04-08-2021 03:21 AM
Hello all,
there is not too much information about Protected Access Credential (PAC) file deployment and background for Cisco ASA firewalls except this and another official documentation.
there are stated following restrictions about importing PAC credentials:
Questions:
thank you
michal
Solved! Go to Solution.
04-08-2021 03:35 PM
Questions:
04-08-2021 03:35 PM
Questions:
04-09-2021 01:29 AM - edited 04-09-2021 01:45 AM
Thank you very much Sheraz for your qualifed response. Now the real case based on which I've triggered this topic. We're using HA setup of two ASA firewalls with multi-context mode. In this particular case the primary unit hosts all active contexts. OS upgrade have been performed on this HA ASA solution. After OS upgrade the PAC credentials were no longer present at all... neither on active or standby context. Do you have any explanation why this could happen? Upgrade was done from 9.6(4) to 9.8(4).
What I can tell you more is that the backup unit was upgraded and reloaded first. This would mean that all the time of backup unit upgrade/reload the primary was active and I assume PAC credentials were in place.
I would assume that during reload of upgraded primary unit, the PAC credentials *potentially* could not be used by already upgraded secondary unit due to theoretical OS version difference stateful failover incompatibility, but based on the "owner" status of PAC credentials by active context on primary unit I would assume it will be taken by active context from internal keystore and used like before upgrade. And therefore TrustSec security groups should be enumerated without issues.
My only understanding is that there's a bug or whathever incompatibility for using keystore (structure change?) which breaks possibility to take the stored PAC credentials...
or anything else?
thank you
04-09-2021 12:35 PM
One more hypotetical question: in case that administrator mistakenly import same PAC file (i.e. credentials created for specific device) to two different firewalls - could this be a reason for PAC credential expiration on both ASA firewalls?
04-13-2021 02:58 AM
Hi Michal.
sorry for the late responce I had some family commitment so i was away.
- Now the real case based on which I've triggered this topic. We're using HA setup of two ASA firewalls with multi-context mode. In this particular case the primary unit hosts all active contexts. OS upgrade have been performed on this HA ASA solution. After OS upgrade the PAC credentials were no longer present at all... neither on active or standby context. Do you have any explanation why this could happen? Upgrade was done from 9.6(4) to 9.8(4).
Primary Unit host all the active context and the secondary unit was keeping all the context as standby. once the software upgrade was performed the PAC credentials were no longer exist. so this confirms if there is a power outrage on the primary unit it will replicate everything aprat from PAC as you done the software upgrade and once the system boot up as standby (which was active prior to upgrade). might this not relevent but have you see this Bug
ASA: Unable to import PAC file if FIPS is enabled. |
- What I can tell you more is that the backup unit was upgraded and reloaded first. This would mean that all the time of backup unit upgrade/reload the primary was active and I assume PAC credentials were in place.
You saying the backup unit (Secondary Firewall) was upgraded and reloaded first? If answer is yes. than once the Secondary firewall is upgrade to new version and once it come online did you check the pac was still on the secondary (now with new software) on it?
- would assume that during reload of upgraded primary unit, the PAC credentials *potentially* could not be used by already upgraded secondary unit due to theoretical OS version difference stateful failover incompatibility, but based on the "owner" status of PAC credentials by active context on primary unit I would assume it will be taken by active context from internal keystore and used like before upgrade. And therefore TrustSec security groups should be enumerated without issues.
I agree with you what you describe above.
- One more hypotetical question: in case that administrator mistakenly import same PAC file (i.e. credentials created for specific device) to two different firewalls - could this be a reason for PAC credential expiration on both ASA firewalls?
I guess if this was the case the ASA should have give warning or thown an error back to the CLI.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide