Configure ASA Active/Active Failover in Firepower 4100 Series (2024)

    Introduction

    This document describes how to configure Active/Active Failover inCisco Firepower 4145 NGFW Appliance.

    Prerequisites

    Requirements

    Cisco recommends that you have knowledge of this topic:

    • Active/Standby failover inCisco Adaptive Security Appliance (ASA).

    Components Used

    The information in this document is based on these software and hardware versions:

    • Cisco Firepower 4145 NGFW Appliance (ASA) 9.18(3)56
    • Firepower eXtensible Operating System (FXOS) 2.12(0.498)
    • Windows 10

    The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.

    Background Information

    Active/Active failover is only available to security appliances that are running in multiple context mode. In this mode, the ASA is logically divided into multiple virtual devices, known as contexts. Each context operates as an independent device, with its own security policy, interfaces, and administrators.

    The Active/Active failover is a feature of Adaptive Security Appliance (ASA) that allows two Firepower devices to pass the traffic simultaneously.This configuration is typically used for a load balancing scenario in which you want to split the traffic between two devices to maximize throughput. It is also used for redundancy purposes, so if one ASA fails, the other can take over without causing a disruption in service.

    Mechanism of ASA Active/Active Failover

    Each context inActive/Active failover is manually assigned to ether group 1 or group 2. The Admin context is assigned to group 1 by default. The same group (group1 or group2) in the two chassis (units) form a failover pair which is realizing the redundancy function. The behavior of each failover pair is basically same as the behavior in a Active/Standby failover. For more details about Active/Standby failover, please refer to Configure Active/Standby Failover. In Active/Active failover, in addition to the Role (Primary or Secondary) of each chassis, each group also has a Role (Primary or Secondary). These Roles are manually pre-set by the user and are used to decide the High Availability (HA) status (Active or Standby) foreach failover group.


    The Admin Context is a special context which is handling basic chassis management (such as SSH) connection. This is a image of Active/Active failover.

    Configure ASA Active/Active Failover in Firepower 4100 Series (1)Failover Pair In Active/Active Failover

    Traffic Flow

    In Active/Active failover, traffic can be handled in the several patterns as shown in the next image.

    Configure ASA Active/Active Failover in Firepower 4100 Series (2)Traffic Flow

    Traffic Flow Condition 1

    • Primary Unit: Group 1 = Active, Group 2 = Standby
    • Secondary Unit: Group 1 = Standby, Group 2 = Active

    Configure ASA Active/Active Failover in Firepower 4100 Series (3)Traffic Flow Condition 1

    Traffic Flow Condition 2

    • Primary Unit: Group 1 = Active, Group 2 = Active
    • Secondary Unit: Group 1 = Standby, Group 2 = Standby

    Configure ASA Active/Active Failover in Firepower 4100 Series (4)Traffic Flow Condition 2

    Traffic Flow Condition 3

    • Primary Unit: Group 1 = Standby, Group 2 = Active
    • Secondary Unit: Group 1 = Active, Group 2 = Standby

    Configure ASA Active/Active Failover in Firepower 4100 Series (5)Traffic Flow Condition 3

    Traffic Flow Condition 4

    • Primary Unit: Group 1 = Standby, Group 2 = Standby
    • Secondary Unit: Group 1 = Active, Group 2 = Active

      Configure ASA Active/Active Failover in Firepower 4100 Series (6)Traffic Flow Condition 4

    Selection Rules for Active/Standby

    In Active/Active failover , the status (active/standby) of each group is determined by these rules:

    • Assume 2 devices are booting up almost at the same time, then one of the units (Primary or Secondary) becomes active firstly.
    • When preempt time passed, the group which have same role inchassis andgroup becomes active.
    • When there is a failover event (such as interface DOWN), the status of the group change in the same way as with Active/Standby failover.
    • The preempt time does not work after doing manually failover.

    This is an example of the status change.

    • Both devices are booting up almost at the same time. Status A
    • Preempt time passed. Status B
    • Primary device failure (Failover is triggered). Status C
    • Preempt time passed since Primary device recoveredfromfailure. Status D
    • Manually trigger failover. Status E

    For details on Failover triggers and Health Monitoring, please refer to Failover Events.

    1. Both devices are booting up almost at the same time.

    Configure ASA Active/Active Failover in Firepower 4100 Series (7)Status A

    2. Preempt time (30s in this document) passed.

    Configure ASA Active/Active Failover in Firepower 4100 Series (8)Status B

    3. Failure (such as Interface Down) occurred ingroup 1 of Primary unit.

    Configure ASA Active/Active Failover in Firepower 4100 Series (9)Status C

    4. Preempt time (30s in this document) passed since group 1 of Primary device recoveried fromfailure.

    Configure ASA Active/Active Failover in Firepower 4100 Series (10)Status D

    5. Manually setting group 2 of Primary Unit toActive.

    Configure ASA Active/Active Failover in Firepower 4100 Series (11)Status E

    Network Diagram

    This document introduce the configuration and verification for Active/Active failover base on this diagram.

    Configure ASA Active/Active Failover in Firepower 4100 Series (12)Logical Configuration Diagram

    Configure ASA Active/Active Failover in Firepower 4100 Series (13)Physical Configuration Diagram

    Configuration

    Step 1. Pre-configure Interfaces

    For both of Firepower, log in FCM GUI. Navigate to Logical Devices > Edit. Add data interface to ASA, as shown in the image.

    Configure ASA Active/Active Failover in Firepower 4100 Series (14)Pre-configure Interfaces

    Step 2. Configuration on Primary Unit

    Connect to the Primary FXOS CLI via SSH or console. Run connect module 1 consoleand connect asa command to enter into ASA CLI.

    a. Configure failover on the Primary unit (run the command in the system context of the Primary unit).

    failover lan unit primaryfailover lan interface fover E1/4failover link fover_link E1/8failover interface ip fover 192.168.240.254 255.255.255.0 standby 192.168.240.253failover interface ip fover_link 192.168.250.254 255.255.255.0 standby 192.168.250.253failover group 1   <--- group 1 is assigned to primary by default preempt 30failover group 2secondarypreempt 30failoverprompt hostname state priority context

    b. Configure failover group for context (runthe command in the system context of the Primary unit).

    admin-context admincontext admin <--- admin context is assigned to group 1 by defaultallocate-interface E1/3config-url disk0:/admin.cfgcontext con1allocate-interface E1/1allocate-interface E1/2config-url disk0:/con1.cfgjoin-failover-group 1 <--- add con1 context to group 1!context con2allocate-interface E1/5allocate-interface E1/6config-url disk0:/con2.cfgjoin-failover-group 2 <--- add con2 context to group 2

    c. Run changeto context con1 to connect con1 context from system context . Configure IP for Interface of the con1 context (runthe command in con1 context of Primary unit).

    interface E1/1nameif con1-insideip address 192.168.10.254 255.255.255.0 standby 192.168.10.253security-level 100no shutdowninterface E1/2nameif con1-outsideip address 192.168.20.254 255.255.255.0 standby 192.168.20.253no shutdown

    d. Run changeto context con2 to connect con2 context from system context . Configure IP for Interface of the con2 context (runthe command in con2 context of Primary unit).

    interface E1/5nameif con2-insideip address 192.168.30.254 255.255.255.0 standby 192.168.30.253security-level 100no shutdowninterface E1/6nameif con2-outsideip address 192.168.40.254 255.255.255.0 standby 192.168.40.253no shutdown

    Step 3. Configuration on Secondary Unit

    a. Connect to the Secondary FXOS CLI via SSH or console. Configure failover on the Secondary unit (runthe command in system context of Secondary unit).

    failover lan unit secondaryfailover lan interface fover E1/4failover link fover_link E1/8failover interface ip fover 192.168.240.254 255.255.255.0 standby 192.168.240.253failover interface ip fover_link 192.168.250.254 255.255.255.0 standby 192.168.250.253

    b.Run failover command (run in system context of Secondary unit).

    failover 

    Step 4. Confirm Failover Status After Synchronization Finished Successfully

    a. Runshow failover in system context of Secondary unit.

