index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
623
Traffic for centralized features is forwarded from member nodes to the control node over the cluster control link. If you use the rebalancing feature, traffic for centralized features may be rebalanced to non-control nodes before the traffic is classified as a centralized feature; if this occurs, the traffic is then se...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
624
• Threat detection—Threat detection works on each node independently; for example, the top statistics is node-specific. Port scanning detection, for example, does not work because scanning traffic will be load-balanced between all nodes, and one node will not see all traffic. • Resource management—Resource management i...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
625
Figure 55: Dynamic Routing in Individual Interface Mode In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through an ASA. ECMP is used to load balance traffic between the 4 paths. Each ASA picks a different router ID when talking to external routers. You must configure a cluster ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
626
• If you use AAA for FTP access, then the control channel flow is centralized on the control node. ICMP Inspection and Clustering The flow of ICMP and ICMP error packets through the cluster varies depending on whether ICMP/ICMP error inspection is enabled. Without ICMP inspection, ICMP is a one-direction flow, and ther...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
627
we recommend that you delete all block allocation rules and clear all xlates related to those rules. You can then change the block size and recreate the block allocation rules. • NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides each IP address in the pool into port blocks...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
628
• If you have an extremely large number of NAT rules, over ten thousand, you should enable the transactional commit model using the asprule-engine transactional-commitnat command in the device CLI. Otherwise, the node might not be able to join the cluster. SCTP and Clustering An SCTP association can be created on any n...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
629
VPN and Clustering Site-to-site VPN is a centralized feature; only the control node supports VPN connections. Note Remote access VPN is not supported with clustering. VPN functionality is limited to the control node and does not take advantage of the cluster high availability capabilities. If the control node fails, al...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
630
You can manually force a node to become the control node. For centralized features, if you force a control node change, then all connections are dropped, and you have to re-establish the connections on the new control node. Note High Availability Within the ASA Virtual Cluster The ASA virtual Clustering provides high a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
631
When the ASA becomesinactive and failsto automatically rejoin the cluster, all data interfaces are shut down; only the management-only interface can send and receive traffic. The management interface remains up using the IP address the node received from the cluster IP pool. However if you reload, and the node is still...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
632
Traffic State Support Notes IPv6 Neighbor database Yes — Dynamic routing Yes — SNMP Engine ID No — Backup session becomes the active session, then a new backup session is created. Distributed VPN (Site-to-Site) for Yes Firepower 4100/9300 How the ASA Virtual Cluster Manages Connections Connections can be load-balanced ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
633
If you enable director localization for inter-site clustering, then there are two director roles: the local director and the global director. The owner always chooses a local director at the same site asitself (based on site ID). The global director can be at any site, and might even be the same node as the local direc...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
634
You can change the per-sessionPAT defaults for TCPand UDPso connections for these protocols are handled per-session or multi-session depending on the configuration. For ICMP, you cannot change from the default multi-session PAT. For more information about per-session PAT, see the firewall configuration guide. New Conne...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
635
7. If packets are delivered to any additional nodes, it will query the director for the owner and establish a flow. 8. Any state change for the flow results in a state update from the owner to the director. Sample Data Flow for ICMP and UDP The following example shows the establishment of a new connection. 1. Figure 56...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
636
9. The owner forwards the packet to the client. Rebalancing New TCP Connections Across the Cluster If the load balancing capabilities of the upstream or downstream routers result in unbalanced flow distribution, you can configure new connection rebalancing so nodes with higher new connections per second will redirect n...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
637
CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19 578 High Availability and Scalability History for ASA Virtual Clustering
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
638
CHAPTER 13 ASA Clusterforthe ASA Virtual in a Public Cloud Clustering lets you group multiple ASA virtuals together as a single logical device. A cluster provides all the convenience of a single device (management, integration into a network) while achieving the increased throughput and redundancy of multiple devices. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
639
• Isolated network for intra-cluster communication, known as the cluster control link, using VXLAN interfaces. VXLANs, which act as Layer 2 virtual networks over Layer 3 physical networks, let the ASA virtual send broadcast/multicast messages over the cluster control link. • Load Balancer(s)—For external load balancing...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
640
Some features do not scale in a cluster, and the control node handles all traffic for those features. Individual Interfaces You can configure cluster interfaces as Individual interfaces. Individual interfaces are normal routed interfaces, each with their own local IPaddress. Interface configuration must be configured o...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
641
• Health monitoring. Data traffic includes: • State replication. • Connection ownership queries and data packet forwarding. Cluster Control Link Failure If the cluster control link line protocol goes down for a unit, then clustering is disabled; data interfaces are shut down. After you fix the cluster control link, you...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
642
IP address moves to the new control node, so management of the cluster continues seamlessly. The Local IP address is used for routing, and is also useful for troubleshooting. For example, you can manage the cluster by connecting to the Main cluster IPaddress, which is always attached to the current control node. To man...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
643
If you deregister the ASA virtual so that it is unlicensed, then it will revert to a severely rate-limited state if you reload the ASA virtual. An unlicensed, low performing cluster node will impact the performance of the entire cluster negatively. Be sure to keep all cluster nodes licensed, or remove any unlicensed no...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
644
Table 21: Suggested MTU Public Cloud Cluster Control Link MTU Data Interface MTU AWS with GWLB 1960 1806 AWS 1654 1500 Guidelines for ASA Virtual Clustering High Availability High Availability is not supported with clustering. IPv6 The cluster control link is only supported using IPv4. Additional Guidelines • When sign...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
645
Defaults for Clustering • The cLACP system ID is auto-generated, and the system priority is 1 by default. • The cluster health check feature is enabled by default with the holdtime of 3 seconds. Interface health monitoring is enabled on all interfaces by default. • The cluster auto-rejoin feature for a failed cluster c...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
646
Sample Topology The topology given below depicts both inbound and outbound traffic flow. There are two ASA Virtual instances in the cluster that is connected to a GWLB. Inbound traffic from the internet goes to the GWLB endpoint which then transmits the traffic to the GWLB. Traffic is then forwarded to the ASA Virtual ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
647
Workspace Steps Local Host Download templates and files from GitHub. Modify infrastructure.yaml and deploying_asav_clustering.yaml templates. Local Host Linux Host Create cluster_layer.zip file. Local Host Copy cluster_layer.zip file to the Lambda python files folder. Create configure_asav_cluster.zip and lifecycle_asa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
648
Workspace Steps Create target group and GWLB; attach target group to the GWLB. AWS Console AWS Console Register instances with the target group using data interface IP. Templates The templates given below are available in GitHub. The parameter values are self-explanatory with the parameter names, default values, allowe...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
649
pip3 install cffi==1.15.1 pip3 install zipp==3.1.0 pip3 install importlib-metadata==1.6.0 echo "Copy from ./layer directory to ./python\n" mkdir -p ./python/ cp -r ./layer/lib/python3.9/site-packages/* ./python/ zip -r cluster_layer.zip ./python deactivate d) Copy the resulting cluster_layer.zip file to the lambda pyth...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
650
Step 3 Upload cluster_layer.zip, cluster_lifecycle.zip, and cluster_manager.zip to the S3 bucket created by infrastructure.yaml. Step 4 Deploy deploy_asav_clustering.yaml. a) Go to CloudFormation and click on Create stack; select With new resources(standard). b) Select Uploada template file, click Choose file, and sele...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
651
Unit "204" in state DATA_NODE ID : 1 Version : 9.19.1 Serial No.: 9AJ9N46947R CCL IP : 1.1.1.204 CCL MAC : 4201.0a0a.0fcb Module : ASAv Resource : 4 cores / 8192 MB RAM Last join : 16:57:42 UTC Jul 17 2022 Last leave: 16:03:25 UTC Jul 17 2022 Deploy the Cluster in AWS Manually To deploy the cluster manually, prepare th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
652
proxy single-arm nameif ge security-level 0 vtep-nve 2 object network ccl_link range 10.1.90.4 10.1.90.254 //Mandatory user input, use same range on all nodes object-group network cluster_group network-object object ccl_link nve 2 encapsulation geneve source-interface geneve-vtep-ifc nve 1 encapsulation vxlan source-in...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
653
interface vni1 description Clustering Interface segment-id 1 vtep-nve 1 jumbo-frame reservation mtu ccl_link 1654 object network ccl_link range 10.1.90.4 10.1.90.254 //mandatory user input object-group network cluster_group network-object object ccl_link nve 1 encapsulation vxlan source-interface ccl_link peer-group cl...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
654
b) Attach the target group to the GWLB. Ensure that you configure the GWLB to use the correctsecurity group, listener configuration, and health check settings. Note c) Register the data interface (inside interface) with the Target Group using IP addresses. For more information, see Create a Gateway Load Balancer. Custo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
655
Configure Health Monitoring and Auto-Rejoin Settings This procedure configures node and interface health monitoring. You might want to disable health monitoring of non-essential interfaces, for example, the management interface. Health monitoring is not performed on VLAN subinterfaces. You cannot configure monitoring f...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
656
disable interface monitoring for the disabled interfaces. When the topology change is complete, and the configuration change is synced to all nodes, you can re-enable the health check feature. Example: ciscoasa(cfg-cluster)# no health-check monitor-interface management1/1 Step 4 Customize the auto-rejoin cluster settin...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
657
• intervals intervals—Sets the number of intervals for which the ASA maintains data, between 1 and 60. The default is 30. You can monitor the traffic load for cluster members, including total connection count, CPU and memory usage, and buffer drops. If the load is too high, you can choose to manually disable clustering...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
658
When an ASA becomes inactive (either manually or through a health check failure), all data interfaces are shut down; only the management-only interface can send and receive traffic. To resume traffic flow, re-enable clustering; or you can remove the node altogether from the cluster. The management interface remains up ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
659
The bootstrap configuration remains intact, as well as the last configuration synched from the control node, so that you can later re-add the node without losing your configuration. If you enter this command on a data node to remove the control node, a new control node is elected. To view member names, enter cluster re...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
660
cluster group cluster_name no enable Example: ciscoasa(config)# cluster group cluster1 ciscoasa(cfg-cluster)# no enable You cannot make configuration changes while clustering is enabled on a data node. Step 2 Clear the cluster configuration: clear configure cluster The ASA shuts down all interfaces including the manage...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
661
Procedure Set a new node as the control node: cluster control-node unitnode_name Example: ciscoasa(config)# cluster control-node unit asa2 You will need to reconnect to the Main cluster IP address. To view member names, enter cluster control-nodeunit ? (to see all names except the current node), or enter the show clust...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
662
Monitoring the Cluster You can monitor and troubleshoot cluster status and connections. Monitoring Cluster Status See the following commands for monitoring cluster status: • show cluster info [health [details]] With no keywords, the show cluster info command shows the status of all members of the cluster. The show clus...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
663
Shows whether the cluster node will automatically rejoin the cluster after a time delay and if the failure conditions (such as waiting for the license, chassis health check failure, and so on) are cleared. If the node is permanently disabled, or if the node is already in the cluster, then this command will not show any...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
664
RDP - reliable message dropped RDPR - reliable message drops reported RI - reliable message with old sequence number RO - reliable message with out of order sequence number ROW - reliable message with out of window sequence number ROB - out of order reliable messages buffered RAS - reliable ack packets sent This unit a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
665
MRT Tx of broadcast messages ============================= Message high watermark: 3% Total messages buffered at high watermark: 5677 [Per-client message usage at high watermark] --------------------------------------------------------------- Client name Total messages Percentage Cluster Redirect Client 4153 73% Route ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
