ACI and external Firewall Cluster - Recommendation
we need a recommendation for connecting a Checkpoint Firewall Cluster to a ACI fabric. It should be a layer 3 connectivity and each Cluster member must be connected to a different leaf switch.
Between the Cluster and the ACI fabric there is a transfer network and the cluster is working in active/standby.
I noticed there are different solutions to solve this.
1. HSRP VIP on ACI side - > CP Cluster has a static route to this VIP
2. SVI on ACI side - > CP Cluster has a static route to this SVI IP Address
There is no Portchannel between the fabric and the CP cluster. There are single connections. The CP Cluster has also a VIP configured and each physical interface has its own IP Address. From the fabric there a static routed pointing to the firewall VIP.
Re: ACI and external Firewall Cluster - Recommendation
We did the setup with a CP FW cluster (Active/Standby) spanning 2 different datacenters, we do have vPC's between the CP and the leaf switches per datacenter. We configured a L3Out in the common tenant so this can be used by different tenants (on a per needed base).
We solved this with using SVI interfaces, meaning configuring a /28 for each vPC we have (.1 VIP CP, .2 CP1, .3 CP2 and .4 LF1 [side A IP] and .5 LF2 [side B IP].
If you aren't a member of the Cisco Customer Connection program you're missing out! In addition to regular online NDA briefings, we also conduct exclusive roadmap sessions at Cisco Live events. Coming up at Cisco Live Barcelona we'v...
Transit routing within a VRF is reasonably straight forward, but when I tried to reproduce a problem described in here, I found that need to a little careful to be sure that the routes from one router are passed on to the other.
Here's the toplogy I ...