    asa# show failover Failover On Failover unit SecondaryFailover LAN Interface: fover Ethernet1/4 (up)Version: Ours 9.18(3)56, Mate 9.18(3)56Serial Number: Ours FCH23157YFY, Mate FCH23037U8RGroup 1 last failover at: 17:00:56 JST Jan 11 2024Group 2 last failover at: 17:00:56 JST Jan 11 2024This host: Secondary    <--- group 1 and group 2 are Standby status in Secondary UnitGroup 1 State: Standby ReadyActive time: 0 (sec)Group 2 State: Standby ReadyActive time: 945 (sec)con1 Interface con1-inside (192.168.10.253): Unknown (Waiting)con1 Interface con1-outside (192.168.20.253): Unknown (Waiting)con2 Interface con2-inside (192.168.30.253): Unknown (Waiting)con2 Interface con2-outside (192.168.40.253): Normal (Waiting)Other host: Primary    <--- group 1 and group 2 are Active status in Primary UnitGroup 1 State: ActiveActive time: 1637 (sec)Group 2 State: ActiveActive time: 93 (sec)con1 Interface con1-inside (192.168.10.254): Normal (Monitored)con1 Interface con1-outside (192.168.20.254): Normal (Monitored)con2 Interface con2-inside (192.168.30.254): Normal (Waiting)con2 Interface con2-outside (192.168.40.254): Normal (Waiting)Stateful Failover Logical Update StatisticsLink : fover_link Ethernet1/8 (up)

    b.(Optional) Run no failover active group 2 command to manually switch group 2 of Primary unit to Standby status (run in system context of Primary unit). This can balance the traffic load through firewall.

    no failover active group 2

    Configure ASA Active/Active Failover in Firepower 4100 Series (15)

    Note: If you run this command, the status of failover match traffic flow condition 1.

    Verify

    When E1/1 goes DOWN, the failover of group 1 is triggered and the data interfaces on the Standby side (Secondary Unit) takes over the IP and MAC address of the original Active Interface, ensuring the traffic (FTP connection in this document) to be continuously passed by ASAs.

    Configure ASA Active/Active Failover in Firepower 4100 Series (16)Before Link DownConfigure ASA Active/Active Failover in Firepower 4100 Series (17)During Link Down

    Configure ASA Active/Active Failover in Firepower 4100 Series (18)Failover Triggered

    Step 1. Initiate FTP Connection From Win10-01 to Win10-02

    Step 2. Confirm FTP Connection Before Failover

    Run changeto context con1 to connect con1 context from system context. Confirm that an FTP connection is established in both ASA units.

    asa/act/pri/con1# show conn5 in use, 11 most used
    ! --- Confirm the connection in Primary UnitTCP con1-outside 192.168.20.1:21 con1-inside 192.168.10.1:49703, idle 0:00:11, bytes 528, flags UIOasa/stby/sec/con1# show conn5 in use, 11 most used
    ! --- Confirm the connection in Secondary UnitTCP con1-outside 192.168.20.1:21 con1-inside 192.168.10.1:49703, idle 0:00:14, bytes 528, flags UIO

    Step 3. LinkDOWN E1/1 of Primary Unit

    Step 4. Confirm Failover Status

    In system context, confirm that failover occurs in group 1.

    Configure ASA Active/Active Failover in Firepower 4100 Series (19)

    Note: The status of failover match traffic flow condition 4.

    asa/act/sec# show failover Failover On Failover unit SecondaryFailover LAN Interface: fover Ethernet1/4 (up)......Group 1 last failover at: 20:00:16 JST Jan 11 2024Group 2 last failover at: 17:02:33 JST Jan 11 2024This host: SecondaryGroup 1 State: Active  <--- group 1 of Secondary Unit is Switching to ActiveActive time: 5 (sec)Group 2 State: ActiveActive time: 10663 (sec)con1 Interface con1-inside (192.168.10.254): Normal (Waiting)con1 Interface con1-outside (192.168.20.254): Normal (Waiting)con2 Interface con2-inside (192.168.30.254): Normal (Monitored)con2 Interface con2-outside (192.168.40.254): Normal (Monitored)Other host: PrimaryGroup 1 State: Failed  <--- group 1 of Primary Unit is Switching to Failed statusActive time: 434 (sec)Group 2 State: Standby ReadyActive time: 117 (sec)con1 Interface con1-inside (192.168.10.253): Failed (Waiting)con1 Interface con1-outside (192.168.20.253): Normal (Waiting)con2 Interface con2-inside (192.168.30.253): Normal (Monitored)con2 Interface con2-outside (192.168.40.253): Normal (Monitored)

    Step 5. Confirm FTP Connection After Failover

    Run changeto context con1 to connect con1 context from system context, confirm that the FTP connection is not interrupted.

