Fibre interface connection fails on primary FTD after adding to HA pair
Recently, we did a firewall change, which involved changing the connection on one of the interfaces (Guest) of the primary FTD (part of HA pair), from copper to fibre. The change was not successful. I have provided details below.
Prior to the change –
The secondary ftd was already in a failed state as its Guest interface connection was already using fibre connection, while the primary was on copper.
Due to this different interface type, the pair was not in HA and traffic was passing only through primary FTD.
During this time, the primary FTD was carrying production traffic.
During the change –
the HA pair had purposefully been broken down.
Connection on guest service interface of primary ftd was changed from copper to fibre.
firewall was successfully passing traffic.
As soon as, the FTD was added to HA, it went to failed state. The failover reason on the primary FTD was “no guest link”, even though physically it was connected. The interface status it was showing as down.
To isolate the issue on the primary, we made the secondary ftd as active firewall and vice versa.
Post the change –
the secondary firewall is currently passing production traffic, while the standby primary is in failed state.
Can anyone please advise what could have been the probable cause or how it can be fixed ? Thanks.
ProblemTaking a snapshot of ISE virtual machines is not supported but it still happens occasionally due to administrators taking a snapshot manually or an integrated technology that automatically takes snapshots to back up VMs. When taking a snapsho...
Hi all, Is it available on Stealthwatch 7 Client or web interface the ability to import the Netflow Exporters names? I found only the possibility to configure manually the name of each Netflow Exporter, but not a bulk configuration.
User Experience Enhancements
As part of Cisco Customer Experience program, we are working towards a more uniform user experience and terminology harmonization. This program runs across all Cisco security products.
We are ali...
Join us on Thursday, October 10 at 10 am PT to meet the CEO and Founder of Cisco's most recent security investment.
In today’s cybersecurity arms race, how does Cisco stay one step ahead in the battle against attackers? One key strategy is keeping tabs on...