04-09-2010 01:47 PM - edited 03-11-2019 10:31 AM
Hello all.
...this is my first post here and I tend to be exceedingly verbose but please go easy on me.
Nevertheless, I appreciate ALL feedback whether terse or verbose (…but my little, CCNA-level brain will probably have a better chance at understanding your feedback or suggestions if they contain a good amount of detail).
Please participate in this discussion, even if you only have a tiny configuration detail to add to all of this.
ALL feedback and/or suggestions will be appreciated! …REALLY!
I know this post is somewhat lengthy, but please give it a good read-through and see if there is some way in which your experience and knowledge might be able to help me here.
THANK YOU VERY MUCH, in advance, for any help you can provide me here!
…so with that said…let’s get to it.
I have to deploy a kind of collapsed network "block" for a site which is something like a small data center.
The goal is to create a simple yet High-Availability (HA)/fault-tolerant network design that will give me the highest amount of trouble-free uptime as possible using ONLY the following devices:
-----------------------------------------------------------------------------------------------------------------------------------------
Note: Each server will be equipped with "teamed" NICs and I'm assuming the HA best practice would be to attach each server to two different access-layer switches but please let me know if you have a better idea on how this part of the network should be configured. Each WAN router has a different connection to the Internet over a different circuit type (T1 and ADSL) but both go to the same ISP and will not be running an EGP.
-----------------------------------------------------------------------------------------------------------------------------------------
Given the constraints outlined above, what is the best way to cable and configure this network block for HA?
Obviously, if I had ASA 5550s, Cat 3750s or a pair of Nexus 7000s, etc, etc, etc, ...this would be a trivial task (...but a whole lot more expensive too) !
But given the specific devices I have to work with here, there will obviously be some design trade-offs.
At a high-level, I imagine the network design should look something like what's shown in the attached picture, but my CCNA-level brain is having trouble figuring-out some of the details required to actually implement this design in the real world.
So what are some ideas in the community about how to obtain maximum HA given the limitations of the hardware I have on-hand for this project?
For instance:
So given all of this, what do you think? ...Curious minds want to know.
THANKS AGAIN !
--Steve
04-10-2010 08:17 PM
This link has some samples:
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1057935
Yes routed mode since this is internet facing and you would be doing NAT. NAT in transparent only is available starting 8.0.2.
active/standby
YES. Certainly
I don't see any diff. whether routed or transparent mode. It will be the same for the servers.
You can use 2 interfces - redundant for inside
you can use 2 interface - redundant for outside
management interface - failover interface and state
To diff. switches.
-KS
12-23-2010 10:18 PM
Kureli Sankar,
You may not be remembering me, But we interacted couple of times when i contacted you for some TAC cases from India,Chennai. Hope you are doing well
While reading this thread, I got more interest as this question is there in my mind for long time, How the wiring is done in HA design when Access switch (inside zone of FW), ASA FW , Router (Outside Zone of Firewall) is connected
Question 1: How the redundant interface of FW-1 will be connected to Router-2. Since, both primary interface and secondary interface of Firewalls cannot share the same IP subnet, how this wiring and routing is achieved. I know we cannot bridge the Primary and secondary interfaces in Firewall as we do in Routers.
Question 2: SInce routers are connected in criss cross fashion, whether i should bridge the 2 interfaces of the routers and run HSRP ? (This IP will be the default gateway for ASA Firewalls running in A/S)
I believe you will spare your valuable time to share your expert ideas and experience on this
regards,
SAIRAM
12-24-2010 06:56 AM
Sairam,
I am doing well.
Question 1: How the redundant interface of FW-1 will be connected to Router-2. Since, both primary interface and secondary interface of Firewalls cannot share the same IP subnet, how this wiring and routing is achieved. I know we cannot bridge the Primary and secondary interfaces in Firewall as we do in Routers.
Primary and Secondary firewall will have active and standby IP on the same subnet for each interface.
No two interfaces can share IP address on the same subnet.
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1028629
ex:
interface gigabitethernet0/1
nameif inside
ip address 192.168.2.1 255.255.255.0 standby 192.168.2.2
no shutdown
Question 2: SInce routers are connected in criss cross fashion, whether i should bridge the 2 interfaces of the routers and run HSRP ? (This IP will be the default gateway for ASA Firewalls running in A/S)
Yes HSRP is a good idea on the routers. The ASA will point to the HSRP IP address for its default gateway or route statement.
-KS
12-25-2010 02:19 AM
Hi,
Thanks for your comments. "Romba nandri madam" .
To make your view better, I made 2 sketches. Please find the attached diagrams.
1. If the wiring is made as shown in Sketch 1,
a) What will be the IP address configured in GE-2 interface of ASA?
b) Whether it will be in the same security-level and Zone (OUTSIDE) of GE-1 interface ?
2. Looking at Sketch 2 whether Link no. 1 (Connecting ASA-1 and Router-2) and Link no. 2 (Connecting ASA-2 and Router-1) is required for best practice HA design? I am seeing all the Design Document shows this Criss cross Link between Routers and Firewall.
I believe in case of Link between ASA-1 & Rouer-1 failure, ASA-2 will take the Active Role and the traffic will pass thru ASA-2----> Router-2----->Router-1----> ISP-1
regards,
SAIRAM
12-28-2010 09:47 AM
1. If the wiring is made as shown in Sketch 1,
a) What will be the IP address configured in GE-2 interface of ASA?
b) Whether it will be in the same security-level and Zone (OUTSIDE) of GE-1 interface ?
GE-2 - should be configured on a completely diff. subnet than GE-1 according to your requirement. The security level also depends on your requirement. Most of the times the OUTSIDE interface as soon as you issue the "nameif" command it will automatically configure the security level as zero. If you choose to leave it at 0 even for GE2, then if GE1 and GE2 networks need to communicate then, you need to implement the same security permit inter-interface" command.
If you need redundancy between GE1 and GE2 you can configure redundant interface. You can read about it here:
http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/intrface.html#wp1045838
2. Looking at Sketch 2 whether Link no. 1 (Connecting ASA-1 and Router-2) and Link no. 2 (Connecting ASA-2 and Router-1) is required for best practice HA design? I am seeing all the Design Document shows this Criss cross Link between Routers and Firewall.
No you don't. Refer this link: http://packetlife.net/media/forum/attachments/17/ASA-FO.jpeg
This below link has configuration example of active/standby ASA
http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/ref_examples.html#wp1028629
It appears that you are planning on connecting the failover link using a cross over cable. I'd recommend carving out a separate vlan on the swtich for this purpose and connecting both ASAs to these ports on this separate vlan. The reason being if the NIC was to go bad on one ASA the other ASA's interface will show down down also.
-KS
12-29-2010 03:53 AM
Thanks a lot for your ideas and time
sairam
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide