cc/td/doc/product/iaabu/pix/pix_v44
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Advanced Configurations

Advanced Configurations

This chapter describes how to configure:

Failover

Use the failover command without an argument after you connect the optional failover cable between your primary firewall and a secondary firewall. The default is the failover off command. Enter the no failover command in the configuration file for the PIX Firewall if you will not be using the failover feature. Use the show failover command to verify the status of the connection and to determine which unit is active.


Note If you are upgrading from a previous version, refer to
"Upgrading from PIX Firewall Version 4.1 to Version 4.2" and "Upgrading from PIX Firewall Version 4.2(1) to 4.3(2)" before continuing.

Note Before connecting the failover cable, removing network cables, or powering off your unit as described in this section, read the Regulatory Compliance and Safety Information for the PIX Firewall Version 4.4 guide for important safety information.

Note The ACT indicator light on the front of the PIX 515 is on when the unit is the Active failover unit. If failover is not enabled, this light is on. If failover is present, the light is on when the unit is the Active unit and off when the unit is in Standby mode.

Note Refer to the Installation Guide for the PIX Firewall for information about installing a failover cable and other failover installation information.

Failover is supported only between identical PIX Firewall models running the same software version. For example, failover is not supported between a PIX10000 and a PIX 520.

Failover IP addresses must be configured on each interface card. The Active unit of the failover pair uses the system IP addresses and the Primary unit's MAC address, while the Standby unit uses the failover IP addresses and the secondary unit's MAC address. The system IP addresses and the failover IP addresses must be on the same subnet with no router between them.

When a failover occurs, each unit changes state. The newly Active unit assumes the IP and MAC addresses of the previously Active unit and begins accepting traffic. The new Standby unit assumes the failover IP and MAC addresses of the unit that was previously the Active unit. Because network devices see no change in these addresses, no ARP entries change or timeout anywhere on the network.

Both PIX Firewall units in a failover pair must have the same configuration. To accomplish this, always enter configuration changes on the Active unit in a PIX Firewall failover configuration. Use the write memory command on the Active unit to save configuration changes to Flash memory (non-volatile memory) on both the active and Standby units. Changes made on the Standby unit are not replicated on the Active unit.


Note Use the write standby command to manually save the configuration of the active failover unit to the standby failover unit from RAM to RAM. The Standby unit must not be configured individually. Commands entered on the Active unit are automatically replicated on the Standby unit. Only use the default configuration initially. You can force an update by using the write standby command on the Active unit. If you make changes to the Standby unit, it displays a warning but does not update the Active unit.

To save the configuration of the Active unit to Flash memory (permanent memory) on the Standby unit, use the write memory command on the Active unit. The write memory command results are replicated on the Standby unit.

Both units in a failover pair communicate through the failover cable. The two units send special failover "hello" packets to each other over all network interfaces and the failover cable every 15 seconds. The failover feature in PIX Firewall monitors failover communication, the power status of the other unit, and hello packets received at each interface. If two consecutive hello packets are not received within a time determined by the failover feature, failover starts testing the interfaces to determine which unit has failed, and transfers active control to the Standby unit.

The Standby unit does not maintain the state information of each connection. This means that all active connections will be dropped when failover occurs. Client systems must reestablish connections. Additionally, no RIP information is available on the newly Active unit. The newly active PIX Firewall must wait for up to 30 seconds to learn the routing information from the network.

When a failover occurs, syslog messages are generated indicating what happened.

Failover works by passing control to the Standby unit should the Active unit fail. For Ethernet, failover detection should occur within 30 seconds. Token Ring requires additional time for failover.

The markings on the cable let you choose which PIX Firewall unit is primary and which is secondary. You need only connect the failover cable between the PIX Firewall units.


Note The active PIX Firewall does not maintain a copy of the connection state in the Standby unit. If the Active unit fails, network traffic must re-establish previous connections.

SYSLOG messages indicate whether the primary or secondary unit failed. Use the show failover command to verify which unit is active.

If you want to force a PIX Firewall to be active or go to standby you can use the failover active or no failover active command. Use this feature to force a PIX Firewall offline for maintenance or to return a failed unit to service.

Upgrading from PIX Firewall Version 4.1 to Version 4.2

Step 1 Save the PIX Firewall version 4.1 configuration to a blank DOS-formatted diskette; write-protect, and label it.

Step 2 If failover is running, enter the no failover active command at the Primary unit.

Step 3 Remove the failover and network cables from the Standby unit. Do not remove the console cable.

Step 4 Insert the PIX Firewall version 4.2 diskette into the Standby unit and use the reload command to reboot the unit.

Step 5 After the the Standby unit comes up, check the configuration and use the write memory command to store the configuration in flash memory.

Step 6 Plug in the failover and network cables into the Standby unit. Look for link lights on the network interface.

Step 7 On the Standby unit, enter the show interface command to ensure that traffic is moving through the PIX Firewall.

Step 8 Power off the Primary unit to force failover to the Standby unit.

Step 9 Enter the show conn command on the Standby unit to see if traffic is passing through the PIX Firewall.

Step 10 Disconnect the failover and network cables from the Primary unit which is now inactive.

Step 11 Insert the PIX Firewall version 4.2 diskette into the Primary unit.

Step 12 Check the configuration and use the write memory command to store the configuration in flash memory.

Step 13 Plug in the failover and network cables. Look for link lights on the network interface.

Step 14 On the Primary unit, use the failover active command to restart failover.

Step 15 Enter the show conn command on the Primary unit to see if traffic is passing through the PIX Firewall.

This completes the upgrade procedure.

Upgrading from PIX Firewall Version 4.2(1) to 4.3(2)

Step 1 Connect a separate console to the Primary unit and one to the Secondary unit.

Step 2 Insert the PIX Firewall version 4.2 diskette into the Primary unit. Enter the reload command at the Primary unit.

Step 3 As the Primary unit reboots, PIX Firewall prompts you to write the diskette to Flash memory. Before entering a reply, read the next three substeps and be ready to move quickly to complete them. When ready, enter y for yes to write the diskette to Flash memory.

Step 4 On the Primary unit, observe the link lights on the network interface to determine that the unit is receiving traffic. Once the Standby unit completes its startup, the two units replicate the configuration. During the replication, the Primary console will not receive input.

Step 5 On the Standby unit, use the show failover command to monitor progress. When both PIX Firewall units report Normal, the replication is done.

Step 6 On each unit, enter the write memory command to store the new images in Flash memory.

This completes the upgrade procedure.

Configuring Firewall Units for Failover


Note Always enter configuration changes on the Active unit. Configuration changes entered on the Standby unit are not saved to the Active unit.

The following guidelines apply to configuring failover on the Active unit:


Note When a failover occurs, each unit changes state. The newly Active unit assumes the IP addresses and MAC addresses of the previously Active unit and begins accepting traffic. The new Standby unit assumes the IP addresses and MAC addresses of the unit that was previously the Standby unit. Because network devices see no change in these addresses, no ARP entries change or time out anywhere on the network. The failover feature uses the different IP addresses for the Standby unit as a way of testing the interfaces of both units, ensuring that failover can occur over the physical network.

Frequently Asked Failover Questions

This section contains some frequently asked questions about the failover feature. Additional questions relating to installation are provided in the Installation Guide for the PIX Firewall.

A switch can be initiated by either unit. When a switch takes place, each unit changes state. The newly Active unit assumes the IP address and MAC address of the previously Active unit and begins accepting traffic for it. The new Standby unit assumes the IP address and MAC address of the unit that was previously the Standby unit. The two units do not share connection states. Any active connections will be dropped when a failover switch occurs. The clients must re-establish the connections through the newly Active unit.
When a unit boots up, it defaults to Failover Off and Secondary, unless the failover cable is present or failover has been saved in the configuration. The configuration from the Active unit is also copied to the Standby unit. If the cable is not present, the unit automatically becomes the Active unit. If the cable is present, the unit that has the primary end of the failover cable plugged into it becomes the Primary unit by default.
Commands entered on the Active unit are automatically replicated on the Standby unit.
When the primary active PIX Firewall experiences a power failure, the standby PIX Firewall comes up in active mode. If the Primary unit is powered up again it will become the Standby unit.
Fault detection is based on the following:

  • Failover hello packets are received on each interface. If hello packets are not heard for two consecutive 15 second intervals, the interface will be tested to determine which unit is at fault.

  • Cable errors. The cable is wired so that each unit can distinguish between a power failure in the other unit, and an unplugged cable. If the Standby unit detects that the Active unit is powered down (or resets) it will take active control. If the cable is unplugged, a SYSLOG is generated but no switching occurs. An exception to this is at boot-up, at which point an unplugged cable will force the unit active. If both units are powered on without the failover cable installed they will both become active creating a duplicate IP address conflict on your network. The failover cable must be installed for failover to work correctly.

  • Failover communication. The two units share information every 15 seconds. If the Standby unit does not hear from the Active unit in two communication attempts (and the cable status is OK) the Standby unit will take over as active.

SYSLOG messages will be generated when any errors or switches occur. Evaluate the failed unit and fix or replace it.

Failover Interface Tests

If a failure is due to a condition other than a loss of power on the other unit, failover will begin a series of tests to determine which unit is failed. This series of tests will begin when hello messages are not heard for two consecutive 15-second intervals. Hello messages are sent over both network interfaces and the failover cable.

The purpose of these tests is to generate network traffic in order to determine which (if either) unit has failed. At the start of each test, each unit clears its received packet count for its interfaces. At the conclusion of each test, each unit looks to see if it has received any traffic. If it has, the interface is considered operational. If one unit receives traffic for a test and the other unit does not, the unit that received no traffic is considered failed. If neither unit has received traffic, then go to the next test.


Note If the failover IP address has not been set, failover does not work and the Network Activity, ARP, and Broadcast ping tests are not performed.

Failover SYSLOG Messages

In the messages that follow, P|S can be either Primary or Secondary depending on which PIX Firewall is sending the message. Failover messages always have a SYSLOG priority level of 2, which indicates a critical condition. Refer to the logging command description for more information on SYSLOG messages.

To receive SNMP SYSLOG traps (SNMP failover traps), you must configure the SNMP agent to send SNMP traps to SNMP management stations, define a SYSLOG host, and also have compiled the Cisco SYSLOG MIB into your SNMP management station. See the snmp-server and logging command pages in Chapter 5, "Command Reference" for more information.

The SYSLOG messages sent to record failover events are:

ActiveX Blocking

ActiveX controls, formerly known as OLE or OCX controls, are components you can insert in a web page or other application. These controls include custom forms, calendars, or any of the extensive third-party forms for gathering or displaying information. As a technology, ActiveX creates many potential problems for the network clients including causing workstations to fail, introducing network security problems, or be used to attack servers.

The PIX Firewall ActiveX feature blocks the HTML <object> commands by commenting them out within the HTML web page. This functionality has been added to the filter command with the activex option.


Note The <object> tag is also used for Java applets, image files, and multimedia objects, which will also be blocked by the new command.

Note If the <object> or </object> HTML tags split across network packets or if the code in the tags is longer than the number of bytes in the MTU, PIX Firewall cannot block the tag.

WebSENSE URL Filtering

If your network has a WebSENSE server on any network interface, you can provide URL filtering through the PIX Firewall.

To configure the PIX Firewall to use WebSENSE:

Step 1 Specify the interface and IP address of the WebSENSE server with the url-sever command as shown in this example:

    url-server (dmz) host 192.168.1.42 timeout 10
     
    

In this example, the WebSENSE host is on the dmz interface at IP address 192.168.1.42. A timeout value of 10 seconds is specified as maximum allowed idle time before the PIX Firewall switches to the next WebSENSE server.

Step 2 Use the filter url http command to tell the PIX Firewall how to filter requests. For example, to filter requests for all hosts, use:

    filter url http 0 0 0 0 allow
    

Step 3 If you want to disable URL filtering, use the no filter url command.

FTP and URL Logging

You can log FTP commands and WWW URLs when syslog is enabled. FTP and URL messages are logged at syslog level 7.

Refer to the section "Step 15 - Enable Syslog" in Chapter 2, "Configuring the PIX Firewall," for more information on how to view syslog messages on a server, console session, or via Telnet to the console.

Use the show fixup command to ensure that the fixup protocol commands for FTP and HTTP are present in the configuration:

fixup protocol http 80
fixup protocol ftp 21
 

These commands are in the default configuration.

The sections that follow provide sample output displays for each logging type.

Sample URL Log

The following is an example of a URL logging syslog message:

192.168.69.71 accessed URL 10.0.0.1/secrets.gif

Sample FTP Log

The following are examples of FTP logging syslog messages:

192.168.69.42 Retrieved 10.0.0.42:feathers.tar
192.168.42.54 Stored 10.0.42.69:privacy.zip

You can view these messages at the PIX Firewall console with the show logging command.

SNMP Traps

The snmp-server command causes the PIX Firewall to send SNMP traps so that the firewall can be monitored remotely. Use snmp-server host to specify which systems receive the SNMP traps.

An SNMP object ID (OID) for PIX Firewall now displays in SNMP event traps sent from the PIX Firewall. OID 1.3.6.1.4.1.9.1.227 was assigned as the PIX Firewall system object ID.


Note The PIX Firewall does not support browsing of the Cisco syslog MIB. The only MIB you can browse is the System and Interface groups of MIB-II.

Browsing a MIB is different from sending traps.  Browsing means doing an snmpget or snmpwalk of the MIB tree from the management station to determine values. Traps are different; they are unsolicited "comments" from the managed device to the management station for certain events, such as link up, link down, syslog event generated, and so on.

To send traps to an SNMP management station:

Step 1 Identify the IP address of the SNMP management station with the snmp-server host command.

Step 2 Set the snmp-server options for location, contact, and the community password as required.

Step 3 Add an snmp-server enable traps command statement.

Step 4 Set the logging level with the logging trap command; for example:

    logging trap debugging
     
    

Cisco recommends that you use the debugging level during initial set up and during testing. Thereafter, set the level from debugging to a lower value for production use.

Step 5 Start sending syslog traps to the server with the logging on command.


The PIX Firewall SNMP MIB-II groups available are System and Interfaces.

All SNMP values are read only (RO).

Using SNMP, you can monitor system events on the PIX Firewall. SNMP events can be read, but information on the PIX Firewall cannot be changed with SNMP.

The PIX Firewall SNMP traps available to an SNMP management station are:

Use CiscoWorks for Windows (Product Number CWPC-2.0-WIN) or any other SNMP V1, MIB-II compliant browser to receive SNMP traps and browse a MIB. SNMP traps occur at UDP port 162.

Compiling Cisco Syslog MIB Files

To receive security and failover SNMP traps from the PIX Firewall, compile the Cisco SMI MIB and the Cisco syslog MIB into your SNMP management application. If you do not compile the Cisco syslog MIB into your application, you only receive MIB-II traps for link up or down, and firewall cold start.

You can get the Cisco MIB files on the Web from:

http://www.cisco.com/public/mibs/v2/CISCO-SYSLOG-MIB.my

http://www.cisco.com/public/mibs/v2/CISCO-SMI.my

To compile Cisco syslog MIB files into your browser using CiscoWorks for Windows (SNMPc), complete the following steps:

Step 1 Get the Cisco syslog MIB files.

Step 2 Start SNMPc.

Step 3 Select Config>Compile MIB.

Step 4 Scroll to the bottom of the list, and select the last entry.

Step 5 Click the Add button.

Step 6 Find the file CISCO-SMI.my and click OK.

Step 7 Scroll to the bottom of the list, and select the last entry.

Step 8 Click the Add button again.

Step 9 Find the file CISCO-SYSLOG-MIB.my and click OK.

Step 10 Click Load All.

Step 11 If there are no errors, restart SNMPc.

These instructions are only for SNMPc (CiscoWorks for Windows).

Private Link

The link command creates an encrypted path between Private Link-equipped PIX Firewall units. You can specify up to seven encryption keys for data access between the local unit and the remote unit. The key-ID and key values must be the same on each side of the Private Link. Once you specify the same keys on both sides of the connection, the systems alert each other when a new key takes effect. You can use the age command to specify the number of minutes that a key is in effect.


Note After using the link command to add or delete link entries, use the write memory command to store the configuration, and then reboot the PIX Firewall.

Specify the link command once for each key you want to specify; for example, if you want seven keys, enter the link command in the configuration seven times.

The PIX Firewall Private Link consists of an encryption card and software that permits the PIX Firewall units to provide encrypted communications across an unsecure network such as the Internet.

The PIX Firewall allows up to 256 Private Links and up to 512 link paths.

At least two PIX Firewall units are required to use Private Link and each system must have the same hardware and software versions.

Private Link works by checking packets that arrive at the PIX Firewall inside interface. If a route link previously created by the linkpath command exists that matches the destination network address, the packet is encrypted and encapsulated in an AH/ESP frame. The frame has a destination address of the remote PIX Firewall and a source address of the local PIX Firewall. When the packet arrives at the remote PIX Firewall unit, the data in the packet is decrypted and then sent through the designated interface to the original IP address specified. No translation takes place on packets that traverse the PIX Firewall Private Link. The addressing and data remains completely unchanged.

If you use the link command to change the interface on which a Private Link tunnel terminates, you must reboot the PIX Firewall on which you made the change. For example, if the Private Link tunnel terminates on the perimeter interface of the foreign PIX Firewall and you change it to terminate on the inside interface of the foreign PIX Firewall, you must reboot the local PIX Firewall on which you changed the configuration.

The PIX Firewall supports both Private Link and with Ravlin IPSec encryption cards in the same PIX Firewall.

You can manage remote PIX Firewall units through the Private Link interface.

You can use the linkpath 0.0.0.0 0.0.0.0 foreign_external_ip command to route all outbound traffic on a foreign PIX Firewall to a central PIX Firewall. However, this use has two caveats: there can be only one central PIX Firewall and the other PIX Firewall units must be satellites to it. This implies that the satellites only relay connections to the central and do not communicate among themselves. The second caveat is that the linkpath 0 0 command overrides the default route on the outside interface of the satellite PIX Firewall causing all outbound traffic to flow over Private Link to the central PIX Firewall unit. One use of this feature is when access to the Internet is controlled through one PIX Firewall and the other PIX Firewall units feed their Internet traffic to this one site. This could occur when a central processing facility wants to manage all the Internet IP addresses, let the internal networks use any IP numbering scheme, and have local PIX Firewall units protecting individual departments or sites.

Configuring Private Link

To configure a Private Link, refer to the example shown in Figure 3-1.


Figure 3-1: Example Private Link Network Diagram


Before configuring Private Link, you would initially configure the systems using the standard commands.

When you configure a Private Link, follow these steps:

Step 1 Agree on up to seven hexadecimal encryption keys for use between the PIX Firewall Private Link local and remote units; for example, one key could be like the hexadecimal value fadebacbeebeee. Be sure to select unique keys that are difficult to guess. The key can be up to 56 bits in length (14 hexadecimal digits).

Step 2 Use the link command to create an encrypted link for each key you want to specify.

Step 3 Use the linkpath command to specify the IP address of the network on the inside of the remote firewall.

Step 4 On PIX Firewall A, in Figure 3-1, enter these commands to configure the Private Link:

    	link 192.168.37.1 1 fadebacfadebac
    	link 192.168.37.1 2 bacfadefadebac
    	link 192.168.37.1 3 baabaaafadebac
    	link 192.168.37.1 4 beebeeefadebac
    linkpath 10.3.0.0 255.255.255.0 192.168.37.1
    

Step 5 On PIX Firewall B, enter these commands:

    	link 192.168.35.1 1 fadebacfadebac
    	link 192.168.35.1 2 bacfadefadebac
    	link 192.168.35.1 3 baabaaafadebac
    	link 192.168.35.1 4 beebeeefadebac
    linkpath 10.1.0.0 255.255.255.0 192.168.35.1
    

Step 6 Test the connection to each foreign PIX Firewall with the ping command.

Step 7 After configuring the link and linkpath commands, if a ping inside command to the inside address of the remote PIX Firewall does not work, enter the show link command and look at packets in and out. If both are at 0 that means the link is up, but traffic is not being routed to the inside interface of the local PIX Firewall.

Step 8 Proceed to the router closest to the PIX Firewall on the inside, and look at the routing table. If there is not a route to the remote PIX Firewall network, add a static route, or turn RIP on at the PIX Firewall.

When you Telnet to the PIX Firewall, and perform a ping inside, the packet is not simply generated from the inside address of the PIX Firewall and forwarded across the bus to the outside address and out the encrypted tunnel. Instead the ICMP packet is placed on the inside network, picked up by the closest router, and retransmitted to the PIX Firewall, where it is then picked up, encrypted and sent across the link to the remote box.

Using the md5 Option

To use the md5 option:

Step 1 Create a link with the associated key(s).

Step 2 Specify the md5 option.

For example:

link (inside) 192.150.49.133 1 123abc
link (inside) 192.150.49.133 2 123abc456
link (inside) 192.150.49.133 md5
 

The first link command statement creates an encrypted path from the current Private Link-equipped PIX Firewall to the remote PIX Firewall at 192.150.49.133. The encryption key is in the first (of 7) keys and has the value 123abc. The second link command statement creates a second key of 123abc456. The third link command statement specifies that MD5 authentication will be required for this link.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Jun 8 20:02:18 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.