666
VPN Clustering HA Client 572 99% Cluster VPN Unique ID Client 1 0% Current MRT buffer usage: 0% Total messages buffered in real-time: 0 • show cluster history Shows the cluster history, as well as error messages about why a cluster node failed to join or why a node left the cluster. Capturing Packets Cluster-Wide See t...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
667
i - incomplete, J - GTP, j - GTP data, K - GTP t3-response k - Skinny media, L - LISP triggered flow owner mobility, M - SMTP data, m - SIP media, n - GUP O - outbound data, o - offloaded, P - inside back connection, Q - Diameter, q - SQL*Net data, R - outside acknowledged FIN, R - UDP SUNRPC, r - inside acknowledged F...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
668
The show cluster info conn-distribution and show cluster info packet-distribution commands show traffic distribution across all cluster nodes. These commands can help you to evaluate and adjust the external load balancer. The show cluster info loadbalance command shows connection rebalance statistics. The show cluster ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
669
Unit ID 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Buffer drops captured over 30 intervals: Unit ID 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Unit ID 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Memory usage(%) captured over 30 intervals: Unit ID 0 25 25 30 30 30 ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
670
25 20 30 25 25 30 20 30 35 30 30 35 CPU usage(%) captured over 30 intervals: Unit ID 0 25 25 30 30 30 35 25 25 35 30 30 30 25 25 30 25 25 35 30 30 30 25 25 25 25 20 30 30 30 30 Unit ID 1 30 25 35 25 30 30 25 25 35 25 30 35 30 30 35 30 30 30 25 20 30 25 25 30 20 30 35 30 30 35 • show cluster {access-list | conn | traffi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
671
0xce4f281d access-list 101 line 11 extended permit tcp host 192.168.1.170 host 192.168.43.238 (hitcnt=3, 1, 0, 0, 2) 0x4143a818 access-list 101 line 12 extended permit tcp host 192.168.1.170 host 192.168.43.169 (hitcnt=2, 0, 1, 0, 1) 0xb18dfea4 access-list 101 line 13 extended permit tcp host 192.168.1.170 host 192.168...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
672
• show asp table classify domain inspect-lisp This command is useful for troubleshooting. Configuring Logging for Clustering See the following command for configuring logging for clustering: logging device-id Each node in the cluster generatessyslog messagesindependently. You can use the loggingdevice-idcommand to gene...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
673
May 23 07:27:23.113 [CRIT]Received datapath event 'multi control_nodes' with parameter 1. May 23 07:27:23.113 [CRIT]Found both unit-9-1 and unit-9-1 as control_node units. Control_node role retained by unit-9-1, unit-9-1 will leave then join as a Data_node May 23 07:27:23.113 [DBUG]Send event (DISABLE, RESTART | INTERN...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
674
• Failover • Integrated Routing and Bridging • FIPS mode Centralized Features for Clustering The following features are only supported on the control node, and are not scaled for the cluster. Traffic for centralized features is forwarded from member nodes to the control node over the cluster control link. If you use th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
675
Features Applied to Individual Nodes These features are applied to each ASA node, instead of the cluster as a whole or to the control node. • QoS—The QoS policy is synced across the cluster as part of configuration replication. However, the policy is enforced on each node independently. For example, if you configure po...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
676
Figure 60: Dynamic Routing in Individual Interface Mode In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through an ASA. ECMP is used to load balance traffic between the 4 paths. Each ASA picks a different router ID when talking to external routers. You must configure a cluster ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
677
• If you use AAA for FTP access, then the control channel flow is centralized on the control node. ICMP Inspection and Clustering The flow of ICMP and ICMP error packets through the cluster varies depending on whether ICMP/ICMP error inspection is enabled. Without ICMP inspection, ICMP is a one-direction flow, and ther...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
678
• NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides each IP address in the pool into port blocks. By default, each block is 512 ports, but if you configure port block allocation rules, your block setting is used instead. These blocks are distributed evenly among the nodes ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
679
SCTP and Clustering An SCTP association can be created on any node (due to load balancing); its multi-homing connections must reside on the same node. SIP Inspection and Clustering A control flow can be created on any node (due to load balancing); its child data flows must reside on the same node. TLS Proxy configurati...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
680
Note Remote access VPN is not supported with clustering. VPN functionality is limited to the control node and does not take advantage of the cluster high availability capabilities. If the control node fails, all existing VPN connections are lost, and VPN users willsee a disruption in service. When a new control node is...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
681
High Availability within the Cluster Clustering provides high availability by monitoring node and interface health and by replicating connection states between nodes. Node Health Monitoring Each node periodically sends a broadcast heartbeat packet over the cluster control link. If the control node does not receive any ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
682
• Failed cluster control link when initially joining—After you resolve the problem with the cluster control link, you must manually rejoin the cluster by re-enabling clustering at the CLI by entering cluster group name, and then enable. • Failed cluster control link after joining the cluster—The ASA automatically tries...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
683
How the Cluster Manages Connections Connections can be load-balanced to multiple nodes of the cluster. Connection roles determine how connections are handled in both normal operation and in a high availability situation. Connection Roles See the following roles defined for each connection: • Owner—Usually, the node tha...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
684
• Forwarder—A node that forwards packets to the owner. If a forwarder receives a packet for a connection it does not own, it queries the director for the owner, and then establishes a flow to the owner for any other packets it receives for this connection. The director can also be a forwarder. If you enable director lo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
685
of a flow to arrive at the same node, and for flows to be distributed evenly between nodes. If a reverse flow arrives at a different node, it is redirected back to the original node. Sample Data Flow for TCP The following example shows the establishment of a new connection. 1. The SYN packet originates from the client ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
686
1. Figure 61: ICMP and UDP Data Flow The first UDP packet originates from the client and is delivered to one ASA (based on the load balancing method). 2. The node that received the first packet queries the director node that is chosen based on a hash of the source/destination IP address and ports. 3. The director finds...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
687
History for ASA Virtual Clustering in the Public Cloud Feature Version Details The ASA virtual supports Individual interface clustering for up to 16 nodes on AWS. You can use clustering with or without the AWS Gateway Load Balancer. ASA virtual Amazon Web Services 9.19(1) (AWS) clustering CLI Book 1: Cisco Secure Firew...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
688
P ART III Interfaces • Basic Interface Configuration, on page 631 • Basic Interface Configuration for Firepower 1010 Switch Ports, on page 647 • EtherChannel Interfaces, on page 665 • Loopback Interfaces, on page 677 • VLAN Subinterfaces, on page 683 • VXLAN Interfaces, on page 689 • Routed and Transparent Mode Interfa...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
689
null
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
690
CHAPTER 14 Basic Interface Configuration This chapter includes basic interface configuration including Ethernetsettings and Jumbo frame configuration. For multiple context mode, complete all tasks in this section in the system execution space. To change from the context to the system execution space, enter the changeto...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
691
Gigabit Ethernet, when the speed and duplex are set to 1000 and full, then the interface always auto-negotiates; therefore Auto-MDI/MDIX is always enabled and you cannot disable it. Management Interface The management interface, depending on your model, is a separate interface just for management traffic. Management In...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
692
Subinterfaces Allowed Configurable for Through Traffic Management 1/1 Management 1/0 Management 0/1 Management Model 0/0 ASAv Yes — — — Yes — Use Any Interface for Management-Only Traffic You can use any interface as a dedicated management-only interface by configuring it for management traffic, including an EtherChann...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
693
Deploying CiscoFirepower 2100 and 1100 threat defense devicesin HA with hundreds of interfaces configured on them can result in increased delay in the failover time (seconds). Additional Guidelines Some management-related services are not available until a non-management interface is enabled, and the the ASA achieves a...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
694
Default Connector Type Some modelsinclude two connector types: copper RJ-45 and fiberSFP. RJ-45 isthe default. You can configure the ASA to use the fiber SFP connectors. Default MAC Addresses By default, the physical interface usesthe burned-in MAC address, and allsubinterfaces of a physical interface use the same burn...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
