Cisco ASA Active/Active Failover Configuration |
- Cisco ASA Active/Active Failover Configuration
- With Cisco reorganization, what does future hold for umi?
- Adobe patches latest Flash zero-day
- White House releases trusted Internet ID plan
Cisco ASA Active/Active Failover Configuration Posted: 16 Apr 2011 06:44 AM PDT The Cisco ASA failover configuration requires two identical security appliances connected to each other through a dedicated failover link and, optionally, a stateful failover link. The health of the active interfaces and units is monitored to determine if specific failover conditions are met. If those conditions are met, failover occurs. In case of Active/active configuration both Units carry traffic. For creating active/active Failover, configuring both ASA devices in Multiple context mode is required. For ASA redundancy scenario the two devices must be the same models, must have the same number and type of interfaces and the same license is required. ASA 5505 and 5510 do not support active/active failover without license upgrade. For active/active configuration, Failover Contexts and Failover groups need to be created. The Failover group is then applied to Primary or Secondary physical ASA unit. After this, the particular Failover group is applied to a Context. For example, primary unit is active ASA of Failover group1, but Secondary unit is Standby ASA of Failover group1. If primary ASA is out of order, Secondary ASA will become Active of Failover group1. For explaining Active/Active Failover configuration in details, let's do the following LAB. Click on the image above for larger size diagram Configuration !Switch both ASA devices to multiple context mode. !When ASAs are reloaded, connect them to each other with Ge0/2 and Ge0/3 ports. First start with the Primary Unit configuration. Before starting configuration, all interfaces must be in the up state. !enable LAN Failover. !set this unit as primary. Determine Failover and State interfaces. These two interfaces can be the same physical interface if you don't need to consume one extra port. In our example here we use two separate physical interfaces. !Define Failover Interface !assign IP address on Failover Interface. MUST be in same Subnet as the standby on the other unit. In this documentation, the "state" (interface name for GigabitEthernet0/3) is used as a state !Define stateful Failover interface !assign IP address on Stateful Failover interface !Create Failover groups, where Failover group1 will be the Primary, i.e. active on Primary Unit and Failover group2 will be the Standby on Primary Unit. Configure also HTTP Replication, after which occurs HTTP Connection state replication between active and Standby ASAs. Also determine Preempt Delay. Preempt Delay means in what time to regain role of Active after Fail Recovery. asa(config)#failover group 1 asa(config)#failover group 2 Now let's start creating Contexts and assigning interfaces in each Context. !Configure the admin context !configure the Sub-interfaces ! Configure the contexts asa(config)# context c2 !Snap each Context to Failover Groups. If we don't indicate Contexts to Failover Groups, each context will be in Group1 by default. !Configure IP addresses on Context1. !Configure IP addresses on Context2. Now let's start Secondary Unit configuration. !Define Failover Interface !assign IP address on Failover Interface. MUST be in same Subnet as other unit. !enable LAN Failover. !set this unit as secondary With the above piece of configuration commands everything is completed and now let's start checking. Verification: !verify Primary UNIT Failover On This host: Primary slot 0: ASA5520 hw/sw rev (2.0/8.2(1)) status (Up Sys) Other host: Secondary slot 0: ASA5520 hw/sw rev (2.0/8.2(1)) status (Up Sys) Stateful Failover Logical Update Statistics Logical Update Queue Information !verify Secondary unit ASA# show failover Failover On This host: Secondary slot 0: ASA5540 hw/sw rev (2.0/8.2(1)) status (Up Sys) Other host: Primary slot 0: ASA5520 hw/sw rev (2.0/8.2(1)) status (Up Sys) Stateful Failover Logical Update Statistics Logical Update Queue Information As we observed from above, active/active Failover is working and everything is as expected. |
With Cisco reorganization, what does future hold for umi? Posted: 15 Apr 2011 12:20 AM PDT Cisco announced that it will exit part of its consumer business and realign its operations. As part of the move, the company will close down its Flip video camera business (with plans to support current FlipShare customers and partners with a transition plan) and move the Cisco umi products and service into the company's Business TelePresence product line. |
Adobe patches latest Flash zero-day Posted: 15 Apr 2011 12:24 AM PDT |
White House releases trusted Internet ID plan Posted: 15 Apr 2011 09:20 AM PDT |
You are subscribed to email updates from "Cisco" via Ehsan in Google Reader To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment