03-13-2013 01:31 AM - edited 03-11-2019 06:13 PM
My question is as simple as the title!
Let me know.
Regards!
03-13-2013 03:32 AM
with active-standby setup, yes ALL vpn types are supported. however, with Active-Active, you must have your ASA in multiple-context mode, VPN is not supported with multi context mode, however, starting ASA version 9.0, only Site to Site VPN is supported with multi-context mode.
03-13-2013 03:32 AM
As of ASA 9.0 you can have static l2l VPN in multicontext-mode.
In single context we've been supporting different VPNs for years.
03-13-2013 04:39 AM
does it mean that you still have separate HSRP group for l2l vpn in Active/Active? In other words, traffics from the same source going to the same destination will traverse only one ASA and that the other ASA will serve as standby?
03-13-2013 05:20 AM
i am not sure i understood your question properly David.
with active active failover, the ASA will be configured with more than one context (usually), and failover status will be according to the failover-group, so certain contexts will be active on ASA1 standby on ASA2, while the other contexts will be active on ASA2 and standby on ASA1.
so at the end, each context is considered a firewall on its own, non related to other contexts.
so starting version 9.0.1, you can configure static L2L tunnels on each context as needed.
i hope that this answers your question, if not, please provide more details
Regards,
Othman
03-13-2013 05:29 AM
in Cisco ASA active/active firewalls, let say you have two network 192.168.1.0/24 and 191.268.2.0/24 behind the firewall trying to get to 1.1.1.1
Active/Active in Cisco ASA means that 192.168.1.0/24 will go through ASA1 and 192.168.2.0/24 will go through ASA2 to get to 1.1.1.1. It is like multiple HSRP group where ASA1 will be active for group 1 and ASA2 is standby for group 1 while ASA2 is active for group2 and ASA1 is standby for group2.
That is different than Active/Active than other vendors. When Active/Active, you can have the same 192.168.1.0/24 going across both firewall for the same destination 1.1.1.1
That's what I mean.
03-13-2013 05:37 AM
to simplify it, each context will act as a separate firewall, and for a certain failover group, the context will be active on ASA1 and standby on ASA2, so traffic for the subnets behind that context will pass through the active firewall, not the standby.
traffic will not pass through both firewalls for the same context, its not actuall loadbalancing here, but more of load distribution between the 2 ASA units.
03-13-2013 05:41 AM
Thank you for the clarification. That's what I am afraid of. Cisco interpretation of "Active/Active" is not the same as other vendors. IMHO, it is mis-leasding. Basically, it has not changed since version 7.x
it is all in the fine print, not those big words
03-13-2013 06:02 AM
it is actually active/active...since 1 device is active for a certain group of contexts, and the other device is active for the other group of contexts.
its like instead of having 10 contexts passing traffic on 1 device, you have 5 contexts passing traffic on ASA1 and the other 5 on ASA2, so it is achieveing reasonable load sharing so you not overwhelm 1 device with all that amount of traffic.
and you are correct, it is still the same concept as it was in version 7.x
03-13-2013 06:39 AM
it is active/active per virtual context but certain not active/active within a particular context.
I will give you an example. let say you have 192.168.1.0/24 and 192.168.2.0/24 and for the sake of the argument, you have 100Mbps on both ASA1 and ASA2 and that the network 192.168.1.0/24 and 192.168.2.0/24 is 1Gbps link.
Now let say that 192.168.1.0/24 needs to access 1.1.1.1 and ASA1 is active for .1.0/24 and ASA2 and standby for .1.0/24 and vice versa for .2.0/24. let assume that there are very little traffics on network 192.168.2.0/24.
based on cisco definition of active/active, you will max out @100Mbps on 192.168.1.0/24 getting to 1.1.1.1 on ASA1 while ASA2 is just sitting idle. For a true active/active, I should get 200Mbps.
that's why I said "Active/Active" in Cisco is kinda mis-leading... That's why you need to read the fine print
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide