index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
623 | Traffic for centralized features is forwarded from member nodes to the control node over the cluster control
link.
If you use the rebalancing feature, traffic for centralized features may be rebalanced to non-control nodes
before the traffic is classified as a centralized feature; if this occurs, the traffic is then se... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
624 | • Threat detection—Threat detection works on each node independently; for example, the top statistics is
node-specific. Port scanning detection, for example, does not work because scanning traffic will be
load-balanced between all nodes, and one node will not see all traffic.
• Resource management—Resource management i... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
625 | Figure 55: Dynamic Routing in Individual Interface Mode
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through an ASA.
ECMP is used to load balance traffic between the 4 paths. Each ASA picks a different router ID when talking
to external routers.
You must configure a cluster ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
626 | • If you use AAA for FTP access, then the control channel flow is centralized on the control node.
ICMP Inspection and Clustering
The flow of ICMP and ICMP error packets through the cluster varies depending on whether ICMP/ICMP
error inspection is enabled. Without ICMP inspection, ICMP is a one-direction flow, and ther... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
627 | we recommend that you delete all block allocation rules and clear all xlates related to those rules.
You can then change the block size and recreate the block allocation rules.
• NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides
each IP address in the pool into port blocks... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
628 | • If you have an extremely large number of NAT rules, over ten thousand, you should enable the
transactional commit model using the asprule-engine transactional-commitnat command in the device
CLI. Otherwise, the node might not be able to join the cluster.
SCTP and Clustering
An SCTP association can be created on any n... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
629 | VPN and Clustering
Site-to-site VPN is a centralized feature; only the control node supports VPN connections.
Note Remote access VPN is not supported with clustering.
VPN functionality is limited to the control node and does not take advantage of the cluster high availability
capabilities. If the control node fails, al... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
630 | You can manually force a node to become the control node. For centralized features, if you force a control
node change, then all connections are dropped, and you have to re-establish the connections on the new control
node.
Note
High Availability Within the ASA Virtual Cluster
The ASA virtual Clustering provides high a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
631 | When the ASA becomesinactive and failsto automatically rejoin the cluster, all data interfaces are shut down;
only the management-only interface can send and receive traffic. The management interface remains up using
the IP address the node received from the cluster IP pool. However if you reload, and the node is still... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
632 | Traffic State Support Notes
IPv6 Neighbor database Yes —
Dynamic routing Yes —
SNMP Engine ID No —
Backup session becomes the active session, then a
new backup session is created.
Distributed VPN (Site-to-Site) for Yes
Firepower 4100/9300
How the ASA Virtual Cluster Manages Connections
Connections can be load-balanced ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
633 | If you enable director localization for inter-site clustering, then there are two director roles: the local
director and the global director. The owner always chooses a local director at the same site asitself (based
on site ID). The global director can be at any site, and might even be the same node as the local direc... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
634 | You can change the per-sessionPAT defaults for TCPand UDPso connections for these protocols are handled
per-session or multi-session depending on the configuration. For ICMP, you cannot change from the default
multi-session PAT. For more information about per-session PAT, see the firewall configuration guide.
New Conne... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
635 | 7. If packets are delivered to any additional nodes, it will query the director for the owner and establish a
flow.
8. Any state change for the flow results in a state update from the owner to the director.
Sample Data Flow for ICMP and UDP
The following example shows the establishment of a new connection.
1. Figure 56... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
636 | 9. The owner forwards the packet to the client.
Rebalancing New TCP Connections Across the Cluster
If the load balancing capabilities of the upstream or downstream routers result in unbalanced flow distribution,
you can configure new connection rebalancing so nodes with higher new connections per second will redirect
n... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
637 | CLI Book 1: Cisco Secure Firewall ASA Series General Operations CLI Configuration Guide, 9.19
578
High Availability and Scalability
History for ASA Virtual Clustering | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
638 | CHAPTER 13
ASA Clusterforthe ASA Virtual in a Public Cloud
Clustering lets you group multiple ASA virtuals together as a single logical device. A cluster provides all the
convenience of a single device (management, integration into a network) while achieving the increased
throughput and redundancy of multiple devices. ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
639 | • Isolated network for intra-cluster communication, known as the cluster control link, using VXLAN
interfaces. VXLANs, which act as Layer 2 virtual networks over Layer 3 physical networks, let the ASA
virtual send broadcast/multicast messages over the cluster control link.
• Load Balancer(s)—For external load balancing... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
640 | Some features do not scale in a cluster, and the control node handles all traffic for those features.
Individual Interfaces
You can configure cluster interfaces as Individual interfaces.
Individual interfaces are normal routed interfaces, each with their own local IPaddress. Interface configuration
must be configured o... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
641 | • Health monitoring.
Data traffic includes:
• State replication.
• Connection ownership queries and data packet forwarding.
Cluster Control Link Failure
If the cluster control link line protocol goes down for a unit, then clustering is disabled; data interfaces are
shut down. After you fix the cluster control link, you... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
642 | IP address moves to the new control node, so management of the cluster continues seamlessly. The Local IP
address is used for routing, and is also useful for troubleshooting. For example, you can manage the cluster
by connecting to the Main cluster IPaddress, which is always attached to the current control node. To man... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
643 | If you deregister the ASA virtual so that it is unlicensed, then it will revert to a severely rate-limited state if
you reload the ASA virtual. An unlicensed, low performing cluster node will impact the performance of the
entire cluster negatively. Be sure to keep all cluster nodes licensed, or remove any unlicensed no... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
644 | Table 21: Suggested MTU
Public Cloud Cluster Control Link MTU Data Interface MTU
AWS with GWLB 1960 1806
AWS 1654 1500
Guidelines for ASA Virtual Clustering
High Availability
High Availability is not supported with clustering.
IPv6
The cluster control link is only supported using IPv4.
Additional Guidelines
• When sign... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
645 | Defaults for Clustering
• The cLACP system ID is auto-generated, and the system priority is 1 by default.
• The cluster health check feature is enabled by default with the holdtime of 3 seconds. Interface health
monitoring is enabled on all interfaces by default.
• The cluster auto-rejoin feature for a failed cluster c... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
646 | Sample Topology
The topology given below depicts both inbound and outbound traffic flow. There are two ASA Virtual instances
in the cluster that is connected to a GWLB.
Inbound traffic from the internet goes to the GWLB endpoint which then transmits the traffic to the GWLB.
Traffic is then forwarded to the ASA Virtual ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
647 | Workspace Steps
Local Host Download templates and files from GitHub.
Modify infrastructure.yaml and deploying_asav_clustering.yaml
templates.
Local Host
Linux Host Create cluster_layer.zip file.
Local Host Copy cluster_layer.zip file to the Lambda python files folder.
Create configure_asav_cluster.zip and lifecycle_asa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
648 | Workspace Steps
Create target group and GWLB; attach target group to the
GWLB.
AWS Console
AWS Console Register instances with the target group using data interface IP.
Templates
The templates given below are available in GitHub. The parameter values are self-explanatory with the
parameter names, default values, allowe... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
649 | pip3 install cffi==1.15.1
pip3 install zipp==3.1.0
pip3 install importlib-metadata==1.6.0
echo "Copy from ./layer directory to ./python\n"
mkdir -p ./python/
cp -r ./layer/lib/python3.9/site-packages/* ./python/
zip -r cluster_layer.zip ./python
deactivate
d) Copy the resulting cluster_layer.zip file to the lambda pyth... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
650 | Step 3 Upload cluster_layer.zip, cluster_lifecycle.zip, and cluster_manager.zip to the S3 bucket created by
infrastructure.yaml.
Step 4 Deploy deploy_asav_clustering.yaml.
a) Go to CloudFormation and click on Create stack; select With new resources(standard).
b) Select Uploada template file, click Choose file, and sele... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
651 | Unit "204" in state DATA_NODE
ID : 1
Version : 9.19.1
Serial No.: 9AJ9N46947R
CCL IP : 1.1.1.204
CCL MAC : 4201.0a0a.0fcb
Module : ASAv
Resource : 4 cores / 8192 MB RAM
Last join : 16:57:42 UTC Jul 17 2022
Last leave: 16:03:25 UTC Jul 17 2022
Deploy the Cluster in AWS Manually
To deploy the cluster manually, prepare th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
652 | proxy single-arm
nameif ge
security-level 0
vtep-nve 2
object network ccl_link
range 10.1.90.4 10.1.90.254 //Mandatory user input, use same range on all nodes
object-group network cluster_group
network-object object ccl_link
nve 2
encapsulation geneve
source-interface geneve-vtep-ifc
nve 1
encapsulation vxlan
source-in... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
653 | interface vni1
description Clustering Interface
segment-id 1
vtep-nve 1
jumbo-frame reservation
mtu ccl_link 1654
object network ccl_link
range 10.1.90.4 10.1.90.254 //mandatory user input
object-group network cluster_group
network-object object ccl_link
nve 1
encapsulation vxlan
source-interface ccl_link
peer-group cl... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
654 | b) Attach the target group to the GWLB.
Ensure that you configure the GWLB to use the correctsecurity group, listener configuration,
and health check settings.
Note
c) Register the data interface (inside interface) with the Target Group using IP addresses. For more
information, see Create a Gateway Load Balancer.
Custo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
655 | Configure Health Monitoring and Auto-Rejoin Settings
This procedure configures node and interface health monitoring.
You might want to disable health monitoring of non-essential interfaces, for example, the management
interface. Health monitoring is not performed on VLAN subinterfaces. You cannot configure monitoring f... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
656 | disable interface monitoring for the disabled interfaces. When the topology change is complete, and the
configuration change is synced to all nodes, you can re-enable the health check feature.
Example:
ciscoasa(cfg-cluster)# no health-check monitor-interface management1/1
Step 4 Customize the auto-rejoin cluster settin... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
657 | • intervals intervals—Sets the number of intervals for which the ASA maintains data, between 1 and 60.
The default is 30.
You can monitor the traffic load for cluster members, including total connection count, CPU and memory
usage, and buffer drops. If the load is too high, you can choose to manually disable clustering... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
658 | When an ASA becomes inactive (either manually or through a health check failure), all data interfaces are
shut down; only the management-only interface can send and receive traffic. To resume traffic flow, re-enable
clustering; or you can remove the node altogether from the cluster. The management interface remains up
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
659 | The bootstrap configuration remains intact, as well as the last configuration synched from the control node,
so that you can later re-add the node without losing your configuration. If you enter this command on a data
node to remove the control node, a new control node is elected.
To view member names, enter cluster re... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
660 | cluster group cluster_name
no enable
Example:
ciscoasa(config)# cluster group cluster1
ciscoasa(cfg-cluster)# no enable
You cannot make configuration changes while clustering is enabled on a data node.
Step 2 Clear the cluster configuration:
clear configure cluster
The ASA shuts down all interfaces including the manage... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
661 | Procedure
Set a new node as the control node:
cluster control-node unitnode_name
Example:
ciscoasa(config)# cluster control-node unit asa2
You will need to reconnect to the Main cluster IP address.
To view member names, enter cluster control-nodeunit ? (to see all names except the current node), or enter
the show clust... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
662 | Monitoring the Cluster
You can monitor and troubleshoot cluster status and connections.
Monitoring Cluster Status
See the following commands for monitoring cluster status:
• show cluster info [health [details]]
With no keywords, the show cluster info command shows the status of all members of the cluster.
The show clus... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
663 | Shows whether the cluster node will automatically rejoin the cluster after a time delay and if the failure
conditions (such as waiting for the license, chassis health check failure, and so on) are cleared. If the
node is permanently disabled, or if the node is already in the cluster, then this command will not show
any... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
664 | RDP - reliable message dropped
RDPR - reliable message drops reported
RI - reliable message with old sequence number
RO - reliable message with out of order sequence number
ROW - reliable message with out of window sequence number
ROB - out of order reliable messages buffered
RAS - reliable ack packets sent
This unit a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
665 | MRT Tx of broadcast messages
=============================
Message high watermark: 3%
Total messages buffered at high watermark: 5677
[Per-client message usage at high watermark]
---------------------------------------------------------------
Client name Total messages Percentage
Cluster Redirect Client 4153 73%
Route ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
666 | VPN Clustering HA Client 572 99%
Cluster VPN Unique ID Client 1 0%
Current MRT buffer usage: 0%
Total messages buffered in real-time: 0
• show cluster history
Shows the cluster history, as well as error messages about why a cluster node failed to join or why a
node left the cluster.
Capturing Packets Cluster-Wide
See t... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
667 | i - incomplete, J - GTP, j - GTP data, K - GTP t3-response
k - Skinny media, L - LISP triggered flow owner mobility,
M - SMTP data, m - SIP media, n - GUP
O - outbound data, o - offloaded,
P - inside back connection,
Q - Diameter, q - SQL*Net data,
R - outside acknowledged FIN,
R - UDP SUNRPC, r - inside acknowledged F... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
668 | The show cluster info conn-distribution and show cluster info packet-distribution commands show
traffic distribution across all cluster nodes. These commands can help you to evaluate and adjust the
external load balancer.
The show cluster info loadbalance command shows connection rebalance statistics.
The show cluster ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
669 | Unit ID 1
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Buffer drops captured over 30 intervals:
Unit ID 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Unit ID 1
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
Memory usage(%) captured over 30 intervals:
Unit ID 0
25 25 30 30 30 ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
670 | 25 20 30 25 25 30
20 30 35 30 30 35
CPU usage(%) captured over 30 intervals:
Unit ID 0
25 25 30 30 30 35
25 25 35 30 30 30
25 25 30 25 25 35
30 30 30 25 25 25
25 20 30 30 30 30
Unit ID 1
30 25 35 25 30 30
25 25 35 25 30 35
30 30 35 30 30 30
25 20 30 25 25 30
20 30 35 30 30 35
• show cluster {access-list | conn | traffi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
671 | 0xce4f281d
access-list 101 line 11 extended permit tcp host 192.168.1.170 host 192.168.43.238
(hitcnt=3, 1, 0, 0, 2) 0x4143a818
access-list 101 line 12 extended permit tcp host 192.168.1.170 host 192.168.43.169
(hitcnt=2, 0, 1, 0, 1) 0xb18dfea4
access-list 101 line 13 extended permit tcp host 192.168.1.170 host 192.168... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
672 | • show asp table classify domain inspect-lisp
This command is useful for troubleshooting.
Configuring Logging for Clustering
See the following command for configuring logging for clustering:
logging device-id
Each node in the cluster generatessyslog messagesindependently. You can use the loggingdevice-idcommand
to gene... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
673 | May 23 07:27:23.113 [CRIT]Received datapath event 'multi control_nodes' with parameter
1.
May 23 07:27:23.113 [CRIT]Found both unit-9-1 and unit-9-1 as control_node units.
Control_node role retained by unit-9-1, unit-9-1 will leave then join as a Data_node
May 23 07:27:23.113 [DBUG]Send event (DISABLE, RESTART | INTERN... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
674 | • Failover
• Integrated Routing and Bridging
• FIPS mode
Centralized Features for Clustering
The following features are only supported on the control node, and are not scaled for the cluster.
Traffic for centralized features is forwarded from member nodes to the control node over the cluster control
link.
If you use th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
675 | Features Applied to Individual Nodes
These features are applied to each ASA node, instead of the cluster as a whole or to the control node.
• QoS—The QoS policy is synced across the cluster as part of configuration replication. However, the
policy is enforced on each node independently. For example, if you configure po... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
676 | Figure 60: Dynamic Routing in Individual Interface Mode
In the above diagram, Router A learns that there are 4 equal-cost paths to Router B, each through an ASA.
ECMP is used to load balance traffic between the 4 paths. Each ASA picks a different router ID when talking
to external routers.
You must configure a cluster ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
677 | • If you use AAA for FTP access, then the control channel flow is centralized on the control node.
ICMP Inspection and Clustering
The flow of ICMP and ICMP error packets through the cluster varies depending on whether ICMP/ICMP
error inspection is enabled. Without ICMP inspection, ICMP is a one-direction flow, and ther... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
678 | • NAT pool address distribution for dynamic PAT—When you configure a PAT pool, the cluster divides
each IP address in the pool into port blocks. By default, each block is 512 ports, but if you configure port
block allocation rules, your block setting is used instead. These blocks are distributed evenly among the
nodes ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
679 | SCTP and Clustering
An SCTP association can be created on any node (due to load balancing); its multi-homing connections must
reside on the same node.
SIP Inspection and Clustering
A control flow can be created on any node (due to load balancing); its child data flows must reside on the
same node.
TLS Proxy configurati... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
680 | Note Remote access VPN is not supported with clustering.
VPN functionality is limited to the control node and does not take advantage of the cluster high availability
capabilities. If the control node fails, all existing VPN connections are lost, and VPN users willsee a disruption
in service. When a new control node is... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
681 | High Availability within the Cluster
Clustering provides high availability by monitoring node and interface health and by replicating connection
states between nodes.