695
speed {auto | speed | nonegotiate | sfp-detect} Example: ciscoasa(config-if)# speed 100 For Firepower 1100 and 2100 fiber interfaces, speed nonegotiate sets the speed to 1000 Mbps and disables link negotiation for flow-control parameters and remote fault information. For the Secure Firewall 3100, see the negotiate-auto...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
696
FixedPort Default FEC(Ethernet 1/9 Network Module Default FEC through 1/16) Transceiver Type 25G-AOCxM cl74-fc cl74-fc 25G-CU2.5/3M Auto-Negotiate Auto-Negotiate 25G-CU4/5M Auto-Negotiate Auto-Negotiate Step 6 (Optional) (Secure Firewall 3100) Enable pause (XOFF) frames for flow control on Gigabit and higher interfaces...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
697
Enable Jumbo Frame Support (ASA Virtual, ISA 3000) A jumbo frame is an Ethernet packet larger than the standard maximum of 1518 bytes (including Layer 2 header and VLAN header), up to 9216 bytes. You can enable support for jumbo frames for all interfaces by increasing the amount of memory to process Ethernet frames. As...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
698
Manage the Network Module for the Secure Firewall 3100 If you install a network module before you first power on the firewall, no action is required; the network module is enabled and ready for use. If you need to make changes to your network module installation after initial bootup, then see the following procedures. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
699
Example: ciscoasa(config)# no breakout 2 1 Add a Network Module To add a network module to a firewall after initial bootup, perform the following steps. Adding a new module requires a reload. For clustering or failover, zero downtime is not supported, so make sure to perform this procedure during a maintenance window. ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
700
• Clustering—Ensure the unit you want to perform the hot swap on is a data node (see Change the Control Node, on page 377); then disable clustering on the node. See Become an Inactive Node, on page 373 or Deactivate a Node, on page 374. If the cluster control link is on the network module, you must leave the cluster. S...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
701
For clustering or failover, perform this step on the control node/active unit; the module state is replicated to the other nodes. Do not save the configuration; when you reload, the module will be enabled using the saved configuration. Example: ciscoasa(config)# netmod 2 disable Step 2 Replace the network module accord...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
702
Step 3 Reload the firewall; see Reload the ASA, on page 43. For clustering or failover, reload all nodes. Because nodes with different network modules cannot join the cluster/failover pair, you need to reload all nodes without the module before they can reform the cluster/failover pair. Monitoring Interfaces See the fo...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
703
duplex full no shutdown Multiple Context Mode Example The following example configuresinterface parametersin multiple context mode for the system configuration, and allocates the gigabitethernet 0/1.1 subinterface to contextA: interface gigabitethernet 0/1 speed 1000 duplex full no shutdown interface gigabitethernet 0/...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
704
Feature Name Releases Feature Information The Secure Firewall 3100 supports speed detection for interfaces based on the SFP installed. Detect SFP is enabled by default. This option is useful if you later change the network module to a different model, and want the speed to update automatically. New/Modified commands: s...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
705
Feature Name Releases Feature Information The ASA 5510 now supports GE (Gigabit Ethernet) for port 0 and 1 with theSecurityPluslicense. If you upgrade the license from Base toSecurity Plus, the capacity of the external Ethernet0/0 and Ethernet0/1 ports increases from the original FE (Fast Ethernet) (100 Mbps) to GE (10...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
706
CHAPTER 15 Basic Interface Configuration for Firepower 1010 Switch Ports You can configure eachFirepower 1010 interface to run as a regular firewall interface or as a Layer 2 hardware switch port. This chapter includes tasks for starting your switch port configuration, including enabling or disabling the switch mode an...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
707
them to a single VLAN. Trunk ports accept untagged and tagged traffic, and can belong to more than one VLAN. By default, Ethernet 1/2 through 1/8 are configured as access switch ports on VLAN 1. You cannot configure the Management interface as a switch port. • Logical VLAN interface—These interfaces operate the same as...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
708
Logical VLAN Interfaces • You can create up to 60 VLAN interfaces. • If you also use VLAN subinterfaces on a firewall interface, you cannot use the same VLAN ID as for a logical VLAN interface. • MAC Addresses: • Routed firewall mode—All VLAN interfaces share a MAC address. Ensure that any connected switches can suppor...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
