<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ACE - Firewall load balancing in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/cisco-ace-firewall-load-balancing/m-p/1636303#M33136</link>
    <description>&lt;P&gt;I am using two sets of ACE load balancers for load balancing traffic across two firewalls (firewall load balancing).&lt;/P&gt;&lt;P&gt;The solution works fine. I have a virtual address of 0.0.0.0 in either direction to match traffci going from the internal users to the internet and vice versa.&lt;/P&gt;&lt;P&gt;The problem is that when I try to manage the load-balanced firewalls (either using SSH (or) HTTPS) from outside, then that connection also gets load balanced and when I try to connect to FW1 then sometimes this connection ends up on FW2 and vice versa and the connection gets dropped. I have a workaround in place where i am using a virtual address per firewall to connect to the real IP address of the firewall.&lt;/P&gt;&lt;P&gt;Is there any other way of managing firewalls (which are defined as real-servers) in a FWLB setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the configuration of the external ACE which has the two firewalls defined as the real-servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ALL line 8 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe icmp ICMP-Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; passdetect interval 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host FW1-ASA&lt;BR /&gt;&amp;nbsp; ip address 10.11.71.10&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host FW2&lt;BR /&gt;&amp;nbsp; ip address 10.11.71.11&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host Firewalls&lt;BR /&gt;&amp;nbsp; transparent&lt;BR /&gt;&amp;nbsp; predictor leastconns&lt;BR /&gt;&amp;nbsp; rserver FW1-ASA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver FW2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;serverfarm host Firewalls-NO-LB&lt;BR /&gt;&amp;nbsp; rserver FW1-ASA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;serverfarm host Firewalls-NO-LB1&lt;BR /&gt;&amp;nbsp; rserver FW2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sticky ip-netmask 255.255.255.255 address source new-sticky&lt;BR /&gt;&amp;nbsp; timeout activeconns&lt;BR /&gt;&amp;nbsp; serverfarm Firewalls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------&lt;BR /&gt;This is my workaround for connection to the IP address of the firewalls (for management)&lt;/P&gt;&lt;P&gt;class-map match-any FW-Real&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.11.71.254 any&lt;BR /&gt;class-map match-any FW-Real2&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.11.71.253 any&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------&lt;BR /&gt;class-map type management match-any Remote-Access&lt;BR /&gt;&amp;nbsp; 201 match protocol telnet any&lt;BR /&gt;&amp;nbsp; 202 match protocol http any&lt;BR /&gt;&amp;nbsp; 203 match protocol https any&lt;BR /&gt;&amp;nbsp; 204 match protocol ssh any&lt;BR /&gt;&amp;nbsp; 205 match protocol snmp any&lt;BR /&gt;&amp;nbsp; 206 match protocol icmp any&lt;BR /&gt;class-map match-any fwlb&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 0.0.0.0 0.0.0.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type management first-match Remote-Management-Policy&lt;BR /&gt;&amp;nbsp; class Remote-Access&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match FWLB-No-LB&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Firewalls-NO-LB&lt;BR /&gt;policy-map type loadbalance first-match FWLB-No-LB1&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Firewalls-NO-LB1&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------&lt;BR /&gt;policy-map type loadbalance first-match FWLB-l7slb&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Firewalls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match Firewall-No-LB&lt;BR /&gt;&amp;nbsp; class FW-Real&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-No-LB&lt;BR /&gt;policy-map multi-match Firewall-No-LB1&lt;BR /&gt;&amp;nbsp; class FW-Real2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-No-LB1&lt;BR /&gt;policy-map multi-match int70&lt;BR /&gt;&amp;nbsp; class fwlb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-l7slb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 70&lt;BR /&gt;&amp;nbsp; description "Client side"&lt;BR /&gt;&amp;nbsp; ip address 10.11.70.2 255.255.255.0&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ALL&lt;BR /&gt;&amp;nbsp; access-group output ALL&lt;BR /&gt;&amp;nbsp; service-policy input Remote-Management-Policy&lt;BR /&gt;&amp;nbsp; service-policy input Firewall-No-LB --&amp;gt; connect to the real IP address of the firewall for management&lt;BR /&gt;&amp;nbsp; service-policy input Firewall-No-LB1&amp;nbsp; --&amp;gt; connect to the real IP address of the firewall for management&lt;BR /&gt;&amp;nbsp; service-policy input int70&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface vlan 71&lt;BR /&gt;&amp;nbsp; description "Firewall side"&lt;BR /&gt;&amp;nbsp; ip address 10.11.71.2 255.255.255.0&lt;BR /&gt;&amp;nbsp; mac-sticky enable&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ALL&lt;BR /&gt;&amp;nbsp; access-group output ALL&lt;BR /&gt;&amp;nbsp; service-policy input Remote-Management-Policy&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;</description>
    <pubDate>Wed, 16 Feb 2011 21:29:03 GMT</pubDate>
    <dc:creator>smhussain</dc:creator>
    <dc:date>2011-02-16T21:29:03Z</dc:date>
    <item>
      <title>Cisco ACE - Firewall load balancing</title>
      <link>https://community.cisco.com/t5/application-networking/cisco-ace-firewall-load-balancing/m-p/1636303#M33136</link>
      <description>&lt;P&gt;I am using two sets of ACE load balancers for load balancing traffic across two firewalls (firewall load balancing).&lt;/P&gt;&lt;P&gt;The solution works fine. I have a virtual address of 0.0.0.0 in either direction to match traffci going from the internal users to the internet and vice versa.&lt;/P&gt;&lt;P&gt;The problem is that when I try to manage the load-balanced firewalls (either using SSH (or) HTTPS) from outside, then that connection also gets load balanced and when I try to connect to FW1 then sometimes this connection ends up on FW2 and vice versa and the connection gets dropped. I have a workaround in place where i am using a virtual address per firewall to connect to the real IP address of the firewall.&lt;/P&gt;&lt;P&gt;Is there any other way of managing firewalls (which are defined as real-servers) in a FWLB setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the configuration of the external ACE which has the two firewalls defined as the real-servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list ALL line 8 extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;probe icmp ICMP-Probe&lt;BR /&gt;&amp;nbsp; interval 15&lt;BR /&gt;&amp;nbsp; passdetect interval 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rserver host FW1-ASA&lt;BR /&gt;&amp;nbsp; ip address 10.11.71.10&lt;BR /&gt;&amp;nbsp; inservice&lt;BR /&gt;rserver host FW2&lt;BR /&gt;&amp;nbsp; ip address 10.11.71.11&lt;BR /&gt;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;serverfarm host Firewalls&lt;BR /&gt;&amp;nbsp; transparent&lt;BR /&gt;&amp;nbsp; predictor leastconns&lt;BR /&gt;&amp;nbsp; rserver FW1-ASA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;&amp;nbsp; rserver FW2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;serverfarm host Firewalls-NO-LB&lt;BR /&gt;&amp;nbsp; rserver FW1-ASA&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;BR /&gt;serverfarm host Firewalls-NO-LB1&lt;BR /&gt;&amp;nbsp; rserver FW2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inservice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sticky ip-netmask 255.255.255.255 address source new-sticky&lt;BR /&gt;&amp;nbsp; timeout activeconns&lt;BR /&gt;&amp;nbsp; serverfarm Firewalls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------------------&lt;BR /&gt;This is my workaround for connection to the IP address of the firewalls (for management)&lt;/P&gt;&lt;P&gt;class-map match-any FW-Real&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.11.71.254 any&lt;BR /&gt;class-map match-any FW-Real2&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 10.11.71.253 any&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------&lt;BR /&gt;class-map type management match-any Remote-Access&lt;BR /&gt;&amp;nbsp; 201 match protocol telnet any&lt;BR /&gt;&amp;nbsp; 202 match protocol http any&lt;BR /&gt;&amp;nbsp; 203 match protocol https any&lt;BR /&gt;&amp;nbsp; 204 match protocol ssh any&lt;BR /&gt;&amp;nbsp; 205 match protocol snmp any&lt;BR /&gt;&amp;nbsp; 206 match protocol icmp any&lt;BR /&gt;class-map match-any fwlb&lt;BR /&gt;&amp;nbsp; 2 match virtual-address 0.0.0.0 0.0.0.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type management first-match Remote-Management-Policy&lt;BR /&gt;&amp;nbsp; class Remote-Access&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;policy-map type loadbalance first-match FWLB-No-LB&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Firewalls-NO-LB&lt;BR /&gt;policy-map type loadbalance first-match FWLB-No-LB1&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Firewalls-NO-LB1&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------&lt;BR /&gt;policy-map type loadbalance first-match FWLB-l7slb&lt;BR /&gt;&amp;nbsp; class class-default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; serverfarm Firewalls&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match Firewall-No-LB&lt;BR /&gt;&amp;nbsp; class FW-Real&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-No-LB&lt;BR /&gt;policy-map multi-match Firewall-No-LB1&lt;BR /&gt;&amp;nbsp; class FW-Real2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-No-LB1&lt;BR /&gt;policy-map multi-match int70&lt;BR /&gt;&amp;nbsp; class fwlb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-l7slb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 70&lt;BR /&gt;&amp;nbsp; description "Client side"&lt;BR /&gt;&amp;nbsp; ip address 10.11.70.2 255.255.255.0&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ALL&lt;BR /&gt;&amp;nbsp; access-group output ALL&lt;BR /&gt;&amp;nbsp; service-policy input Remote-Management-Policy&lt;BR /&gt;&amp;nbsp; service-policy input Firewall-No-LB --&amp;gt; connect to the real IP address of the firewall for management&lt;BR /&gt;&amp;nbsp; service-policy input Firewall-No-LB1&amp;nbsp; --&amp;gt; connect to the real IP address of the firewall for management&lt;BR /&gt;&amp;nbsp; service-policy input int70&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;interface vlan 71&lt;BR /&gt;&amp;nbsp; description "Firewall side"&lt;BR /&gt;&amp;nbsp; ip address 10.11.71.2 255.255.255.0&lt;BR /&gt;&amp;nbsp; mac-sticky enable&lt;BR /&gt;&amp;nbsp; no icmp-guard&lt;BR /&gt;&amp;nbsp; access-group input ALL&lt;BR /&gt;&amp;nbsp; access-group output ALL&lt;BR /&gt;&amp;nbsp; service-policy input Remote-Management-Policy&lt;BR /&gt;&amp;nbsp; no shutdown&lt;/P&gt;</description>
      <pubDate>Wed, 16 Feb 2011 21:29:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/cisco-ace-firewall-load-balancing/m-p/1636303#M33136</guid>
      <dc:creator>smhussain</dc:creator>
      <dc:date>2011-02-16T21:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACE - Firewall load balancing</title>
      <link>https://community.cisco.com/t5/application-networking/cisco-ace-firewall-load-balancing/m-p/1636304#M33137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as i know, there is no others ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only reduce your configuration by puting all your class undert the same policy-map:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map multi-match &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;int70&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; class FW-Real&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-No-LB&lt;/P&gt;&lt;P&gt;&amp;nbsp; class FW-Real2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-No-LB1&lt;BR /&gt;&amp;nbsp; class fwlb&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance vip inservice&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; loadbalance policy FWLB-l7slb&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 70&lt;/P&gt;&lt;P&gt;&amp;nbsp; description "Client side"&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.11.70.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; no icmp-guard&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-group input ALL&lt;/P&gt;&lt;P&gt;&amp;nbsp; access-group output ALL&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy input Remote-Management-Policy&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy input &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;int70&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shutdown&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Feb 2011 13:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/cisco-ace-firewall-load-balancing/m-p/1636304#M33137</guid>
      <dc:creator>lacirasella</dc:creator>
      <dc:date>2011-02-21T13:18:50Z</dc:date>
    </item>
  </channel>
</rss>