    asa/act/sec# changeto context con1asa/act/sec/con1# show conn11 in use, 11 most used
    ! --- Confirm the target FTP connection exists in group 1 of the Secondary UnitTCP con1-outside 192.168.20.1:21 con1-inside 192.168.10.1:49703, idle 0:00:09, bytes 529, flags UIO

    Step 6. Confirm Behavior of Preempt Time

    LinkUP E1/1 of the Primary Unit and wait for 30s (preempt time), the failover state returns to the original state (match traffic flow in pattern 1).

    asa/stby/pri# Group 1 preempt mate    <--- Failover is triggered automatically, after the preempt time has passedasa/act/pri# show failover Failover On Failover unit PrimaryFailover LAN Interface: fover Ethernet1/4 (up)......Group 1 last failover at: 11:02:33 UTC Jan 11 2024Group 2 last failover at: 08:02:45 UTC Jan 11 2024This host: PrimaryGroup 1 State: Active  <--- group 1 of Primary Unit is switching to Active statusActive time: 34 (sec)Group 2 State: Standby ReadyActive time: 117 (sec)con1 Interface con1-inside (192.168.10.254): Normal (Monitored)con1 Interface con1-outside (192.168.20.254): Normal (Monitored)con2 Interface con2-inside (192.168.30.253): Normal (Monitored)con2 Interface con2-outside (192.168.40.253): Normal (Monitored)Other host: SecondaryGroup 1 State: Standby Ready  <---- group 1 of Secondary Unit is switching to Standby statusActive time: 125 (sec)Group 2 State: ActiveActive time: 10816 (sec)con1 Interface con1-inside (192.168.10.253): Normal (Monitored)con1 Interface con1-outside (192.168.20.253): Normal (Monitored)con2 Interface con2-inside (192.168.30.254): Normal (Monitored)con2 Interface con2-outside (192.168.40.254): Normal (Monitored)

    Virtual MAC Address

    In Active/Active failover, virtual MAC address (manually set value, or automatically generated value, or default value) is always used. The active virtual MAC address is associated with the Active Interface.

    Manually Setting of Virtual MAC Address

    In order to set the virtual MAC address for physical interfaces manually, the mac address command or the mac-address command (within I/F setting mode) can be used. This is an example of manually setting a virtual MAC address for the physical Interface E1/1.

    Configure ASA Active/Active Failover in Firepower 4100 Series (20)

    Caution: Please avoid using these two types of commands within same device.

    asa/act/pri(config)# failover group 1asa/act/pri(config-fover-group)# mac address E1/1 1234.1234.0001 1234.1234.0002asa/act/pri(config-fover-group)# changeto context con1asa/act/pri/con1(config)# show interface E1/1 | in MACMAC address 1234.1234.0001, MTU 1500 <--- Checking virtual MAC on the Primary Unit(con1) sideasa/stby/sec# changeto context con1asa/stby/sec/con1# show interface E1/1 | in MACMAC address 1234.1234.0002, MTU 1500<--- Checking virtual MAC on the Secondary Unit(con1) side

    OR

    asa/act/pri(config)# changeto context con1asa/act/pri/con1(config)# int E1/1asa/act/pri/con1(config-if)# mac-addr 1234.1234.0001 standby 1234.1234.0002asa/act/pri/con1(config)# show interface E1/1 | in MACMAC address 1234.1234.0001, MTU 1500 <--- Checking virtual MAC on the Primary Unit(con1) sideasa/stby/sec# changeto context con1asa/stby/sec/con1# show interface E1/1 | in MACMAC address 1234.1234.0002, MTU 1500<--- Checking virtual MAC on the Secondary Unit(con1) side

    Automatically Setting of Virtual MAC Address

    Automatically generating of virtual MAC address is also supported. It can be achieved by using the mac-address auto <prefix prefix> command. The format of virtual MAC address is A2 xx.yyzz.zzzz which is beinggeneratedautomatically.
    A2 : fixed value
    xx.yy : generated by the <prefix prefix> specified in the command option (The prefix is converted to hexadecimal and then inserted by reverse order).
    zz.zzzz : generated by an internal counter

    This is an example about generating virtual MAC address by mac-address auto command for interface.