709
Configure Switch Ports and Power Over Ethernet To configure switch ports and PoE, complete the following tasks. Enable or Disable Switch Port Mode You can set each interface independently to be either a firewall interface or a switch port. By default, Ethernet 1/1 is a firewall interface, and the remaining Ethernet int...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
710
<cr> Example The following example sets Ethernet 1/3 and 1/4 to firewall mode: ciscoasa(config)# interface ethernet1/3 ciscoasa(config-if)# no switchport ciscoasa(config-if)# interface ethernet1/3 ciscoasa(config-if)# no switchport ciscoasa(config-if)# Configure a VLAN Interface This section describes how to configure ...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
711
Configure Switch Ports as Access Ports To assign a switch port to a single VLAN, configure it as an access port. Access ports accept only untagged traffic. By default, Ethernet1/2 through Ethernet 1/8 switch ports are enabled and assigned to VLAN 1. The Firepower 1010 does not support Spanning Tree Protocol for loop de...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
712
speed {auto | 10 | 100 | 1000} The default is auto. Example: ciscoasa(config-if)# speed 100 ciscoasa(config-if)# Step 5 (Optional) Set the duplex. duplex {auto | full | half} The default is auto. Example: ciscoasa(config-if)# duplex half ciscoasa(config-if)# Step 6 Enable the switch port. no shutdown To disable the swi...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
713
Configure Switch Ports as Trunk Ports This procedure describes how to create a trunk port that can carry multiple VLANs using 802.1Q tagging. Trunk ports accept untagged and tagged traffic. Traffic on allowed VLANs pass through the trunk port unchanged. When the trunk receives untagged traffic, it tags it to the native...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
714
Example: ciscoasa(config-if)# switchport trunk allowed vlan 100,200,300 ciscoasa(config-if)# Step 4 Set the native VLAN. switchport trunk native vlan vlan_id • vlan_range—Sets the VLAN ID between 1 and 4070. The default value is VLAN 1. Each port can only have one native VLAN, but every port can have either the same or...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
715
Step 8 Enable the switch port. no shutdown To disable the switch port, enter the shutdown command. Example: ciscoasa(config-if)# no shutdown ciscoasa(config-if)# Example The following example sets Ethernet 1/6 as a trunk port with VLANs 20 through 30, and sets the native VLAN as 4: ciscoasa(config)# interface ethernet1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
716
• auto—Delivers power automatically to the powered device using a wattage appropriate to the class of the powered device. The Firepower 1010 uses LLDP to further negotiate the correct wattage. • never—Disables PoE. • consumption wattage milliwatts—Manually specified the wattage in milliwatts, from 4000 to 30000. Use th...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
717
---- --------------------- --------- -------------------- 1 - down Ethernet1/3, Ethernet1/4, Ethernet1/5, Ethernet1/6 Ethernet1/7, Ethernet1/8 10 inside up Ethernet1/1 20 outside up Ethernet1/2 • show switch mac-address-table Shows the static and dynamic MAC address entries. ciscoasa# show switch mac-address-table Lege...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
718
Routed Mode Example The following example creates two VLAN interfaces, and assigns two switchports to the inside interface, and one to the outside interface. interface Vlan11 nameif inside security-level 100 ip address 10.11.11.1 255.255.255.0 no shutdown ! interface Vlan20 nameif outside security-level 0 ip address 10...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
719
interface Ethernet1/2 switchport switchport access vlan 20 no shutdown ! interface Ethernet1/3 switchport switchport access vlan 11 no shutdown Mixed Firewall Interface/Switch Port Example The following example creates one VLAN interface for the inside interface, and two firewall interfaces for the outside and dmz. int...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
720
interface BVI1 nameif inside_bvi security-level 100 ip address 10.30.1.10 255.255.255.0 ! interface BVI2 nameif outside_bvi security-level 0 ip address 10.40.1.10 255.255.255.0 ! interface Vlan10 bridge-group 1 nameif inside_1 security-level 100 no shutdown ! interface Vlan20 bridge-group 2 nameif outside security-leve...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
721
no shutdown ! interface Ethernet1/7 switchport switchport access vlan 30 no shutdown ! interface Ethernet1/8 switchport switchport access vlan 100 no shutdown Failover Example The following example configures Ethernet 1/3 as the failover interface. interface Vlan11 nameif inside security-level 100 ip address 10.11.11.1...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf
722
History for Switch Ports Table 26: History for Switch Ports Feature Name Version Feature Information The Firepower 1010 supports setting each Ethernet interface to be a switch port or a firewall interface. New/Modified commands: forwardinterface,interface vlan,show switch mac-address-table, show switch vlan, switchport...
https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf