2 Enable site redundancy.
site-redundancy
Configure Cluster Flow Mobility
You can inspect LISP traffic to enable flow mobility when a server moves between sites.
About LISP... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
602 | • Only fully-distributed flows are supported; centralized flows, semi-distributed flows, or flows belonging
to individual nodes are not moved to new owners. Semi-distributed flows include applications, such as
SIP, where all child flows are owned by the same ASA that owns the parent flow.
• The cluster only moves Layer... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
603 | access list eid_acl_name extended permit ip source_address mask destination_address mask
Both IPv4 and IPv6 ACLs are accepted.See the command reference for exact access-list extendedsyntax.
b) Create the LISP inspection map, and enter parameters mode:
policy-map type inspect lisp inspect_map_name
parameters
c) Define t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
604 | interfaces; all traffic that enters or exits the interface to which you apply the policy map is affected if the
traffic matches the class map for both directions.
Example:
ciscoasa(config)# access-list LISP_ACL extended permit udp host 192.168.50.89 host
192.168.10.8 eq 4342
ciscoasa(config)# class-map LISP_CLASS
cisco... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
605 | This on/off toggle lets you easily enable or disable flow mobility.
Examples
The following example:
• Limits EIDs to those on the 10.10.10.0/24 network
• Inspects LISP traffic (UDP 4342) between a LISP router at 192.168.50.89 (on inside) and an
ITR or ETR router (on another ASA interface) at 192.168.10.8
• Enables flow... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
606 | When an ASA becomes inactive (either manually or through a health check failure), all data interfaces are
shut down; only the management-only interface can send and receive traffic. To resume traffic flow, re-enable
clustering; or you can remove the node altogether from the cluster. The management interface remains up
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
607 | The bootstrap configuration remains intact, as well as the last configuration synched from the control node,
so that you can later re-add the node without losing your configuration. If you enter this command on a data
node to remove the control node, a new control node is elected.
To view member names, enter cluster re... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
608 | cluster group cluster_name
no enable
Example:
ciscoasa(config)# cluster group cluster1
ciscoasa(cfg-cluster)# no enable
You cannot make configuration changes while clustering is enabled on a data node.
Step 2 Clear the cluster configuration:
clear configure cluster
The ASA shuts down all interfaces including the manage... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
609 | Procedure
Set a new node as the control node:
cluster control-node unitnode_name
Example:
ciscoasa(config)# cluster control-node unit asa2
You will need to reconnect to the Main cluster IP address.
To view member names, enter cluster control-nodeunit ? (to see all names except the current node), or enter
the show clust... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
610 | Monitoring the ASA Virtual Cluster
You can monitor and troubleshoot cluster status and connections.
Monitoring Cluster Status
See the following commands for monitoring cluster status:
• show cluster info [health [details]]
With no keywords, the show cluster info command shows the status of all members of the cluster.
T... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
611 | Shows whether the cluster node will automatically rejoin the cluster after a time delay and if the failure
conditions (such as waiting for the license, chassis health check failure, and so on) are cleared. If the
node is permanently disabled, or if the node is already in the cluster, then this command will not show
any... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
612 | RDP - reliable message dropped
RDPR - reliable message drops reported
RI - reliable message with old sequence number
RO - reliable message with out of order sequence number
ROW - reliable message with out of window sequence number
ROB - out of order reliable messages buffered
RAS - reliable ack packets sent
This unit a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
613 | MRT Tx of broadcast messages
=============================
Message high watermark: 3%
Total messages buffered at high watermark: 5677
[Per-client message usage at high watermark]
---------------------------------------------------------------
Client name Total messages Percentage
Cluster Redirect Client 4153 73%
Route ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
614 | VPN Clustering HA Client 572 99%
Cluster VPN Unique ID Client 1 0%
Current MRT buffer usage: 0%
Total messages buffered in real-time: 0
• show cluster history
Shows the cluster history, as well as error messages about why a cluster node failed to join or why a
node left the cluster.
Capturing Packets Cluster-Wide
See t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
615 | i - incomplete, J - GTP, j - GTP data, K - GTP t3-response
k - Skinny media, L - LISP triggered flow owner mobility,
M - SMTP data, m - SIP media, n - GUP
O - outbound data, o - offloaded,
P - inside back connection,
Q - Diameter, q - SQL*Net data,
R - outside acknowledged FIN,
R - UDP SUNRPC, r - inside acknowledged F... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
616 | The show cluster info conn-distribution and show cluster info packet-distribution commands show
traffic distribution across all cluster nodes. These commands can help you to evaluate and adjust the
external load balancer.
The show cluster info loadbalance command shows connection rebalance statistics.
The show cluster ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
617 | Unit ID 1
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Buffer drops captured over 30 intervals:
Unit ID 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Unit ID 1
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Memory usage(%) captured over 30 intervals:
Unit ID 0
25 25 30 30 30 ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
618 | 25 20 30 25 25 30
20 30 35 30 30 35
CPU usage(%) captured over 30 intervals:
Unit ID 0
25 25 30 30 30 35
25 25 35 30 30 30
25 25 30 25 25 35
30 30 30 25 25 25
25 20 30 30 30 30
Unit ID 1
30 25 35 25 30 30
25 25 35 25 30 35
30 30 35 30 30 30
25 20 30 25 25 30
20 30 35 30 30 35
• show cluster {access-list | conn | traffi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
619 | 0xce4f281d
access-list 101 line 11 extended permit tcp host 192.168.1.170 host 192.168.43.238
(hitcnt=3, 1, 0, 0, 2) 0x4143a818
access-list 101 line 12 extended permit tcp host 192.168.1.170 host 192.168.43.169
(hitcnt=2, 0, 1, 0, 1) 0xb18dfea4
access-list 101 line 13 extended permit tcp host 192.168.1.170 host 192.168... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
620 | • show asp table classify domain inspect-lisp
This command is useful for troubleshooting.
Configuring Logging for Clustering
See the following command for configuring logging for clustering:
logging device-id
Each node in the cluster generatessyslog messagesindependently. You can use the loggingdevice-idcommand
to gene... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
621 | May 23 07:27:23.113 [CRIT]Received datapath event 'multi control_nodes' with parameter
1.
May 23 07:27:23.113 [CRIT]Found both unit-9-1 and unit-9-1 as control_node units.
Control_node role retained by unit-9-1, unit-9-1 will leave then join as a Data_node
May 23 07:27:23.113 [DBUG]Send event (DISABLE, RESTART | INTERN... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
622 | Reference for Clustering
This section includes more information about how clustering operates.
ASA Features and Clustering
Some ASA features are not supported with ASA clustering, and some are only supported on the control node.
Other features might have caveats for proper usage.
Unsupported Features with Clustering
Th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.