Node Health Monitoring
Each node periodically sends a broadcast heartbeat packet over the cluster control link. If the control node
does not receive any ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
682 | • Failed cluster control link when initially joining—After you resolve the problem with the cluster control
link, you must manually rejoin the cluster by re-enabling clustering at the CLI by entering cluster group
name, and then enable.
• Failed cluster control link after joining the cluster—The ASA automatically tries... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
683 | How the Cluster Manages Connections
Connections can be load-balanced to multiple nodes of the cluster. Connection roles determine how connections
are handled in both normal operation and in a high availability situation.
Connection Roles
See the following roles defined for each connection:
• Owner—Usually, the node tha... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
684 | • Forwarder—A node that forwards packets to the owner. If a forwarder receives a packet for a connection
it does not own, it queries the director for the owner, and then establishes a flow to the owner for any
other packets it receives for this connection. The director can also be a forwarder. If you enable director
lo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
685 | of a flow to arrive at the same node, and for flows to be distributed evenly between nodes. If a reverse flow
arrives at a different node, it is redirected back to the original node.
Sample Data Flow for TCP
The following example shows the establishment of a new connection.
1. The SYN packet originates from the client ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
686 | 1. Figure 61: ICMP and UDP Data Flow
The first UDP packet originates from the client and is delivered to one ASA (based on the load balancing
method).
2. The node that received the first packet queries the director node that is chosen based on a hash of the
source/destination IP address and ports.
3. The director finds... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
687 | History for ASA Virtual Clustering in the Public Cloud
Feature Version Details
The ASA virtual supports Individual interface clustering for up to 16
nodes on AWS. You can use clustering with or without the AWS
Gateway Load Balancer.
ASA virtual Amazon Web Services 9.19(1)
(AWS) clustering
CLI Book 1: Cisco Secure Firew... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
688 | P ART III
Interfaces
• Basic Interface Configuration, on page 631
• Basic Interface Configuration for Firepower 1010 Switch Ports, on page 647
• EtherChannel Interfaces, on page 665
• Loopback Interfaces, on page 677
• VLAN Subinterfaces, on page 683
• VXLAN Interfaces, on page 689
• Routed and Transparent Mode Interfa... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
689 | null | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
690 | CHAPTER 14
Basic Interface Configuration
This chapter includes basic interface configuration including Ethernetsettings and Jumbo frame configuration.
For multiple context mode, complete all tasks in this section in the system execution space. To change from
the context to the system execution space, enter the changeto... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
691 | Gigabit Ethernet, when the speed and duplex are set to 1000 and full, then the interface always auto-negotiates;
therefore Auto-MDI/MDIX is always enabled and you cannot disable it.
Management Interface
The management interface, depending on your model, is a separate interface just for management traffic.
Management In... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
692 | Subinterfaces
Allowed
Configurable for
Through Traffic
Management
1/1
Management
1/0
Management
0/1
Management
Model 0/0
ASAv Yes — — — Yes —
Use Any Interface for Management-Only Traffic
You can use any interface as a dedicated management-only interface by configuring it for management traffic,
including an EtherChann... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
693 | Deploying CiscoFirepower 2100 and 1100 threat defense devicesin HA with hundreds of interfaces configured
on them can result in increased delay in the failover time (seconds).
Additional Guidelines
Some management-related services are not available until a non-management interface is enabled, and the
the ASA achieves a... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
694 | Default Connector Type
Some modelsinclude two connector types: copper RJ-45 and fiberSFP. RJ-45 isthe default. You can configure
the ASA to use the fiber SFP connectors.
Default MAC Addresses
By default, the physical interface usesthe burned-in MAC address, and allsubinterfaces of a physical interface
use the same burn... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
695 | speed {auto | speed | nonegotiate | sfp-detect}
Example:
ciscoasa(config-if)# speed 100
For Firepower 1100 and 2100 fiber interfaces, speed nonegotiate sets the speed to 1000 Mbps and disables
link negotiation for flow-control parameters and remote fault information. For the Secure Firewall 3100, see
the negotiate-auto... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
696 | FixedPort Default FEC(Ethernet 1/9 Network Module Default FEC
through 1/16)
Transceiver Type
25G-AOCxM cl74-fc cl74-fc
25G-CU2.5/3M Auto-Negotiate Auto-Negotiate
25G-CU4/5M Auto-Negotiate Auto-Negotiate
Step 6 (Optional) (Secure Firewall 3100) Enable pause (XOFF) frames for flow control on Gigabit and higher
interfaces... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
697 | Enable Jumbo Frame Support (ASA Virtual, ISA 3000)
A jumbo frame is an Ethernet packet larger than the standard maximum of 1518 bytes (including Layer 2
header and VLAN header), up to 9216 bytes. You can enable support for jumbo frames for all interfaces by
increasing the amount of memory to process Ethernet frames. As... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
698 | Manage the Network Module for the Secure Firewall 3100
If you install a network module before you first power on the firewall, no action is required; the network
module is enabled and ready for use.
If you need to make changes to your network module installation after initial bootup, then see the following
procedures.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
699 | Example:
ciscoasa(config)# no breakout 2 1
Add a Network Module
To add a network module to a firewall after initial bootup, perform the following steps. Adding a new module
requires a reload. For clustering or failover, zero downtime is not supported, so make sure to perform this
procedure during a maintenance window.
... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
700 | • Clustering—Ensure the unit you want to perform the hot swap on is a data node (see Change the Control
Node, on page 377); then disable clustering on the node. See Become an Inactive Node, on page 373 or
Deactivate a Node, on page 374.
If the cluster control link is on the network module, you must leave the cluster. S... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
701 | For clustering or failover, perform this step on the control node/active unit; the module state is replicated to
the other nodes. Do not save the configuration; when you reload, the module will be enabled using the saved
configuration.
Example:
ciscoasa(config)# netmod 2 disable
Step 2 Replace the network module accord... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
702 | Step 3 Reload the firewall; see Reload the ASA, on page 43.
For clustering or failover, reload all nodes. Because nodes with different network modules cannot join the
cluster/failover pair, you need to reload all nodes without the module before they can reform the cluster/failover
pair.
Monitoring Interfaces
See the fo... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
703 | duplex full
no shutdown
Multiple Context Mode Example
The following example configuresinterface parametersin multiple context mode for the system configuration,
and allocates the gigabitethernet 0/1.1 subinterface to contextA:
interface gigabitethernet 0/1
speed 1000
duplex full
no shutdown
interface gigabitethernet 0/... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
704 | Feature Name Releases Feature Information
The Secure Firewall 3100 supports speed detection for interfaces based
on the SFP installed. Detect SFP is enabled by default. This option is
useful if you later change the network module to a different model, and
want the speed to update automatically.
New/Modified commands: s... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
705 | Feature Name Releases Feature Information
The ASA 5510 now supports GE (Gigabit Ethernet) for port 0 and 1 with
theSecurityPluslicense. If you upgrade the license from Base toSecurity
Plus, the capacity of the external Ethernet0/0 and Ethernet0/1 ports
increases from the original FE (Fast Ethernet) (100 Mbps) to GE (10... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
706 | CHAPTER 15
Basic Interface Configuration for Firepower 1010
Switch Ports
You can configure eachFirepower 1010 interface to run as a regular firewall interface or as a Layer 2 hardware
switch port. This chapter includes tasks for starting your switch port configuration, including enabling or
disabling the switch mode an... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
707 | them to a single VLAN. Trunk ports accept untagged and tagged traffic, and can belong to more than
one VLAN. By default, Ethernet 1/2 through 1/8 are configured as access switch ports on VLAN 1. You
cannot configure the Management interface as a switch port.
• Logical VLAN interface—These interfaces operate the same as... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
708 | Logical VLAN Interfaces
• You can create up to 60 VLAN interfaces.
• If you also use VLAN subinterfaces on a firewall interface, you cannot use the same VLAN ID as for a
logical VLAN interface.
• MAC Addresses:
• Routed firewall mode—All VLAN interfaces share a MAC address. Ensure that any connected
switches can suppor... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
709 | Configure Switch Ports and Power Over Ethernet
To configure switch ports and PoE, complete the following tasks.
Enable or Disable Switch Port Mode
You can set each interface independently to be either a firewall interface or a switch port. By default, Ethernet
1/1 is a firewall interface, and the remaining Ethernet int... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
710 | <cr>
Example
The following example sets Ethernet 1/3 and 1/4 to firewall mode:
ciscoasa(config)# interface ethernet1/3
ciscoasa(config-if)# no switchport
ciscoasa(config-if)# interface ethernet1/3
ciscoasa(config-if)# no switchport
ciscoasa(config-if)#
Configure a VLAN Interface
This section describes how to configure ... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
711 | Configure Switch Ports as Access Ports
To assign a switch port to a single VLAN, configure it as an access port. Access ports accept only untagged
traffic. By default, Ethernet1/2 through Ethernet 1/8 switch ports are enabled and assigned to VLAN 1.
The Firepower 1010 does not support Spanning Tree Protocol for loop de... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
712 | speed {auto | 10 | 100 | 1000}
The default is auto.
Example:
ciscoasa(config-if)# speed 100
ciscoasa(config-if)#
Step 5 (Optional) Set the duplex.
duplex {auto | full | half}
The default is auto.
Example:
ciscoasa(config-if)# duplex half
ciscoasa(config-if)#
Step 6 Enable the switch port.
no shutdown
To disable the swi... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
713 | Configure Switch Ports as Trunk Ports
This procedure describes how to create a trunk port that can carry multiple VLANs using 802.1Q tagging.
Trunk ports accept untagged and tagged traffic. Traffic on allowed VLANs pass through the trunk port
unchanged.
When the trunk receives untagged traffic, it tags it to the native... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
714 | Example:
ciscoasa(config-if)# switchport trunk allowed vlan 100,200,300
ciscoasa(config-if)#
Step 4 Set the native VLAN.
switchport trunk native vlan vlan_id
• vlan_range—Sets the VLAN ID between 1 and 4070. The default value is VLAN 1.
Each port can only have one native VLAN, but every port can have either the same or... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
715 | Step 8 Enable the switch port.
no shutdown
To disable the switch port, enter the shutdown command.
Example:
ciscoasa(config-if)# no shutdown
ciscoasa(config-if)#
Example
The following example sets Ethernet 1/6 as a trunk port with VLANs 20 through 30, and sets the
native VLAN as 4:
ciscoasa(config)# interface ethernet1... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
716 | • auto—Delivers power automatically to the powered device using a wattage appropriate to the class of
the powered device. The Firepower 1010 uses LLDP to further negotiate the correct wattage.
• never—Disables PoE.
• consumption wattage milliwatts—Manually specified the wattage in milliwatts, from 4000 to 30000.
Use th... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
717 | ---- --------------------- --------- --------------------
1 - down Ethernet1/3,
Ethernet1/4,
Ethernet1/5,
Ethernet1/6
Ethernet1/7,
Ethernet1/8
10 inside up Ethernet1/1
20 outside up Ethernet1/2
• show switch mac-address-table
Shows the static and dynamic MAC address entries.
ciscoasa# show switch mac-address-table
Lege... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
718 | Routed Mode Example
The following example creates two VLAN interfaces, and assigns two switchports to the inside interface, and
one to the outside interface.
interface Vlan11
nameif inside
security-level 100
ip address 10.11.11.1 255.255.255.0
no shutdown
!
interface Vlan20
nameif outside
security-level 0
ip address 10... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
719 | interface Ethernet1/2
switchport
switchport access vlan 20
no shutdown
!
interface Ethernet1/3
switchport
switchport access vlan 11
no shutdown
Mixed Firewall Interface/Switch Port Example
The following example creates one VLAN interface for the inside interface, and two firewall interfaces for
the outside and dmz.
int... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
720 | interface BVI1
nameif inside_bvi
security-level 100
ip address 10.30.1.10 255.255.255.0
!
interface BVI2
nameif outside_bvi
security-level 0
ip address 10.40.1.10 255.255.255.0
!
interface Vlan10
bridge-group 1
nameif inside_1
security-level 100
no shutdown
!
interface Vlan20
bridge-group 2
nameif outside
security-leve... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
721 | no shutdown
!
interface Ethernet1/7
switchport
switchport access vlan 30
no shutdown
!
interface Ethernet1/8
switchport
switchport access vlan 100
no shutdown
Failover Example
The following example configures Ethernet 1/3 as the failover interface.
interface Vlan11
nameif inside
security-level 100
ip address 10.11.11.1... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
722 | History for Switch Ports
Table 26: History for Switch Ports
Feature Name Version Feature Information
The Firepower 1010 supports setting each Ethernet interface to be a switch port or a firewall
interface.
New/Modified commands: forwardinterface,interface vlan,show switch mac-address-table,
show switch vlan, switchport... | https://www.cisco.com/c/en/us/td/docs/security/asa/asa919/configuration/general/asa-919-general-config.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.