1-41
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring a Cluster of ASAs
Configuring ASA Clustering
Step 6
(Optional)
key
shared_secret
Example:
hostname(cfg-cluster)# key
chuntheunavoidable
Sets an authentication key for control traffic on the cluster control
link. The shared secret is an ASCII string from 1 to 63 characters.
The shared secret is used to generate the key. This command does
not affect datapath traffic, including connection state update and
forwarded packets, which are always sent in the clear.
Step 7
(Optional)
clacp system-mac
{
mac_address
|
auto
}
[
system-priority
number
]
Example:
hostname(cfg-cluster)# clacp system-mac
000a.0000.aaaa
When using Spanned EtherChannels, the ASA uses cLACP to
negotiate the EtherChannel with the neighbor switch. ASAs in a
cluster collaborate in cLACP negotiation so that they appear as a
single (virtual) device to the switch. One parameter in cLACP
negotiation is a system ID, which is in the format of a MAC
address. All ASAs in the cluster use the same system ID:
auto-generated by the master unit (the default) and replicated to
all slaves; or manually specified in this command in the form
H
.
H
.
H
, where H is a 16-bit hexadecimal digit. (For example, the
MAC address 00-0A-00-00-AA-AA is entered as
000A.0000.AAAA.) You might want to manually configure the
MAC address for troubleshooting purposes, for example, so you
can use an easily identified MAC address. Typically, you would
use the auto-generated MAC address.
The system priority, between 1 and 65535, is used to decide which
unit is in charge of making a bundling decision. By default, the
ASA uses priority 1, which is the highest priority. The priority
needs to be higher than the priority on the switch.
This command is not part of the bootstrap configuration, and is
replicated from the master unit to the slave units. However, you
cannot change this value after you enable clustering.
Step 8
enable
[
noconfirm
]
Example:
hostname(cfg-cluster)# enable
INFO: Clustering is not compatible with
following commands:
policy-map global_policy
class inspection_default
inspect skinny
policy-map global_policy
class inspection_default
inspect sip
Would you like to remove these commands?
[Y]es/[N]o:Y
INFO: Removing incompatible commands from
running configuration...
Cryptochecksum (changed): f16b7fc2
a742727e e40bc0b0 cd169999
INFO: Done
Enables clustering. When you enter the
enable
command, the
ASA scans the running configuration for incompatible commands
for features that are not supported with clustering, including
commands that may be present in the default configuration. You
are prompted to delete the incompatible commands. If you
respond
No
, then clustering is not enabled. Use the
noconfirm
keyword to bypass the confirmation and delete incompatible
commands automatically.
For the first unit enabled, a master unit election occurs. Because
the first unit should be the only member of the cluster so far, it will
become the master unit. Do not perform any configuration
changes during this period.
To disable clustering, enter the
no enable
command.
Note
If you disable clustering, all data interfaces are shut down,
and only the management-only interface is active. If you
want to remove the unit from the cluster entirely (and thus
want to have active data interfaces), see the
Command
Purpose
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......