<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Cluster: HA Config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3815080#M6676</link>
    <description>Currently only one CCL per cluster group is supported.</description>
    <pubDate>Wed, 06 Mar 2019 17:25:36 GMT</pubDate>
    <dc:creator>Ilkin</dc:creator>
    <dc:date>2019-03-06T17:25:36Z</dc:date>
    <item>
      <title>ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3812934#M6670</link>
      <description>&lt;P&gt;Good Day,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So here's our configuration for the Cluster:&lt;/P&gt;&lt;P&gt;cluster group ASA-Cluster&lt;BR /&gt;&amp;nbsp;local-unit ASA-2&lt;BR /&gt;&amp;nbsp;cluster-interface GigabitEthernet1/8 ip 172.200.200.120 255.255.255.0&lt;BR /&gt;&amp;nbsp;priority 50&lt;BR /&gt;&amp;nbsp;console-replicate&lt;BR /&gt;&amp;nbsp;health-check holdtime 3&lt;BR /&gt;&amp;nbsp;health-check data-interface auto-rejoin 3 5 2&lt;BR /&gt;&amp;nbsp;health-check cluster-interface auto-rejoin unlimited 5 1&lt;BR /&gt;&amp;nbsp;no health-check monitor-interface Management1/1&lt;BR /&gt;&amp;nbsp;no health-check monitor-interface Port-channel2&lt;BR /&gt;&amp;nbsp;no health-check monitor-interface Port-channel3&lt;BR /&gt;&amp;nbsp;no health-check monitor-interface Port-channel4&lt;BR /&gt;&amp;nbsp;clacp system-mac auto system-priority 1&lt;BR /&gt;&amp;nbsp;enable&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;That's also the config of the other ASA of course just the local-unit ID is changed. Anyway, when we tested to Power off one of the ASA in the cluster, the cluster control link also goes down, which will make the portchannels to go down. When the port-channels go down, the traffic from the inside interfaces (port-channel members) can't pass the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way that will make the port-channels stays UP and running even if the CCL is down?&amp;nbsp; We don't use switch, just a cable between the cluster.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3812934#M6670</guid>
      <dc:creator>floki</dc:creator>
      <dc:date>2020-02-21T16:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3812940#M6671</link>
      <description>&lt;P&gt;Can I also configure a CCL to a switch and make another cluster link interface configuration on the Cluster Group? If so, will the data portchannels stays UP even though 1 CCL is down?&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2019 13:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3812940#M6671</guid>
      <dc:creator>floki</dc:creator>
      <dc:date>2019-03-02T13:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3813015#M6672</link>
      <description>&lt;P&gt;We do not have your network topology and full configuration and how your switch side configured. so it hard to tell what is wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;suggest to post the enough information to understand better your problem, why this links are going down.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this is reference guide for HA cluster :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-general-config/ha-cluster.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-general-config/ha-cluster.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2019 21:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3813015#M6672</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-03-02T21:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3813088#M6673</link>
      <description>&lt;P&gt;Hi, Thanks for your reply. Here's our config &amp;amp; Topology for the ASA:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There's only one CCL in between of the firewall that is configured in Interface Gigabit 1/8&lt;/P&gt;&lt;P&gt;All other interfaces are data interface.&lt;/P&gt;&lt;P&gt;Is there a work around like having another port channel for CCL interfaces and then assigning two interface of each cisco asa as cluster link. One interface of each will be connected just like in the topology and the other interface of each will be connected to the switch? So that when the ASA is turned off or the switch is turned off, there will still be a High Availability?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ClusterTopology.JPG" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/31220i9B2F0DDFBAE7C851/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ClusterTopology.JPG" alt="ClusterTopology.