1 / 36

Quick Start Guide ASA Cluster on Nexus

Quick Start Guide ASA Cluster on Nexus . Architecture & Solutions Group US Public Sector Advanced Services Mark Stinnette, CCIE Data Center #39151. Date 20 August 2013 Version 1.6.2.

joella
Download Presentation

Quick Start Guide ASA Cluster on Nexus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quick Start GuideASA Cluster on Nexus Architecture & Solutions Group US Public Sector Advanced Services Mark Stinnette, CCIE Data Center #39151 Date 20 August 2013 Version 1.6.2

  2. This Quick Start Guide (QSG) is a Cookbook style guide to Deploying Data Center technologies with end-to-end configurations for several commonly deployed architectures. This presentation will provide end-to-end configurations mapped directly to commonly deployed data center architecture topologies. In this cookbook style; quick start guide; configurations are broken down in an animated step by step process to a complete end-to-end good clean configuration based on Cisco best practices and strong recommendations. Each QSG will contain set the stage content, technology component definitions, recommended best practices, and more importantly different scenario data center topologies mapped directly to complete end-to-end configurations. This QSG is geared for network engineers, network operators, and data center architects to allow them to quickly and effectively deploy these technologies in their data center infrastructure based on proven commonly deployed designs.

  3. Commonly Deployed Firewall Designs :: Standalone with Failover ASA Cluster Configuration • Cisco recommended • Commonly deployed & Typical firewall attachment model • ASA configured for port channels connected via vPC or vPC+ • External and Internal traffic traverse same port channel to firewall • Insertion point at the Aggregation layer (Nexus 7000) • 10GE interfaces Animation • Altered ASA design topology • ASA configured for port channels connected via vPC or vPC+ • Physical interface isolation for external and internal traffic • External traffic traverse dedicated port channel to firewall • Internal traffic traverse dedicated port channel to firewall • Insertion point at the Aggregation layer (Nexus 7000) • 10GE interfaces • Altered ASA design topology • ASA VDC (Virtual Device Context) sandwich • ASA physically inline • ASA configured for port channels connected via vPC or vPC+ • Physical interface isolation for external and internal traffic • External traffic traverse dedicated port channel to firewall • Internal traffic traverse dedicated port channel to firewall • Insertion point at the Aggregation layer (Nexus 7000) • External firewall port channel connected to Aggregation (VDC) • Internal firewall port channel connected to Sub-Aggregation (VDC) • Uses more 10GE interfaces; less effective firewall bandwidth usage

  4. Commonly Deployed Firewall Designs :: Cluster Mode ASA Cluster Configuration • Cisco recommended :: ASA Cluster design • Scaling ASA appliances into one logical firewall within the DC architecture • Typical firewall cluster attachment model • ASA configured for port channels connected via vPC or vPC+ • External and Internal traffic traverse same cluster data port channel to firewall • Insertion point at the Aggregation layer (Nexus 7000) • 10GE interfaces • Cluster two or more (up to 8) ASA firewalls • Greatly increase the throughput of traffic (up to 100Gbps) • True active-active model; in multi-context mode every member interface for all contexts are capable of forwarding every traffic flow Same firewall Illustrated Animation Alternative View Cluster up to 8 ASA firewalls • ASA 5580 • ASA 5585-X

  5. Firewall Logical Deployment Modes ASA Cluster Configuration Animation

  6. Firewall Routing Considerations ASA Cluster Configuration Animation Static Routing Dynamic Routing No dynamic routing supported over vPC or vPC+

  7. Firewall Logical Security Models :: Multi-Tenancy Infrastructure ASA Cluster Configuration • Simple Tenant Container • Single Tier model • FW Context  VRF  VLAN mapping Animation • High Security Use Cases • N-Tier Application Segmentation • Single FW Context instance • Multiple VRFs to VLAN mappings • Enterprise-Class Data Center • Service Provider / Cloud • Zone Based • Shared Multi-Tenant Context • Single FW Context and VRF instance • Multiple VLANs per Zone

  8. Firewall Logical Security Models :: Multi-Tenancy Infrastructure ASA Cluster Configuration • Tenant Containers • Private • Public • Shared Services DMZ • N-Tier Application Segmentation • Rigorous Separation • High Security Use Cases • DoD/ Federal Government • Dedicated VRF per Tier • Tenants mapped to unique firewall context Unique Tenant Based Containers Zone Based Containers • Service Provider / Cloud • Enterprise-Class Data Center • Zone Containers • Organization • Departments • Prod, Stage, Dev, Test • Classification Types • Application Type (Ent Apps, DB, BigData, VDI) • Zones mapped to firewall context • Share the same Security Zone Container • Optionally, virtual firewalls can be applied if additional zoning is required within the containers (ie. VSG & ASA 1000v)

  9. Benefits Overview ASA Cluster Configuration The adaptation of an enterprise-wide security framework is a crucial part of the overall enterprise network architecture. Within the data center new application rollouts, virtualization, the adaptation of various cloud services and an increasingly transparent perimeter are creating radical shifts in the data center security requirements. The need for stackable scalable high capacity firewalls at the data center perimeter is becoming essential. Adaptive Security Appliance (ASA) clustering feature on the ASA family of firewalls satisfies such a requirement. The clustering feature allows for an efficient way to scale up the throughput of a group of ASAs, by having them all work in concert to pass connections as one logical ASA device. Using up to 8 ASA appliances, the clustering feature allows the scaling of up to 100Gbps of aggregate throughput within the data center perimeter. ASA Clustering provides the following benefits: • The ability to aggregate traffic to achieve higher throughput • Scaling the number of ASA appliances into one logical firewall within the Data Center architecture • True Active / Active model; when in multi-context mode every member for all contexts of the cluster are capable of forwarding every traffic flow • Can force state-full flows to take more symmetrical path which improves predictability and session consistency • Can operate in either Layer 2 and Layer 3 modes • Supports single and multiple contexts (firewall virtualization) • (In Theory) Clustering can be implemented across different data centers over dark fibre as the means of transport. This use case should be validated and supported in future releases • Cluster-wide statistics are provided to track resource usage • A single configuration is maintained across all units in the cluster using automatic configuration sync

  10. Terminology & Components ASA Cluster Configuration CL Master CL Slave CL Slave CL Slave ASA Cluster (n-node) Same Port Channel ID used across all ASA units in the Cluster for the Data Links towards the Nexus Aggregation Po100 Po100 Po100 Po100 cLACP Spanned Port Channel Nexus vPC Same single vPC ID for all ASA units in the Cluster Animation vPC 100 vPC Domain (vPC or vPC+ supported) Cluster Data Plane Peer-Link Cluster Control Plane Unique vPC IDs used on the Nexus Aggregation layer towards each ASA unit for the CCL vPC 30 vPC 40 vPC 10 vPC 20 Same Port Channel ID used across all ASA units in the Cluster for CCL towards the Nexus Aggregation layer Po50 Po50 Po50 Po50 CL Master CL Slave CL Slave CL Slave

  11. Additional Features, Terminology, & Components ASA Cluster Configuration

  12. Additional Features, Terminology, & Components ASA Cluster Configuration

  13. Additional Features, Terminology, & Components ASA Cluster Configuration

  14. Additional Features, Terminology, & Components ASA Cluster Configuration

  15. Quick Start Guide Assumptions ASA Cluster Configuration Physical View – Connectivity Map • ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannel mode • Nexus Characteristics • 2-wide 7k Aggregation • FabricPath vPC+ • Static Routing & VRFs Each ASA has two 10GE interfaces connected to each respective Nexus 7K representing the data plane for the cluster. This is a spanned port-channel (recommended) across the ASA cluster in a single vPC. This is called the Cluster Data Link. Each ASA has two 10GE interfaces in a local port channel (not spanned or shared across the cluster) called the Cluster Control Link (CCL). The CCL is the same on each ASA and will connect to the Nexus 7k via a unique vPC; since these are individual port channels and specific to each ASA.

  16. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannel mode Prep for ASA Attachment :: vPC (Option) ASA Cluster Configuration feature lacp feature vpc vlan 10-20, 2000 – 2999 spanning-tree pathcost method long spanning-tree port type edge bpduguard default spanning-tree port type edge bpdufilter default no spanning-tree loopguard default spanning-tree vlan 10-20,2000-2999 priority 0 spanning-tree pseudo-information vlan 10-20,2000-2999 root priority 4096 vlan 10-15,2000-2499 designated priority 8192 vlan 16-20,2500-2999 designated priority 16384 vpc domain 1 role priority 1 system-priority 4096 peer-keepalive destination [….] source [….] vrf management peer-switch peer-gateway auto-recovery auto-recovery reload-delay delay restore 30 iparp synchronize interface port-channel 2 switchport switchport mode trunk switchport trunk allowed vlan 10-20,2000-2999 spanning-tree port type network vpc peer-link interface e3/1 , e4/1 channel-group 2 force mode active feature lacp feature vpc vlan 10-20, 2000 – 2999 spanning-tree pathcost method long spanning-tree port type edge bpduguard default spanning-tree port type edge bpdufilter default no spanning-tree loopguard default spanning-tree vlan 10-20, 2000-2999 priority 0 spanning-tree pseudo-information vlan 10-20,2000-2999 root priority 4096 vlan 10-15,2000-2499 designated priority 16384 vlan 16-20,2500-2999 designated priority 8192 vpc domain 1 role priority 2 system-priority 4096 peer-keepalive destination [….] source [….] vrf management peer-switch peer-gateway auto-recovery auto-recovery reload-delay delay restore 30 iparp synchronize interface port-channel 2 switchport switchport mode trunk switchport trunk allowed vlan 10-20,2000-2999 spanning-tree port type network vpc peer-link interface e3/1 , e4/1 channel-group 2 force mode active See QSG :: vPC for more details …

  17. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannel mode Prep for ASA Attachment :: FabricPath vPC+ (Option) ASA Cluster Configuration feature lacp feature vpc install feature-set fabricpath feature-set fabricpath vlan 10-20, 2000 – 2999 mode fabricpath fabricpath switch-id 10 fabricpath domain default root-priority 255 spanning-tree pseudo-information vlan 10-20,2000-2999 root priority 0 vpc domain 1 role priority 1 system-priority 4096 peer-keepalive destination [….] source [….] vrf management peer-gateway auto-recovery auto-recovery reload-delay delay restore 30 iparpsynchronize fabricpathswitch-id 1000 interface port-channel 2 switchportmode fabricpath vpcpeer-link interface e3/1 , e4/1 channel-group 2 force mode active feature lacp feature vpc install feature-set fabricpath feature-set fabricpath vlan 10-20, 2000 – 2999 mode fabricpath fabricpath switch-id 11 fabricpath domain default root-priority 254 spanning-tree pseudo-information vlan 10-20,2000-2999 root priority 0 vpc domain 1 role priority 2 system-priority 4096 peer-keepalive destination [….] source [….] vrf management peer-gateway auto-recovery auto-recovery reload-delay delay restore 30 iparp synchronize fabricpath switch-id 1000 interface port-channel 2 switchport mode fabricpath vpc peer-link interface e3/1 , e4/1 channel-group 2 force mode active See QSG :: FabricPath for more details …

  18. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannel mode Initial Firewall Configuration & Verification Checks ASA Cluster Configuration mode multiple no firewall transparent ------------------------------------------------------ show activation-key Serial Number: JMX1232L11M ... Security Contexts : 10 perpetual Cluster : Disabled perpetual … activation-key ab42d738 a03b23fc 1bd3c87e d4d4c6d4 4e99ecbb show activation-key Serial Number: JMX1232L11M ... Security Contexts : 10 perpetual Cluster : Enabledperpetual … port-channel load-balance src-dst ip-l4port mode multiple no firewall transparent ------------------------------------------------------ show activation-key Serial Number: JMX1232L11M ... Security Contexts : 10 perpetual Cluster : Disabled perpetual … activation-key ab42d738 a03b23fc 1bd3c87e d4d4c6d4 4e99ecbb show activation-key Serial Number: JMX1232L11M ... Security Contexts : 10 perpetual Cluster : Enabled perpetual … port-channel load-balance src-dst ip-l4port Animation Step 1 :: enable multi-context mode Step 2 :: validate firewall status is routed Step 3 :: install | validate Cluster license Step 4 :: configure ECLB Perform the configuration steps on the console port of each ASA. Verify the firewall status as routed. If not routed, execute the no firewall transparent command. ciscoasa(config)# show firewall Firewall mode: Router The clustering feature requires a specific license and code version 9.0.1 or greater. If you don’t have the proper license installed, refer to the “Managing Feature Licenses for Cisco ASA version 9.0” guide. http://www.cisco.com/en/US/docs/security/asa/asa90/license/license_management/license.html Traffic being load-balanced through ECLB :: it is important to choose a hash algorithm that is "symmetric," meaning that packets from both directions will have the same hash, and will be sent to the same ASA in the spanned Ether Channel. The hashing value selected should match between the aggregation switches and ASA, if possible. Enabling multi-context mode will force a reload; perform this on all the ASAs.

  19. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannelmode Cluster Control Link ASA Cluster Configuration • [system context] • cluster interface-mode spanned • interface Port-channel 40 • description Clustering Interface • port-channel load-balance src-dst ip-l4port • interface TenGigabitEthernet 0/8, 0/9 • channel-group 40 mode active • no nameif • no security-level • cluster group ASA-CLUSTER • key Cisc0! • local-unit ASA-1 • cluster-interface Port-channel40 ip 192.168.1.1 • 255.255.255.0 • priority 1 • console-replicate • health-check holdtime 3 • clacp system-mac auto system-priority 1 • enable • [system context] • cluster interface-mode spanned • interface Port-channel 40 • description Clustering Interface • port-channel load-balance src-dstip-l4port • interface TenGigabitEthernet0/8, 0/9 • channel-group 40 mode active • no nameif • no security-level • cluster group ASA-CLUSTER • key Cisc0! • local-unit ASA-2 • cluster-interface Port-channel40 ip 192.168.1.2 • 255.255.255.0 • priority 2 • enable Perform the configuration steps on the console port of each ASA. master vPC 41 vPC 42 Animation Step 1 :: configure cluster interface type Step 2 :: configure CCL local port channels Step 3 :: enable clustering interface port-channel 41 switchport switchport access vlan 10 spanning-tree port type edge no lacp graceful-convergence vpc41 interface port-channel 42 switchport switchport access vlan 10 spanning-tree port type edge no lacp graceful-convergence vpc42 interface port-channel 41 switchport switchportaccess vlan 10 spanning-tree port type edge no lacp graceful-convergence vpc 41 interface port-channel 42 switchport switchport access vlan 10 spanning-tree port type edge no lacp graceful-convergence vpc42 interface e1/1 channel-group 41force mode active interface e1/2 channel-group 42force mode active vlan 10 mode fabricpath name CLUSTER-CLL interface e1/1 channel-group 41force mode active interface e1/2 channel-group 42force mode active vlan 10 mode fabricpath name CLUSTER-CLL

  20. NOTES Cluster Control Link ASA Cluster Configuration • [system context] • cluster interface-mode spanned • interface Port-channel 40 • description Clustering Interface • port-channel load-balance src-dstip-l4port • interface TE 0/8, 0/9 • channel-group 40 mode active • no nameif • no security-level • cluster group ASA-CLUSTER • key Cisc0! • local-unit ASA-1 • cluster-interface Port-channel40 ip 192.168.1.1 • 255.255.255.0 • priority 1 • console-replicate • health-check holdtime 3 • clacp system-mac auto system-priority 1 • enable Recommend you use a Ten Gigabit Ethernet interface for the cluster control link. The recommended method is to use a spanned Ether Channel. When configured, if it detects any incompatibilities, it will clear them from the configuration and force a reload. This needs to be executed on each unit. Each ASA communicates with each other across this common Vlan to form the cluster, update state information and pass data (when necessary). The port channel configurations for 41, 42 on aggregation switch N7k-1 map to port-channel 40 on each ASA. The aggregation switch N7k-2 is configured the same with the only difference is that it physically connects to a different port (0/8) on each ASA. It is recommended to configure spanning-tree port type edge for the port-channels. Port channel 40 is configured on each ASA and maps to 41, 42 on each N7k. The CCL interface configuration is not replicated from the master unit to slave units; however, you must use the same configuration on each unit. Ports te0/8 and te0/9 will be used for the CCL port-channel on each unit. The ASA is actively negotiating LACP on the channel. This is another best practice; make sure all interfaces participating in channeling are actively using LACP. Also note there is no nameif or security-level configuration on the physical interfaces or the logical interface since this is being used for clustering control plane only. All members of the cluster must share the same cluster group name and key if configured. The local-unit name, cluster-interface IP address and priority value needs to be unique for each unit in the cluster. The cluster master unit is determined by the priority setting, between 1 and 100, where 1 is the highest priority. ‘Enable’ command at the end of cluster configuration will start the cluster mode. interface port-channel 41 switchport switchportaccess vlan 10 spanning-tree port type edge no lacp graceful-convergence vpc 41 interface port-channel 42 switchport switchport access vlan 10 spanning-tree port type edge no lacp graceful-convergence vpc42 Console-replicate is an optional command that allows slave units to replicate console messages to the master. Since we spend most of our time on the master for configuration and troubleshooting purposes. interface e1/1 channel-group 41force mode active interface e1/2 channel-group 42force mode active vlan 10 mode fabricpath name CLUSTER-CLL Step 1 :: configure cluster interface type Step 2 :: configure CCL local port channels Step 3 :: enable clustering

  21. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannelmode Cluster Control Link & MTU ASA Cluster Configuration Perform the configuration steps on the console port of each ASA. [system context] mtu cluster 9216 jumbo-frame reservation [system context] mtu cluster 9216 jumbo-frame reservation vlan 10 mode fabricpath name CLUSTER-CLL interface port-channel 41 switchport switchportaccess vlan 10 spanning-tree port type edge mtu 9216 no lacp graceful-convergence vpc 41 interface port-channel 42 switchport switchport access vlan 10 spanning-tree port type edge mtu 9216 no lacp graceful-convergence vpc42 interface e1/1 channel-group 41 force mode active mtu 9216 interface e1/2 channel-group 42 force mode active mtu 9216 vlan 10 mode fabricpath name CLUSTER-CLL interface port-channel 41 switchport switchport access vlan 10 spanning-tree port type edge mtu 9216 no lacp graceful-convergence vpc41 interface port-channel 42 switchport switchport access vlan 10 spanning-tree port type edge mtu 9216 no lacp graceful-convergence vpc42 interface e1/1 channel-group 41 force mode active mtu 9216 interface e1/2 channel-group 42 force mode active mtu 9216 Animation Step 1 :: enable mtu cluster [system context] Step 2 :: enable jumbo frame reservation [system context] Step 2 :: enable jumbo frame on the Nexus aggregation It is recommended to enable jumbo frame reservation and mtu cluster at least to1600 for the use with the cluster control link. When a packet is forwarded over cluster control link an additional trailer will be added, which could cause fragmentation. Set this to 9216 to match the system jumbo frame size configured on the N7k. Configure this on the master system context, save the config and then reboot the cluster. A reboot is required to enable jumbo frames on the ASA.

  22. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannelmode Cluster Control Link & Management Access ASA Cluster Configuration Perform the configuration steps on the console port of each ASA. [system context] interface Management0/0 admin-context admin context admin allocate-interface Management0/0 config-urldisk0:/admin.cfg --------------------------------------------------------------- [admin context] iplocal pool mgmt10.0.0.201-10.0.0.207 mask 255.255.255.0 interface Management0/0 management-only nameifmgmt security-level 100 ipaddress 10.0.0.200 255.255.255.0 cluster-pool mgmt route mgmt 0.0.0.0 0.0.0.0 10.0.0.1 1 --------------------------------------------------------------- [system context] prompt hostname context cluster-unit master Animation Step 1 :: allocate management interface [system context] Step 2 :: configure cluster management [admin context] Step 3 :: configure cluster host name prompt (optional) [system context] In the system context allocate the management interface(0/0) to the admin context. The management interface is configured with a primary IP address, along with a pool of addresses. The primary management IP address always belongs to the current master unit, while the pool addresses are used to connect to each unit individually. Each unit, including the master gets a pool address assigned. You can connect to the master through either address, but if a failover should occur, the primary address will move to the new master. In the admin context configure the management IP addresses. Display the pool IP addresses :: show ip local pool mgmt

  23. ASA Characteristics • 2-wide ASA cluster • routed mode w/ static routing • multi-context • cluster spanned etherchannelmode Cluster Data Link ASA Cluster Configuration [system context] interface Port-channel26 description Data Spanned Port-channel port-channel load-balance src-dst ip-l4port port-channel span-cluster vss-load-balance interface TenGigabitEthernet 0/6 description Data Link to N7k-2 channel-group 26 mode active vss-id 1 interface TenGigabitEthernet 0/7 description Data Link to N7k-1 channel-group 26 mode active vss-id 2 The N7k aggregation pair data port-channel is configured as a single vPC for all ASA units in the cluster. The vPC is configured as a trunk on the N7ks and as sub-interfaces on the ASA units. master The spanned data port-channel is configured in the ‘system context’. These port channels are shared across all ASA units and act as a single bundle. The N7k aggregation switches see this as a single port-channel, each having 4interfaces configured. The vss-id x command is used to identify the specific switch in the aggregation pair it connects to The port-channel span-cluster vss-load-balance enables spanning. Together these commands form the spanned Ether Channel. A spanned Ether Channel requires active LACP negotiation to be configured. vPC 26 Animation feature lacp feature vpc interface port-channel 26 switchport switchportmode trunk switchport trunk allowed vlan 51, 2011-2012 spanning-tree port type edge trunk no lacp graceful-convergence vpc26 interface e1/4, e1/5 lacp rate fast channel-group 26force mode active feature lacp feature vpc interface port-channel 26 switchport switchport mode trunk switchport trunk allowed vlan 51, 2011-2012 spanning-tree port type edge trunk no lacp graceful-convergence vpc 26 interface e1/4, e1/5 lacp rate fast channel-group 26 force mode active • It is recommended to configure the following for the best link aggregation and convergence:: • lacprate fast • no lacp graceful-convergence • spanning-tree port type edge trunk Step 1 :: configure Nexus aggregation port channels Step 2 :: configure spanned data port channel

  24. Simple Tenant Container ASA Cluster Configuration Logical Firewall Security Model Animation Now we have the network infrastructure built; lets configure a simple but yet flexible tenant container. Route summarization and static redistribution is used to advertise tenancy subnets into the Core or WAN Edge layer using OSPF. This will allow flexibility when adding additional server VLANs in any tenant without making any changes to static routes and routing at the aggregation layer. Since gateways for all VLANs within the VRF are at the aggregation layer, all interfaces are directly connected. No routing protocol is required to distribute routes within a given VRF. Security Container • Nexus Characteristics • 1 VRF [internal private zone] • 3 VLANs • 3 HSRP Groups • [Outside, Inside, Server] • ASA Context Characteristics • Single Tiered Private Zone • 1 outside VLAN • 1 inside VLAN

  25. Simple Tenant Container ASA Cluster Configuration master Logical Firewall Security Model [system context] interface Port-channel26 description Data Spanned Port-channel port-channel load-balance src-dst ip-l4port port-channel span-cluster vss-load-balance interface TenGigabitEthernet 0/6 channel-group 26 mode active vss-id 1 interface TenGigabitEthernet 0/7 channel-group 26 mode active vss-id 2 interface Port-channel26.51 vlan 51 interface Port-channel26.2011 vlan 2011 interface Port-channel26.2012 vlan 2012 context Tenant_Zone_1 description Tenant Zone 1 FW Context allocate-interface Port-channel26.51 allocate-interface Port-channel26.2011 allocate-interface Port-channel26.2012 config-urldisk0:/Tenant_Zone_1.cfg [Tenant_Zone_1 context] Hostname Tenant_Zone_1 interface Port-channel26.51 description Mgmt Vlan management-only nameifmgmt security-level 0 ip address 200.1.51.2 255.255.255.0 interface Port-channel26.2011 description Tenant Zone 1 OUTSIDE Vlan nameif outside security-level 10 ip address 200.1.1.11 255.255.255.0 interface Port-channel26.2012 description Tenant Zone 1 INSIDE Vlan nameif inside security-level 100 ip address 200.1.2.11 255.255.255.0 route outside 0.0.0.0 0.0.0.0 200.1.1.253 1 route inside 200.1.3.0255.255.255.0 200.1.2.253 1 Animation Step 1 :: create sub-interfaces Step 2 :: create virtual firewall context Step 3 :: allocate sub-interfaces to context Step 4 :: configure context interfaces Step 5 :: configure context default route Step 6 :: configure context static route(s) to servers vlans The data port-channel is configured as sub-interfaces and allocated to the proper Tenant Zone context as required. The context has a default route to the outside interface (N7k aggregation), Followed by the security information which is configured for each context(sub-set shown here). Port-channel26.51 is used for inbandmanagement (in this example) while more specific routes are used to reach servers through the inside interface; those routes use the HSRP address as the gateway IP (N7k aggregation). access-list inside-in extended permit ip any any access-list outside-in extended permit ip any any access-group outside-in in interface outside access-group inside-in in interface inside

  26. Simple Tenant Container ASA Cluster Configuration Logical Firewall Security Model [N7k-1] iproute 200.1.3.0/24 200.1.1.11 interface Vlan2011 description Tenant Zone 1 OUTSIDE Vlan mtu9216 no ip redirects ipaddress 200.1.1.251/24 hsrp1 ip200.1.1.253 ip prefix-list static2ospfPfx seq 10 permit 200.0.0.0/10 le 24 route-map direct2ospf permit 10 match ip address prefix-list static2ospfPfx router ospf 1 router-id [x.x.x.x] redistribute static route-map direct2ospf [N7k-2] ip route 200.1.3.0/24 200.1.1.11 interface Vlan2011 description Tenant Zone 1 OUTSIDE Vlan mtu 9216 no ip redirects ip address 200.1.1.252/24 hsrp 1 ip200.1.1.253 ip prefix-list static2ospfPfx seq 10 permit 200.0.0.0/10 le 24 route-map direct2ospf permit 10 match ip address prefix-list static2ospfPfx router ospf 1 router-id [x.x.x.x] redistribute static route-map direct2ospf Animation Note, the outside SVIs belong to the default global VRF. Nexus is already VRF aware and by default everything belongs to the default VRF. Route summarization is used to advertise tenancy subnets into the Core / WAN Edge layer using OSPF. This allows adding of server VLANs in any tenancy without making any changes to static routes and routing at the aggregation layer. Step 1 :: create firewall outside vlan SVI & HSRP Step 2 :: add static route for server vlan towards firewall context outside IP Step 3 :: redistribute server vlan into OSPF

  27. Simple Tenant Container ASA Cluster Configuration Logical Firewall Security Model Animation The AGG pair uses a default route in the VRF to route through the ASA cluster for outbound traffic. [N7k-1] vrf context Tenant_Zone_1 iproute 0.0.0.0/0 200.1.2.11 interface Vlan2012 description Tenant Zone 1 INSIDE Vlan mtu9216 vrf member Tenant_Zone_1 no ip redirects ip address 200.1.2.251/24 hsrp 1 ip 200.1.2.253 interface Vlan2013 description Tenant Zone 1 SERVER Vlan mtu9216 vrf member Tenant_Zone_1 no ip redirects ip address 200.1.3.251/24 hsrp 1 ip 200.1.3.253 [N7k-2] vrf context Tenant_Zone_1 iproute 0.0.0.0/0 200.1.2.11 interface Vlan2012 description Tenant Zone 1 INSIDE Vlan mtu9216 vrf member Tenant_Zone_1 no ip redirects ip address 200.1.2.252/24 hsrp 1 ip 200.1.2.253 interface Vlan2013 description Tenant Zone 1 SERVER Vlan mtu 9216 vrf member Tenant_Zone_1 no ip redirects ip address 200.1.3.252/24 hsrp 1 ip 200.1.3.253 The SVIs are configured to use HSRP. VLANs 2011 and 2012 represent the outside and inside interfaces of the ASA units for context Tenant_Zone_1. VLAN 2013 is used as a server VLAN. The inside VLANs are contained in a VRF to isolate the traffic and routing. Step 1 :: create tenant zone VRF Step 2 :: add default route to firewall context inside IP Step 3:: create firewall inside vlan SVI & HSRP Step 4:: create server vlan SVI & HSRP

  28. Simple Tenant Container ASA Cluster Configuration Logical Firewall Security Model [Tenant_Zone_1 context] route outside 0.0.0.0 0.0.0.0 200.1.1.253 1 route inside 200.1.3.0 255.255.0.0 200.1.2.253 1 route inside200.1.111.0 255.255.255.0 200.1.2.253 1 Animation [Load Balancer virtual context] interface [floating] ip address 200.1.2.50 /24 iproute 0.0.0.0/0 200.1.2.11 Ip route 200.1.3.0/24 200.1.2.253 [N7k-1] vrf context Tenant_Zone_1 iproute 0.0.0.0/0 200.1.2.11 ip route 200.1.112.0/24 200.1.2.50 [N7k-2] vrf context Tenant_Zone_1 ip route 0.0.0.0/0 200.1.2.11 ip route 200.1.112.0/24 200.1.2.50 Step 1 :: add firewall route to load balancer VIP [firewall context] Step 2 :: add route to load balancer SNAT address pool [Nexus aggregation] Step 3:: add routes on load balancer On the firewall context, add a specific route to reach the load-balancer through the inside interface; towards Nexus aggregation HSRP address. The route will use the alias IP address or floating IP address (similar to HSRP) on the load balancer. On the Nexus aggregation, add a specific route to reach the load-balancer SNAT pool in the one-arm configuration; LB is the next hop. On the load balancer add the default route towards the firewall’s inside interface and add a more specific route to the servers, towards the Nexus aggregation HSRP address. Load Balancer vendor selection or configuration is outside scope of this document

  29. Show Commands ASA Cluster Configuration • Here are some helpful commands executed in the ‘system context’ on the master unit: • Shows the cluster status :: show cluster info • Shows cluster wide connection distribution :: show cluster info conn-distribution • Shows cluster wide packet distribution :: show cluster info packet-distribution • Clear asp counters :: cluster exec clear asp drop • Show asp counters. Helpful to isolate drops :: cluster exec show asp drop • Shows the port channel summary on all units in the cluster :: cluster exec show port-channel summary • Shows all connections across the cluster. This command can show how traffic for a single flow arrives at different ASAs in the cluster:: cluster exec show conn • Shows connection detail for a particular flow across all units in the cluster. Note, this needs to be executed in a context that is handling the flow :: cluster exec show conn detail address [x.x.x.x] • Show the unique MAC for the entire cluster that will be used for the LACP partner :: show lacp cluster system-id • Show the cluster system MAC (automatically generated) :: show lacp cluster system-mac • Commands executed in the ‘admin context’ on the master unit: • Display the pool IP addresses :: show ip local pool mgmt

  30. Strong Recommendations and Key Notes ASA Cluster Configuration • Clustering is best enabled in a specific, phased manner. To reduce the potential for errors, enable the CCL first and bring up the cluster before adding the remaining configuration. At a minimum, an active cluster control link network is required before you configure the units to join the cluster; this includes the upstream and downstream equipment port channels. • When configuring clustering you need to select the cluster interface-mode first, as it will clear the existing configuration and force a reboot. It is recommended to use spanned Ether Channel. • A console connection is always required to enable or disable clustering. • Cluster control link bandwidth should match or exceed the highest available bandwidth of data interfaces on a single cluster unit. • Recommend that you use Ten Gigabit Ethernet interfaces for the cluster control link, especially if there is high amount of centralized traffic or asymmetric traffic. If most traffic is centralized or asymmetric (undesirable) the cluster control link should have a higher bandwidth than data interface on each unit, because this traffic will have to be forwarded over cluster control link. • Recommend that you use a port-channel for the CCL for additional resiliency. The port-channel configuration should use LACP mode active. • The cluster control link should be in an isolated network and must not be a spanned Ether Channel. It needs to be configured on the aggregation switches as a unique port-channel for each unit in the cluster. • ‘switchport access vlan [x]’

  31. Strong Recommendations and Key Notes ASA Cluster Configuration • It is recommended that spanning-tree port type edge or edge trunk is configured on the aggregation switch interfaces connecting to the cluster control and data interfaces. If this is not enabled, initial synchronization communication between ASA units in the cluster could fail and connections might be dropped. • Using the same port channel load balancing hash algorithm between the ASA and Nexus 7000 (src-dst ip-l4port). Do not use thevlan keyword in the load-balance algorithm because it can cause unevenly distributed traffic to the ASAs in a cluster. • Recommend that you do not specify the maximum and minimum links for a port-channel (The lacp max-bundle and port-channel min-bundle commands) on either the ASA or the switch. • It is recommended that the spanned data port-channel is configured on the switch with no lacp graceful-convergence and lacp rate fast to achieve fast link aggregation and convergence. • Recommend to use spanned Ether Channels (cluster interface-mode spanned) instead of individual interfaces because individual interfaces rely on routing protocols to load-balance traffic, and routing protocols often have slow convergence during a link failure. • An IGP routing protocol peered with the ASA cluster does not provide the best convergence at the moment, static routes and Ether Channel Load Balancing (ECLB) is recommended to route and hash traffic to and from the ASA cluster. Note: dynamic routing is not supported over vPC or vPC+ • It is recommended to enable jumbo frame reservation and mtucluster 1600 for use with the cluster control link (CCL). When a packet is forwarded over cluster control link an additional trailer will be added, which could cause fragmentation.

  32. Strong Recommendations and Key Notes ASA Cluster Configuration • For the management interface, we recommend using one of the dedicated management interfaces (m0/0 or m0/1). This should be configured to use an isolated network apart from the CCL or data interface configuration. • In spanned Ether Channel mode, if you configure the management interface as an individual interface, you cannot enable dynamic routing for the management interface. You must use a static route. • Recommend that you manually force an ASA unit to be the designated master and the other units as slaves via the priority command under the cluster group configuration. • In single context mode, it is strongly recommended to configure static MAC addresses for a spanned Ether Channel, so that the MAC address does not change when the current master unit leaves the cluster. Manually configured MAC addresses will always stay with the master unit. • In multiple context mode, if you share an interface between contexts, auto-generation of MAC addresses is enabled by default. You should verify this to avoid any potential issues. The following command ‘mac-address auto prefix 1’ in the configuration is used to auto-generate MAC addresses • Note :: In spanned Ether Channel mode, if you configure the management interface as an individual interface, you cannot enable dynamic routing for the management interface. You must use a static route. • Note :: you enable clustering when you enter the ’enable’command under the cluster group configuration. If you disable clustering, all data interfaces are shut down, and only the management interface is active. • A Cluster license is required on each unit. For other feature licenses, cluster units do not require the same license on each unit. If you have feature licenses on multiple units, they combine into a single running ASA cluster license. Note, each unit must have the same encryption license when in cluster mode.

  33. Strong Recommendations and Key Notes ASA Cluster Configuration • Recommended in principle to first maximize the number of active ports in the channel, and secondly keep the number of active primary ports and the number of active secondary ports in balance. Having an even number of ASA units in the clusters will allow traffic to balance evenly. • Note that when an odd number unit joins the cluster, traffic is not balanced evenly between all units. Link or device failure is handled with the same principle; you may end up with a less-than-perfect load balancing situation.  • Recommend to use the health check feature; which is configured under the cluster group configuration and the default holdtime is 3 seconds. After you add all the slave units, and the cluster topology is stable, re-enable the cluster health check feature, which includes unit health monitoring and interface health monitoring. Keepalive messages between members determine member health. If a unit does not receive any keepalive messages from a peer unit within the holdtime period, the peer unit is considered unresponsive or dead.  • When any topology changes occur (such as adding or removing a data interface, enabling or disabling an interface on the ASA or the switch, or adding an additional switch to form a vPC) you should disable the health check feature. When the topology change is complete, and the configuration change is synced to all units, you can re-enable the health check feature. • When the firewall is deployed in transparent mode (vlan translation between inside and outside vlans that belong to same bridge-group with associated BVI interface) all cluster configuration recommendations remain the same; but an additional strong recommendation is to filter STP BPDU forwarding using an access-list on the inside and outside interfaces when the ASA Cluster is connected to a vPC or vPC+ domain on the Nexus platform. • access-list 1 ethertype deny bpdu • access-group 1 in interface inside • access-group 1 in interface outside

  34. Additional Resources & Further Reading ASA Cluster Configuration External (public) ASA Clustering within VMDC Architecture http://www.cisco.com/en/US/docs/solutions/Enterprise/Data_Center/VMDC/ASA_Cluster/ASA_Cluster.html VMDC (Virtual Multi-Service Data Center) 3.0.1 Implementation Guide http://www.cisco.com/en/US/partner/docs/solutions/Enterprise/Data_Center/VMDC/3.0.1/IG/VMDC301_IG1.html ASA 5500 Configuration Guides http://www.cisco.com/en/US/partner/products/ps6120/products_installation_and_configuration_guides_list.html Configure a Cluster of ASAs (version 9.1 code) http://www.cisco.com/en/US/partner/docs/security/asa/asa91/configuration/general/ha_cluster.html Nexus 7000 Configuration Guides http://www.cisco.com/en/US/products/ps9402/products_installation_and_configuration_guides_list.html Great External Resources

  35. Additional Resources & Further Reading ASA Cluster Configuration Quick Start Guide :: Virtual Port Channel (vPC) https://communities.cisco.com/docs/DOC-35728 Quick Start Guide :: FabricPath https://communities.cisco.com/docs/DOC-35725l

More Related