设为首页 收藏本站
查看: 678|回复: 0

[经验分享] Cisco ASA Failover off and Recovery

[复制链接]

尚未签到

发表于 2018-7-12 11:40:36 | 显示全部楼层 |阅读模式
  Cisco ASA Troubleshooting Failover When Failover Is Off
  Sometimes two firewalls will be in failover pair but for some reason one or both will turn failover off. What happens to the firewalls in this situation? Do both go active? Does one stay in standby? Great questions!
  Reasons for failover to turn off on its own
  The ASA may suddenly turn failover off. That is, the command ‘no failover’ will be executed automatically in some situations. Here are some example situations when that may happen:
  ·   If the licenses do not match
  ·   If the modules do not match
  It’s not clear what else will cause this since Cisco just documents what is required for failover to work. They don’t explain what will happen if you don’t meet those requirements. Will failover just fail or will the commands be removed?
  Sample message when the license does not match and failover is turned off.
  Mate's license (AnyConnect for Cisco *** Phone Enabled) is not compatible with my license
  (AnyConnect for Cisco *** Phone Disabled). Failover will be disabled.
  What will happen when failover is turned off
  If you have a failover pair that is working correctly and you turn failover off ‘no failover’ on the active unit, the failover link will stop sending packets between the two firewalls. However, the states will stay the same. The active unit will remain active and the standby unit will remain in standby state. The standby unit will continue to be standby until a failover event takes place.
  Checking the state of failover when failover is turned off
  If the firewall has failover commands and a history of being in a pair it can still have a state of being active or standby. There are two ways to check this.
  The first way to check is to change the prompt. Go into config mode and do prompt hostname priority state (must be done from system context in a multi context firewall). This will change the prompt to look something like this:
  Active: UK-ASA/sec/actNoFailover#
  Standby: UK-ASA/pri/stbyNoFailover#
  Notice in the prompt it indicates whether the device is active or standby even with failover turned off.
  The second method is to do the command show failover. This will give the following results:
  Active: Failover Off
  Standby: Failover Off (pseudo-Standby)
  What does it mean if the firewall is in pseudo-standby
  Pseudo-standby means that failover is turned off but this firewall is still in standby mode. This means the firewall will take the standby IP addresses of all interfaces. So if an interface has a configuration like this:
  interface GigabitEthernet0/3
  ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2

  Then the pseudo-standby ASA will have the IP of 192.168.1.2. You can check this by doing show ip and looking at the second section>  Conducting a failover event even with failover off
  It’s possible to switch the state of a firewall even when failover is turned off. Doing this is the same as doing it when it is turned on. The commands are:
  no failover active will put the firewall in a standby state
  failover active will put the firewall in an active state
  If failover is turned off and the standby unit reboots it will come back as active.
  MAC address problems
  In the following scenario there will be duplicate MAC addresses. Suppose there is a failover pair and the secondary unit is active when failover is turned off. This means the secondary unit has the MAC of the primary firewall and the primary has the mac of the secondary firewall. If the secondary unit reboots it will have no memory of what the MAC was for the primary unit and use it’s own MAC address. This means that now both firewalls are using the same MAC address.
  To fix this simply give one firewall a unique MAC to use. Do this by setting the MAC on the interface like this:
  interface GigabitEthernet0/3
  mac-address 001c.59d3.f79b standby 001c.59d3.f77c
  If the firewall is active it will use the first MAC and if the firewall is pseudo-standby it will use the second MAC.
  Turning failover back on

  Upon bringing the two firewalls back into the failover group again it’s important to do it in a deliberate way. You want the correct ASA and configuration to act as active and sync the config to the standby unit. You do not want a perhaps outdated config on an old ASA to push it’s config to the ASA which has the newer config. You also don’t want to trigger an unexpected>  Snippet from Cisco website:
  Configuration synchronization occurs when one or both devices in the failover pair boot. Configurations are always synchronized from the active unit to the standby unit. When the standby unit completes its initial startup, it clears its running configuration (except for the failover commands needed to communicate with the active unit), and the active unit sends its entire configuration to the standby unit.
  The active unit is determined by the following:
  ·   If a unit boots and detects a peer already running as active, it becomes the standby unit.
  ·   If a unit boots and does not detect a peer, it becomes the active unit.
  ·   If both units boot simultaneously, then the primary unit becomes the active unit, and the secondary unit becomes the standby unit.

  If we have access to both firewalls then>

  • On the one you want to be standby, verify it is in pseudo-standby mode and turn failover off no failover.
  • Verify no MAC address conflicts will take place.
  • Connect any cables that need to be connected to the firewalls (failover, outside, inside, etc).
  • On the one you want to be active, verify it is in active mode and then enable failover.
  • Check the active unit by doing show failover to verify it’s not failed. If it’s in a failed state troubleshoot as needed to make it not failed.
  • On the standby unit enable failover.
  Another way to force a unit to be standby during rejoining is to disconnect a cable or shutdown a monitored interface on the standby unit. This should make the unit in a failed state and therefor not try to become active.

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-536474-1-1.html 上篇帖子: 3A技术的介绍以及CISCO路由器上相关配置 下篇帖子: Cisco IOS Cookbook 中文精简版(330页整理版)
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表