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;PRE&gt;ip local pool Management-Pool 192.168.5.2-192.168.5.3&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;channel-group 2 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;channel-group 3 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;channel-group 4 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;description Clustering Interface&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 192.168.5.1 255.255.255.0 cluster-pool Management-Pool &lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;port-channel span-cluster&lt;BR /&gt;mac-address aaaa.bbbb.cccc standby cccc.bbbb.aaaa&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.16.16.181 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Port-channel2&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;port-channel span-cluster&lt;BR /&gt;mac-address aaaa.dddd.cccc standby cccc.dddd.aaaa&lt;BR /&gt;nameif inside1&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Port-channel3&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;port-channel span-cluster&lt;BR /&gt;mac-address aaaa.eeee.cccc standby cccc.eeee.aaaa&lt;BR /&gt;nameif inside2&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.2.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Port-channel4&lt;BR /&gt;lacp max-bundle 8&lt;BR /&gt;port-channel span-cluster&lt;BR /&gt;mac-address aaaa.ffff.cccc standby cccc.ffff.aaaa&lt;BR /&gt;nameif inside3&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.3.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network INSIDE1_CLIENT&lt;BR /&gt;host 192.168.1.2&lt;BR /&gt;description INSIDE1_HOST&lt;BR /&gt;object network VMWARE-ESXI-SERVER_CLIENT&lt;BR /&gt;host 172.16.16.23&lt;BR /&gt;description ESXI SERVER&lt;BR /&gt;object network NAT_OUTSIDE_1&lt;BR /&gt;host 172.16.16.183&lt;BR /&gt;description inside1 host mapped IP&lt;BR /&gt;object network NAT_OUTSIDE_2&lt;BR /&gt;host 172.16.16.184&lt;BR /&gt;description Inside2 host mapped IP&lt;BR /&gt;object network INSIDE2_CLIENT&lt;BR /&gt;host 192.168.2.2&lt;BR /&gt;description INSIDE2_HOST&lt;BR /&gt;object network INSIDE3_CLIENT&lt;BR /&gt;host 192.168.3.2&lt;BR /&gt;description INSIDE3_HOST&lt;BR /&gt;object network NAT_OUTSIDE_3&lt;BR /&gt;host 172.16.16.185&lt;BR /&gt;description Inside3 host mapped IP&lt;BR /&gt;cluster group ASA-Cluster&lt;BR /&gt;local-unit ASA-2&lt;BR /&gt;cluster-interface GigabitEthernet1/8 ip 172.200.200.120 255.255.255.0&lt;BR /&gt;priority 50&lt;BR /&gt;console-replicate&lt;BR /&gt;health-check holdtime 3&lt;BR /&gt;health-check data-interface auto-rejoin 3 5 2&lt;BR /&gt;health-check cluster-interface auto-rejoin unlimited 5 1&lt;BR /&gt;no health-check monitor-interface Management1/1&lt;BR /&gt;no health-check monitor-interface Port-channel2&lt;BR /&gt;no health-check monitor-interface Port-channel3&lt;BR /&gt;no health-check monitor-interface Port-channel4&lt;BR /&gt;clacp system-mac auto system-priority 1&lt;BR /&gt;enable&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside1 1500&lt;BR /&gt;mtu inside2 1500&lt;BR /&gt;mtu inside3 1500&lt;BR /&gt;mtu cluster 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module &lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.5.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect tftp &lt;BR /&gt;inspect ip-options &lt;BR /&gt;!&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Mar 2019 07:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3813088#M6673</guid>
      <dc:creator>floki</dc:creator>
      <dc:date>2019-03-03T07:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3814204#M6674</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;P&gt;&lt;SPAN style="font-family: inherit;"&gt;Is there a way that will make the port-channels stays UP and running even if the CCL is down?&amp;nbsp; We don't use switch, just a cable between the cluster.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;No, by design on a cluster unit if CCL goes down, then clustering is disabled all data interfaces are shut down.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 12:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3814204#M6674</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-05T12:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3814601#M6675</link>
      <description>&lt;P&gt;What about having two CCL? One CCL connected between ASA firewalls and the second connects from the Firewalls to a Switch. When one Firewall goes down, will the port-channels still be up and running? Since the CCL connected from firewall to switch is still UP?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Mar 2019 00:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3814601#M6675</guid>
      <dc:creator>floki</dc:creator>
      <dc:date>2019-03-06T00:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Cluster: HA Config</title>
      <link>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3815080#M6676</link>
      <description>Currently only one CCL per cluster group is supported.</description>
      <pubDate>Wed, 06 Mar 2019 17:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-cluster-ha-config/m-p/3815080#M6676</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-06T17:25:36Z</dc:date>
    </item>
  </channel>
</rss>