    asa/act/pri(config)# mac-address auto INFO: Converted to mac-address auto prefix 31asa/act/pri(config)# show run all context con1 <--- Checking the virtual MAC addresses generated on con1 contextallocate-interface Ethernet1/1 mac-address auto Ethernet1/1 a21f.0000.0008 a21f.0000.0009allocate-interface Ethernet1/2 mac-address auto Ethernet1/2 a21f.0000.000a a21f.0000.000bconfig-url disk0:/con1.cfgjoin-failover-group 1asa/act/pri(config)# show run all context con2 <--- Checking the virtual MAC addresses generated on con2 contextcontext con2allocate-interface Ethernet1/5 mac-address auto Ethernet1/5 a21f.0000.000c a21f.0000.000dallocate-interface Ethernet1/6 mac-address auto Ethernet1/6 a21f.0000.000e a21f.0000.000fconfig-url disk0:/con2.cfgjoin-failover-group 2

    Default Setting of Virtual MAC Address

    In case neither automatic nor manual generation of a virtual MAC address is set, the default virtual MAC address is used.

    For more information about default virtual MAC address, please refer to the Command Defaultof mac address in Cisco Secure Firewall ASA Series Command Reference Guide.

    Upgrade

    You can achieve zero downtime upgrade of an Active/Active failover pair using CLI or ASDM. For more information, please refer to Upgrade an Active/Active Failover Pair.

    Related Information

    • Upgrade an Active/Active Failover Pair Using the CLI
    • MAC Address
    Configure ASA Active/Active Failover in Firepower 4100 Series (2024)
    Top Articles
    ARIA8: Using aria-label for link purpose | WAI
    CFPB Issues Final Rule to Reduce Credit Card Late Fees to $8 for Large Credit Card Issuers // Cooley // Global Law Firm
    Funny Roblox Id Codes 2023
    Hotels Near 625 Smith Avenue Nashville Tn 37203
    Kreme Delite Menu
    Loves Employee Pay Stub
    Mountain Dew Bennington Pontoon
    Apnetv.con
    Osrs But Damage
    City Of Spokane Code Enforcement
    Bme Flowchart Psu
    Nichole Monskey
    How Many Slices Are In A Large Pizza? | Number Of Pizzas To Order For Your Next Party
    Craigslist Deming
    The Witcher 3 Wild Hunt: Map of important locations M19
    Hell's Kitchen Valley Center Photos Menu
    Mail.zsthost Change Password
    Cyndaquil Gen 4 Learnset
    Locate At&T Store Near Me
    Daylight Matt And Kim Lyrics
    Epguides Strange New Worlds
    Lakers Game Summary
    Bekijk ons gevarieerde aanbod occasions in Oss.
    Diakimeko Leaks
    Mj Nails Derby Ct
    Turbo Tenant Renter Login
    Democrat And Chronicle Obituaries For This Week
    Core Relief Texas
    Town South Swim Club
    Craigslist Middletown Ohio
    Ugly Daughter From Grown Ups
    Sam's Club Near Wisconsin Dells
    Kempsville Recreation Center Pool Schedule
    Used 2 Seater Go Karts
    The Hoplite Revolution and the Rise of the Polis
    Roch Hodech Nissan 2023
    9781644854013
    Uc Santa Cruz Events
    Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
    Metro Pcs Forest City Iowa
    Home Auctions - Real Estate Auctions
    A jovem que batizou lei após ser sequestrada por 'amigo virtual'
    York Racecourse | Racecourses.net
    The 13 best home gym equipment and machines of 2023
    Washington Craigslist Housing
    SF bay area cars & trucks "chevrolet 50" - craigslist
    Julies Freebies Instant Win
    sin city jili
    Escape From Tarkov Supply Plans Therapist Quest Guide
    Ihop Deliver
    Latest Posts
    Article information

    Author: Fr. Dewey Fisher

    Last Updated:

    Views: 6062

    Rating: 4.1 / 5 (42 voted)

    Reviews: 81% of readers found this page helpful

    Author information

    Name: Fr. Dewey Fisher

    Birthday: 1993-03-26

    Address: 917 Hyun Views, Rogahnmouth, KY 91013-8827

    Phone: +5938540192553

    Job: Administration Developer

    Hobby: Embroidery, Horseback riding, Juggling, Urban exploration, Skiing, Cycling, Handball

    Introduction: My name is Fr. Dewey Fisher, I am a powerful, open, faithful, combative, spotless, faithful, fair person who loves writing and wants to share my knowledge and understanding with you.