<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure Firewall Cluster interface health behavior in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194190#M1115750</link>
    <description>&lt;P&gt;Sure, that is an alternative layout supported, but the way we have ours laid out is supported as in that documented.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2024 09:23:03 GMT</pubDate>
    <dc:creator>bfbcnet</dc:creator>
    <dc:date>2024-09-13T09:23:03Z</dc:date>
    <item>
      <title>Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193450#M1115698</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have two questions on the behaviour of 3100 Secure firewalls in a cluster and interface health checks.&lt;/P&gt;&lt;P&gt;We have a pair of 3100 secure firewalls (running FTD), that we have setup in a cluster, managed by FMC. All devices connected to the two FW's use etherchanel across both the members of the cluster. Each FW has two connections to other devices as most of those devices are clustered devices as well (such as switches).&lt;/P&gt;&lt;P&gt;What we have found is that if one of the members of any of the etherchannel links has a fault for whatever reason (maintanence, etc), the FW cluster member that etherchannel member is connected to, goes into a disabled state, taking down all other links on that FW cluster member. This occurs, it appears due to interface health monitoring detecting that an interface is down on one FW cluster member, but not the other one. No matter if it is only an etherchannel member (1 out of 4), so the FW member still has a connection to the destination device.&lt;/P&gt;&lt;P&gt;This behaviour can be stopped by disabling interface health monitoring globally in the health policy for the cluster.&lt;/P&gt;&lt;P&gt;So question number one. Is there a way of stopping this behaviour of a single member of an 4 link etherchannel causing a whole firewall to disable itself, without lossing all interface monitoring capabilities across the cluster? That is can what the behaviour of how the cluster reacts to the link being down be changed, without lossing interface alerts?&lt;/P&gt;&lt;P&gt;Second question is it seems pretty hard to find out what interface has caused the member of the FW cluster to disable itself. When it happens I check cluster, etc health logs, but they don't tell you what interface having a health issue caused the Cluster member to disable itself in the first place. Only that there is a mismatch so one member has disabled itself. I was not able to find much documentation on how to check this and this behaviour in general. Only thing I could find was:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/216745-troubleshoot-firepower-threat-defense-f.html#toc-hId--2004320218" target="_blank"&gt;Troubleshoot Firepower Threat Defense (FTD) Cluster - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The logs it said to check, did not yield what interface was mismatching that caused the cluster member to be disabled.&lt;/P&gt;&lt;P&gt;Thanks in advance for any help of this.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 22:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193450#M1115698</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-11T22:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193537#M1115700</link>
      <description>&lt;P&gt;You have cluster or HA active/standby FW?&lt;/P&gt;
&lt;P&gt;If you have HA then&lt;/P&gt;
&lt;P&gt;I will start see if the PO is correct config or not&lt;/P&gt;
&lt;P&gt;In SW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show port-channel summary&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 06:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193537#M1115700</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-12T06:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193796#M1115717</link>
      <description>&lt;P&gt;Is the firewall in an active/standby HA pair or is it a "proper" cluster?&lt;/P&gt;
&lt;P&gt;As for finding out which interface is failing, if you go into expert mode on the FTD and then&amp;nbsp; look through the file /var/log/messages for the relevant date the issue happened.&amp;nbsp; You might see what interface is causing the issue there.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 13:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193796#M1115717</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-09-12T13:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193834#M1115720</link>
      <description>&lt;P&gt;It is a "proper" active, active cluster, so a bit annoying when half of it goes down just due to a single interface issue.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 14:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193834#M1115720</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-12T14:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193837#M1115721</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for that. My response to both of your points, is how would I do that?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 14:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193837#M1115721</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-12T14:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193916#M1115724</link>
      <description>&lt;P&gt;Active/active cluster must be careful when config PO&lt;/P&gt;
&lt;P&gt;Can I see topology&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 16:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5193916#M1115724</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-12T16:54:19Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194011#M1115725</link>
      <description>&lt;P&gt;Active/Active is still an Active / standby HA failover pair, it is just that you have an active context on both ASAs.&amp;nbsp; A "proper" cluster would be that all ASAs acting as a single logical firewall and all are actively forwarding traffic.&amp;nbsp; I bring this up since the solution would be different in each of these setups, and therefore important to define what you, the poster, is defining as a cluster.&lt;/P&gt;
&lt;P&gt;In your case you would want to configure a failover to occur if 3 interfaces fail.&amp;nbsp; This is possible.&amp;nbsp; Unfortunately you cannot specify which 3 interfaces or portchannels this should apply to.&amp;nbsp; So, you could end up in a situation where you have 3 portchannels with 4 interfaces in each, and 1 interface in each has failed for whatever reason, then you would have a failover situation.&lt;/P&gt;
&lt;P&gt;The configuration for this is done in FMC under &lt;STRONG&gt;Devices &amp;gt; Device Management &amp;gt; Edit the device &amp;gt; High Availability &amp;gt; Failover Trigger Criteria&lt;/STRONG&gt; and edit failover limit to be 3&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 21:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194011#M1115725</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-09-12T21:06:10Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194044#M1115730</link>
      <description>&lt;P&gt;Apologies. I assumed just saying cluster in my original post would make it clear. It is a cluster created as in the below:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/device-ops-cluster-sec-fw-3100.html#ID-2170-000000cb" target="_blank" rel="noopener"&gt;Cisco Secure Firewall Management Center Device Configuration Guide, 7.2 - Clustering for the Secure Firewall 3100 [Cisco Secure Firewall Management Center] - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 23:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194044#M1115730</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-12T23:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194052#M1115731</link>
      <description>&lt;P&gt;Not sure the portchannel / etherchannel config has much to do with it, but here is is the topology.&lt;/P&gt;&lt;P&gt;Edited: Did not document the cluster control link layout we have properly.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 08:59:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194052#M1115731</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-13T08:59:55Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194119#M1115739</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cluster.jpg" style="width: 667px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229078iC46F60169258AAE9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Cluster.jpg" alt="Cluster.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 06:43:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194119#M1115739</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T06:43:55Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194178#M1115747</link>
      <description>&lt;P&gt;No Spanned Etherchannels are supported with the firewalls in this clustering setup, as from the document I linked:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/device-ops-cluster-sec-fw-3100.html#Cisco_Concept.dita_a16807df-7afb-4f31-b1cd-ef7719390ccc" target="_blank"&gt;Cisco Secure Firewall Management Center Device Configuration Guide, 7.2 - Clustering for the Secure Firewall 3100 [Cisco Secure Firewall Management Center] - Cisco&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bfbcnet_1-1726218806121.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229083i29188860DAD7A16A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bfbcnet_1-1726218806121.png" alt="bfbcnet_1-1726218806121.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Your layout would be the only option in an HA-active backup setup. The setup we have in place is proper clustering with both firewalls being active-active. Hence, on the switch output I attached, all 4 etherchannel members show up in the EtherChannel to both firewalls at the same time.&lt;/P&gt;&lt;P&gt;Be aware I have updated the original topology I posted as I did put document the Cluster control link topology properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194178#M1115747</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-13T09:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194181#M1115748</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194181#M1115748</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T09:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194188#M1115749</link>
      <description>&lt;P&gt;Think I have answered my second question after some playing. The CLI command 'show cluster history' gives detail down to the port / etherchannel that is causing the issue. The issue is that it matters what FW you run the command on. If run on the FW that has disabled itself, then you do not get the detail. Maybe related to which FW was in 'control' at the time of the interface issue.&lt;/P&gt;&lt;P&gt;You then need to dig into the port / etherchannel interface status to work out which member or members have an issue.&lt;/P&gt;&lt;P&gt;Would still like a way of stopping the Firewall disabling itself without loosing all interface monitoring alerts.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:20:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194188#M1115749</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-13T09:20:37Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194190#M1115750</link>
      <description>&lt;P&gt;Sure, that is an alternative layout supported, but the way we have ours laid out is supported as in that documented.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194190#M1115750</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-13T09:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194191#M1115751</link>
      <description>&lt;P&gt;I suggest open TAC and mention my reply to be sure&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks a lot&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 09:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5194191#M1115751</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T09:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Firewall Cluster interface health behavior</title>
      <link>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5196882#M1115967</link>
      <description>&lt;P&gt;In the mean time have upgraded FMC to lastest 7.4x version. FMC has extra dialogs for interface monitoring now, This was global to all interfaces in ver 7.2x. Either on or off for all or none.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bfbcnet_4-1726836588247.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229559i45BA97D2E65AD9CA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bfbcnet_4-1726836588247.png" alt="bfbcnet_4-1726836588247.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bfbcnet_5-1726836848079.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229561iEBC3888D2F3B38E2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bfbcnet_5-1726836848079.png" alt="bfbcnet_5-1726836848079.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;To support this is there is extra documentation in FMC that explains that indicates this is standard behaviour.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bfbcnet_2-1726836242250.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229556i8205634B7B421B3E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bfbcnet_2-1726836242250.png" alt="bfbcnet_2-1726836242250.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bfbcnet_3-1726836300711.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/229558i9FEF42303E9D864E/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bfbcnet_3-1726836300711.png" alt="bfbcnet_3-1726836300711.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I assume this is an architectural issue. I assumed it would work like clustering on switches such as Stackwise Virtual where if there is not a working interface to a destination on one cluster / switch stack member, then the traffic flows over the cluster / stack link between to another member and exits that other member. Looks like this is a problem for FW clustering (maybe due to cluster link bandwidth concerns), so to stop traffic even coming into that member and being dropped, it has to remove itself from the cluser and disable all it's interfaces. Oh well, it is what it is...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2024 13:03:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/secure-firewall-cluster-interface-health-behavior/m-p/5196882#M1115967</guid>
      <dc:creator>bfbcnet</dc:creator>
      <dc:date>2024-09-20T13:03:16Z</dc:date>
    </item>
  </channel>
</rss>

