CCNP BCMSN Exam Certification Guide (3rd Edition)
|
8-3. Firewall Load Balancing in Hardware
FWLB is used to balance traffic flows to one or more firewall farms. A firewall farm is a group of firewalls that are connected in parallel or that have their inside (protected) and outside (unprotected) interfaces connected to common network segments. FWLB requires a load-balancing device to be connected to each side of the firewall farm. A firewall farm with inside and outside interfaces would then require two load-balancing deviceseach making sure that traffic flows are directed toward the same firewall for the duration of the connection. FWLB can be performed in hardware with a CSM on the Catalyst 6500 switch platform. The CSM is a very robust and high-performance device, using the ASLB features to distribute connections to both server and firewall farms. The CSM has no firewall farm concept. Rather, it treats a firewall farm as a regular server farm where the physical firewalls are configured as real servers in the farm. The CSM itself has logical interfaces that are configured as the gateway or next-hop addresses toward and away from a firewall farm. To load-balance traffic, the CSM is configured with a virtual server that represents the firewall farm. As new traffic flows arrive at the virtual server, the CSM computes a hash value according to a predefined algorithm. This hash value determines which firewall is used within the firewall farm. The CSM is flexible with how firewalls are connected and where they are located. Firewalls can reside on a single VLAN or subnet, or they can each reside on a unique subnet. As well, the firewalls can be more than one router hop away from the CSM. The CSM can operate in the following modes, based on its placement between a firewall farm and the clients:
CSM FWLB can detect a firewall failure by monitoring probe activity. One probe is configured and is used on all members of the firewall farm in succession. The CSM automatically inserts the target IP address of each firewall. The CSM also periodically gathers ARP data from each firewall and uses that information to detect firewall failures. Multiple CSM FWLB devices can also use stateful backup for redundancy. Backup devices keep state information dynamically and can take over immediately if a failure occurs. NOTE The CSM is a standalone device installed in a Catalyst 6500 chassis. The CSM interfaces with the switch through a 6-Gbps channel that acts as a trunk carrying multiple VLANs. As soon as packets are handed off to the CSM, they are effectively isolated from the switch until the CSM sends them back. As you might expect, FWLB can be performed by two separate CSMs, in either one or two physical switch chassis. However, the CSM architecture also allows FWLB using only a single CSM in one switch chassis. You can configure many separate virtual servers and firewall farms within one CSM so that all the FWLB devices needed to surround a firewall farm can be present in that CSM. This makes high-performance FWLB more cost-effective but limits the redundancy to a single CSM.
FWLB in Hardware Configuration Notes
FWLB is configured in two halves. One FWLB device must be placed on the outside of the firewall farm, and another is placed on the inside. Each FWLB device distributes connections toward the firewall. Therefore, the outside FWLB balances connections going into the firewall farm's outside interfaces (inbound). The inside FWLB acts similarly for connections going into the firewall farm's inside interfaces (outbound). The CSM is configured differently from IOS FWLB because it supports only generic server farms that act as firewall farms. A virtual server and its server farm must be configured for each direction in which packets will be sent. Therefore, on each side of the firewall, you must configure the CSM with two virtual servers that either load-balance or just forward traffic in the inbound and outbound directions. This might sound a bit complicated, but it really isn't. Figure 8-5 shows how CSM FWLB devices use the various virtual servers. (For the purposes of this discussion, assume that two separate CSMs are being used.) On the outside of the firewall farm, that CSM needs one virtual server to distribute connections into a firewall farm's outside interfaces in the inbound direction. A second "generic" virtual server takes care of the outbound traffic coming from the firewall farm. This virtual server is actually a simple traffic forwarder that makes no load-balancing decisions. Figure 8-5. CSM FWLB Operation Surrounding a Firewall Farm
The inside CSM also has two virtual servers:
TIP If only one CSM can be used to provide FWLB around a firewall farm, how much network functionality can be put into a single Catalyst 6500 chassis? Plenty! That chassis can contain the usual Supervisor and line cards, along with the CSM, and up to four FWSMs. In other words, the outside public network and the inside secure network can exist on that switch as separate isolated VLANs, and the CSM provides robust load balancing to multiple high-performance firewall modulesall without compromising security.
The following sections present configuration steps for only one side (inside or outside) of the firewall farm. You need to repeat the sequence of steps for the FWLB functions on the other side of the firewall farm, too, assuming that you are working with firewalls that have dual (outside and inside) interfaces. If you have more protected networks (DMZs, for example), you can apply the same concepts to the firewall farm's other interfaces. Follow the steps listed for the inside FWLB configuration for any other interfaces needed, because these are all more secure interfaces than the outside. Also notice that the configuration steps assume you are using two separate CSMs. These same steps easily apply to a single CSM scenario just by using all the commands (inside and outside FWLB) to configure that one CSM. CSM FWLB Configuration
Because firewall load balancing with CSMs requires several different server farms and virtual servers, it is easy to forget what pieces need to be configured. Configure the inside and outside CSMs one at a time, and keep track of your progress in each by following the virtual servers and server farms that are shown in Figure 8-5. You need to repeat this configuration process for the inside and outside CSM.
CSM Firewall Load-Balancing Example
The network from the example in section 8-2 is reused here so that you can get a feel for the difference between IOS FWLB and CSM configurations. To perform firewall load balancing, you need two load-balancing devices:
Figure 8-6 shows a network diagram for this example using CSMs as FWLB devices. Remember that in the case of CSMs, you have the flexibility to use two separate modules (in the same or different chassis) on each side of the firewall farm or a single CSM that simply connects to both sides of the firewall farm. Figure 8-6. Network Diagram for the CSM FWLB Example
The firewall farm consists of three real firewalls. The outside (unprotected) interfaces of the three firewalls are at 192.168.100.3, 192.168.100.4, and 192.168.100.5. On the outside, the default gateway to the public network is 192.168.1.1, and the external CSM FWLB device (Catalyst A) is at 192.168.1.2. The inside (protected) interfaces of the three firewalls are at 192.168.200.3, 192.168.200.4, and 192.168.200.5. The internal CSM FWLB device performs firewall load balancing for outbound traffic to the firewall farm. On the internal secure network (192.168.199.0/24), one server is in use at 192.168.199.100. This server supports both inbound HTTP and Telnet connections. Ping probes are used by both external and internal FWLB devices to test for firewall operation. CSM Components Needed
Before we look at the actual configuration commands, you should understand the many logical pieces of the two CSMs that are used for FWLB. Remember that the CSM thinks of everything in terms of a server farm and its virtual server front end. For the outside CSM, keep in mind that both inbound (toward the firewall farm and the inside secure network) and outbound (away from the firewall farm, toward the public network) connections exist. You need a server farm and virtual server pair in each of these directions. These are labeled as follows:
The inside CSM is very similar, requiring the following inbound and outbound pairs of server farms and virtual servers:
Basic Firewall Configuration
This section begins with the firewall configurations. Firewalls A and B are FWSMs installed in the Catalyst A chassis. Firewall C is an external Cisco PIX Firewall connected to Catalyst A through a Gigabit Ethernet link. These configuration commands are shown here to give you a basic idea of all the pieces that must be configured for FWLB. Notice that all three firewalls have identical security policies configured. This is important, because any of the three firewalls could be assigned con-nections from any pair of inside and outside hosts. Firewall(config)# hostname fwsm-a fwsm-a(config)# nameif vlan100 outside security0 fwsm-a(config)# nameif vlan200 inside security100 fwsm-a(config)# ip address outside 192.168.100.3 255.255.255.0 fwsm-a(config)# ip address inside 192.168.200.3 255.255.255.0 fwsm-a(config)# icmp permit 192.168.100.0 255.255.255.0 outside fwsm-a(config)# icmp permit 192.168.200.0 255.255.255.0 inside fwsm-a(config)# static (inside,outside) 192.168.199.0 192.168.199.0 netmask 255.255.255.0 0 0 fwsm-a(config)# object-group icmp-type ICMP fwsm-a(config-icmp)# icmp-object echo fwsm-a(config-icmp)# icmp-object echo-reply fwsm-a(config-icmp)# icmp-object time-exceeded fwsm-a(config-icmp)# icmp-object unreachable fwsm-a(config-icmp)# exit fwsm-a(config)# access-list acl_out permit tcp any host 192.168.199.100 eq telnet fwsm-a(config)# access-list acl_out permit tcp any host 192.168.199.100 eq www fwsm-a(config)# access-list acl_out permit icmp any host 192.168.199.100 object-group ICMP fwsm-a(config)# access-list acl_in permit tcp 192.168.199.0 255.255.255.0 eq telnet any fwsm-a(config)# access-list acl_in permit tcp 192.168.199.0 255.255.255.0 eq www any fwsm-a(config)# access-list acl_in permit icmp 192.168.199.0 255.255.255.0 any object-group ICMP fwsm-a(config)# access-list acl_in permit icmp 192.168.200.0 255.255.255.0 any object-group ICMP fwsm-a(config)# access-group acl_out in interface outside fwsm-a(config)# access-group acl_in in interface inside fwsm-a(config)# route outside 0.0.0.0 0.0.0.0 192.168.100.1 1 fwsm-a(config)# route inside 192.168.199.0 255.255.255.0 192.168.200.1 1 ________________________________________________________________ Firewall(config)# hostname fwsm-b fwsm-b(config)# nameif vlan100 outside security0 fwsm-b(config)# nameif vlan200 inside security100 fwsm-b(config)# ip address outside 192.168.100.4 255.255.255.0 fwsm-b(config)# ip address inside 192.168.200.4 255.255.255.0 fwsm-b(config)# icmp permit 192.168.100.0 255.255.255.0 outside fwsm-b(config)# icmp permit 192.168.200.0 255.255.255.0 inside fwsm-b(config)# static (inside,outside) 192.168.199.0 192.168.199.0 netmask 255.255.255.0 0 0 fwsm-b(config)# object-group icmp-type ICMP fwsm-b(config-icmp)# icmp-object echo fwsm-b(config-icmp)# icmp-object echo-reply fwsm-b(config-icmp)# icmp-object time-exceeded fwsm-b(config-icmp)# icmp-object unreachable fwsm-b(config-icmp)# exit fwsm-b(config)# access-list acl_out permit tcp any host 192.168.199.100 eq telnet fwsm-b(config)# access-list acl_out permit tcp any host 192.168.199.100 eq www fwsm-b(config)# access-list acl_out permit icmp any host 192.168.199.100 object-group ICMP fwsm-b(config)# access-list acl_in permit tcp 192.168.199.0 255.255.255.0 eq telnet any fwsm-b(config)# access-list acl_in permit tcp 192.168.199.0 255.255.255.0 eq www any fwsm-b(config)# access-list acl_in permit icmp 192.168.199.0 255.255.255.0 any object-group ICMP fwsm-b(config)# access-list acl_in permit icmp 192.168.200.0 255.255.255.0 any object-group ICMP fwsm-b(config)# access-group acl_out in interface outside fwsm-b(config)# access-group acl_in in interface inside fwsm-b(config)# route outside 0.0.0.0 0.0.0.0 192.168.100.1 1 fwsm-b(config)# route inside 192.168.199.0 255.255.255.0 192.168.200.1 1 ________________________________________________________________ Firewall(config)# hostname pix-c pix-c(config)# interface gb-ethernet0 1000full pix-c(config)# interface gb-ethernet1 1000full pix-c(config)# nameif gb-ethernet0 outside security0 pix-c(config)# nameif gb-ethernet1 inside security100 pix-c(config)# ip address outside 192.168.100.5 255.255.255.0 pix-c(config)# ip address inside 192.168.200.5 255.255.255.0 pix-c(config)# icmp permit 192.168.100.0 255.255.255.0 outside pix-c(config)# icmp permit 192.168.200.0 255.255.255.0 inside pix-c(config)# static (inside,outside) 192.168.199.0 192.168.199.0 netmask 255.255.255.0 0 0 pix-c(config)# object-group icmp-type ICMP pix-c(config-icmp)# icmp-object echo pix-c(config-icmp)# icmp-object echo-reply pix-c(config-icmp)# icmp-object time-exceeded pix-c(config-icmp)# icmp-object unreachable pix-c(config-icmp)# exit pix-c(config)# access-list acl_out permit tcp any host 192.168.199.100 eq telnet pix-c(config)# access-list acl_out permit tcp any host 192.168.199.100 eq www pix-c(config)# access-list acl_out permit icmp any host 192.168.199.100 object-group ICMP pix-c(config)# access-list acl_in permit tcp 192.168.199.0 255.255.255.0 eq telnet any pix-c(config)# access-list acl_in permit tcp 192.168.199.0 255.255.255.0 eq www any pix-c(config)# access-list acl_in permit icmp 192.168.199.0 255.255.255.0 any object-group ICMP pix-c(config)# access-list acl_in permit icmp 192.168.200.0 255.255.255.0 any object-group ICMP pix-c(config)# access-group acl_out in interface outside pix-c(config)# access-group acl_in in interface inside pix-c(config)# route outside 0.0.0.0 0.0.0.0 192.168.100.1 1 pix-c(config)# route inside 192.168.199.0 255.255.255.0 192.168.200.1 1
Outside CSM FWLB Configuration
This section shows the configuration for the outside CSM. Notice that this is all done from the Catalyst 6500 CLI, because the commands pertaining to the CSM are automatically downloaded to it. This section begins with the preliminary commands to define VLANs and connectivity. Notice that the Catalyst switch handles routing only from the public network to the outside CSM. The outside and inside CSMs handle all other traffic forwarding from VLAN 10 on to the inside (secure) network. This effectively isolates the inside and outside networks, although they might be present in the same switch chassis. Switch(config)# hostname CatalystA ! Define the VLANs CatalystA(config)# vlan 10 CatalystA(config-vlan)# name Public-Network CatalystA(config)# vlan 100 CatalystA(config-vlan)# name FW-outside CatalystA(config)# vlan 200 CatalystA(config-vlan)# name FW-inside CatalystA(config)# vlan 400 CatalystA(config-vlan)# name Internal-Network ! Pass the VLANs to the two FWSMs CatalystA(config)# firewall module 3 vlan-group 1 CatalystA(config)# firewall module 4 vlan-group 1 CatalystA(config)# firewall vlan-group 1 100,200 ! Set up the outside connection to PIX Firewall-C CatalystA(config)# interface GigabitEthernet8/1 CatalystA(config-if)# description PIX-C outside CatalystA(config-if)# no ip address CatalystA(config-if)# switchport CatalystA(config-if)# switchport access vlan 100 CatalystA(config-if)# switchport mode access CatalystA(config-if)# spanning-tree portfast ! Define the Catalyst presence only on VLAN 10; CSM will handle everything beyond ! this CatalystA(config-if)# interface Vlan10 CatalystA(config-if)# ip address 192.168.1.2 255.255.255.0 ! Now define a way to get out to the public network CatalystA(config)# ip default-gateway 192.168.1.1 CatalystA(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1 ! For the internal (secure) network, define a route that points to the outside CSM CatalystA(config)# ip route 192.168.199.0 255.255.255.0 192.168.1.1 Now, the actual outside CSM commands are addressed. The ip slb mode csm command should already be used to force the switch to perform all SLB functions on the CSM instead of using the route processor. (Remember that a CSM performs generic SLB; FWLB is possible by having SLB on each side of a firewall farm.) ! Configure the outside CSM on CatalystA CatalystA(config)# module ContentSwitchingModule 7 CatalystA(config-module-csm)# vlan 10 client CatalystA(config-slb-vlan-client)# ip address 192.168.1.3 255.255.255.0 CatalystA(config-slb-vlan-client)# gateway 192.168.1.2 CatalystA(config-slb-vlan-client)# exit ! CatalystA(config-module-csm)# vlan 100 server CatalystA(config-slb-vlan-server)# ip address 192.168.100.1 255.255.255.0 CatalystA(config-slb-vlan-server)# exit ! ! Define a probe to detect failures within the firewall farm CatalystA(config-module-csm)# probe FARM-PROBE-OUTSIDE icmp CatalystA(config-slb-probe-icmp)# interval 15 CatalystA(config-slb-probe-icmp)# exit ! ! Define the inbound firewall farm CatalystA(config-module-csm)# serverfarm FW-INBOUND CatalystA(config-slb-sfarm)# no nat server CatalystA(config-slb-sfarm)# no nat client CatalystA(config-slb-sfarm)# probe FARM-PROBE-OUTSIDE CatalystA(config-slb-sfarm)# predictor hash address source CatalystA(config-slb-sfarm)# real 192.168.100.3 CatalystA(config-slb-real)# inservice CatalystA(config-slb-real)# exit CatalystA(config-slb-sfarm)# real 192.168.100.4 CatalystA(config-slb-real)# inservice CatalystA(config-slb-real)# exit CatalystA(config-slb-sfarm)# real 192.168.100.5 CatalystA(config-slb-real)# inservice CatalystA(config-slb-real)# exit ! ! Define the front end of the inbound FW farm CatalystA(config-module-csm)# vserver V-INBOUND CatalystA(config-slb-vserver)# virtual 0.0.0.0 0.0.0.0 any CatalystA(config-slb-vserver)# vlan 10 CatalystA(config-slb-vserver)# serverfarm FW-INBOUND CatalystA(config-slb-vserver)# inservice CatalystA(config-slb-vserver)# exit ! ! Define the outbound forwarder CatalystA(config-module-csm)# serverfarm PUBLIC CatalystA(config-slb-sfarm)# no nat server CatalystA(config-slb-sfarm)# no nat client CatalystA(config-slb-sfarm)# predictor forward CatalystA(config-slb-sfarm)# exit ! ! Define the front end to the outbound forwarder CatalystA(config-module-csm)# vserver V-PUBLIC-100 CatalystA(config-slb-vserver)# virtual 0.0.0.0 0.0.0.0 any CatalystA(config-slb-vserver)# vlan 100 CatalystA(config-slb-vserver)# serverfarm PUBLIC CatalystA(config-slb-vserver)# inservice !
Inside CSM Configuration
This section covers the configuration for the inside CSM. At this point, you should notice that you are still configuring things on Catalyst A. Only one physical CSM acts as both outside and inside FWLB devices. First, here are the commands to define VLANs and connectivity: ! Set up the inside connection to PIX Firewall-C CatalystA(config)# interface GigabitEthernet8/2 CatalystA(config-if)# description PIX-C inside CatalystA(config-if)# no ip address CatalystA(config-if)# switchport CatalystA(config-if)# switchport access vlan 200 CatalystA(config-if)# switchport mode access CatalystA(config-if)# spanning-tree portfast ! Set up the inside connection the example server 192.168.199.100 CatalystA(config)# interface GigabitEthernet8/3 CatalystA(config-if)# description Inside Server CatalystA(config-if)# no ip address CatalystA(config-if)# switchport CatalystA(config-if)# switchport access vlan 400 CatalystA(config-if)# switchport mode access CatalystA(config-if)# spanning-tree portfast
Next are the actual inside CSM commands: ! Configure the inside CSM (also on CatalystA) CatalystA(config)# module ContentSwitchingModule 7 CatalystA(config-module-csm)# vlan 400 client CatalystA(config-slb-vlan-client)# ip address 192.168.199.1 255.255.255.0 CatalystA(config-slb-vlan-client)# exit ! CatalystA(config-module-csm)# vlan 200 server CatalystA(config-slb-vlan-server)# ip address 192.168.200.1 255.255.255.0 CatalystA(config-slb-vlan-server)# exit ! ! Define a probe to detect failures within the firewall farm CatalystA(config-module-csm)# probe FARM-PROBE-INSIDE icmp CatalystA(config-slb-probe-icmp)# interval 15 ! ! Define the outbound firewall farm CatalystA(config-module-csm)# serverfarm FW-OUTBOUND CatalystA(config-slb-sfarm)# no nat server CatalystA(config-slb-sfarm)# no nat client CatalystA(config-slb-sfarm)# probe FARM-PROBE-INSIDE CatalystA(config-slb-sfarm)# predictor hash address destination CatalystA(config-slb-sfarm)# real 192.168.200.3 CatalystA(config-slb-real)# inservice CatalystA(config-slb-real)# exit CatalystA(config-slb-sfarm)# real 192.168.200.4 CatalystA(config-slb-real)# inservice CatalystA(config-slb-real)# exit CatalystA(config-slb-sfarm)# real 192.168.200.5 CatalystA(config-slb-real)# inservice CatalystA(config-slb-real)# exit ! ! Define the front end of the outbound FW farm CatalystA(config-module-csm)# vserver V-OUTBOUND CatalystA(config-slb-vserver)# virtual 0.0.0.0 0.0.0.0 any CatalystA(config-slb-vserver)# vlan 400 CatalystA(config-slb-vserver)# serverfarm FW-OUTBOUND CatalystA(config-slb-vserver)# inservice CatalystA(config-slb-vserver)# exit ! ! Define the inbound forwarder CatalystA(config-module-csm)# serverfarm INTERNAL CatalystA(config-slb-sfarm)# no nat server CatalystA(config-slb-sfarm)# no nat client CatalystA(config-slb-sfarm)# predictor forward CatalystA(config-slb-sfarm)# exit ! ! Define the front end to the inbound forwarder CatalystA(config-module-csm)# vserver V-INBOUND-200 CatalystA(config-slb-vserver)# virtual 192.168.199.100 255.255.255.255 any CatalystA(config-slb-vserver)# vlan 200 CatalystA(config-slb-vserver)# serverfarm INTERNAL CatalystA(config-slb-vserver)# inservice ! Displaying Information About CSM FWLB
You can use the switch commands listed in Table 8-3 to display helpful information about a CSM FWLB configuration and its status.
CSM FWLB Output Example
For the network shown in Figure 8-6, you can display the status of the inside (outbound) firewall farm as follows: Switch# show module csm 7 reals real server farm weight state conns/hits ------------------------------------------------------------------------- 192.168.200.3 FW-OUTBOUND 8 OPERATIONAL 0 192.168.200.4 FW-OUTBOUND 8 OPERATIONAL 0 192.168.200.5 FW-OUTBOUND 8 FAILED 0 Switch#
Notice that two of the three firewalls are working, but the third is in a FAILED state. It hasn't answered probes or ARP requests from the CSM. Now, suppose the third firewall is restored to service. You can use the same command to watch the connection load that has been distributed to each firewall. Remember that the number of connections shown represents only the new connections that have originated on one side of the firewall farm. The return traffic for those connections is always forwarded back through the same firewalls, so it isn't recorded as additional connections. For example, the show module csm mod reals command has been issued after each new outbound connection. Here, the destination IP addresses have been incremented just to show how the con-nections build and are distributed among the firewalls in the farm: Switch# show module csm 7 reals real server farm weight state conns/hits ------------------------------------------------------------------------- 192.168.200.3 FW-OUTBOUND 8 OPERATIONAL 0 192.168.200.4 FW-OUTBOUND 8 OPERATIONAL 0 192.168.200.5 FW-OUTBOUND 8 OPERATIONAL 0 Switch# show module csm 7 reals real server farm weight state conns/hits ------------------------------------------------------------------------- 192.168.200.3 FW-OUTBOUND 8 OPERATIONAL 1 192.168.200.4 FW-OUTBOUND 8 OPERATIONAL 0 192.168.200.5 FW-OUTBOUND 8 OPERATIONAL 0 Switch# show module csm 7 reals real server farm weight state conns/hits ------------------------------------------------------------------------- 192.168.200.3 FW-OUTBOUND 8 OPERATIONAL 1 192.168.200.4 FW-OUTBOUND 8 OPERATIONAL 1 192.168.200.5 FW-OUTBOUND 8 OPERATIONAL 0 Switch# show module csm 7 reals real server farm weight state conns/hits ------------------------------------------------------------------------- 192.168.200.3 FW-OUTBOUND 8 OPERATIONAL 1 192.168.200.4 FW-OUTBOUND 8 OPERATIONAL 1 192.168.200.5 FW-OUTBOUND 8 OPERATIONAL 1 Switch# show module csm 7 reals real server farm weight state conns/hits ------------------------------------------------------------------------- 192.168.200.3 FW-OUTBOUND 8 OPERATIONAL 2 192.168.200.4 FW-OUTBOUND 8 OPERATIONAL 1 192.168.200.5 FW-OUTBOUND 8 OPERATIONAL 1
As long as the destination addresses are increasing by 1, the connections are distributed in a round-robin fashion. In actual use, the source and destination addresses can vary greatly, causing the hash algorithm to distribute the connections in an unpredictable fashion. The idea is that there should be a large distribution of address values, causing the connections to be distributed more or less equally among the firewalls. The CSM must also build an ARP cache so that it can communicate with other devices. To display the MAC and IP address associations it has built, you can use the show module csm mod arp command: Switch# show module csm 7 arp Internet Address Physical Interface VLAN Type Status -------------------------------------------------------------------- 192.168.199.1 00-02-FC-E0-7E-B2 400 --SLB-- local 192.168.200.1 00-02-FC-E0-7E-B2 200 --SLB-- local 192.168.200.3 00-0B-46-B3-4E-40 200 REAL up(0 misses) 192.168.200.4 00-0B-5F-0C-8A-C0 200 REAL up(0 misses) 192.168.200.5 00-90-27-6C-3D-0A 200 REAL up(0 misses) 192.168.199.100 00-50-E2-C6-F6-80 400 LEARNED up(0 misses) Switch#
fThe --SLB-- entries are the CSM VLAN interfaces, the REAL entries are the configured firewall addresses, and the LEARNED entries have been learned from traffic on a VLAN. To see a quick summary of how the CSM probes have been configured, use the show module csm mod probe icmp command: Switch# show module csm 7 probe icmp probe type interval retries failed open receive --------------------------------------------------------------------- FARM-PROBE-INSIDE icmp 10 2 300 10 Switch#
Here, the probe is using ICMP at 10-second intervals. The probe waits 10 seconds to receive a reply and declares the firewall failed after two probes go unanswered. Finally, as soon as a firewall is in the failed state, the CSM waits 300 seconds before trying to probe again. You might also be interested in monitoring the connections that are load-balanced by a CSM. The show module csm mod conns command displays a list of the active connections: Switch# show module csm 7 conns prot vlan source destination state ---------------------------------------------------------------------- In TCP 400 192.168.199.100:13825 10.1.17.9:23 ESTAB Out TCP 200 10.1.17.9:23 192.168.199.100:13825 ESTAB In TCP 400 192.168.199.100:13313 10.1.17.8:23 ESTAB Out TCP 200 10.1.17.8:23 192.168.199.100:13313 ESTAB In TCP 400 192.168.199.100:12801 10.1.17.7:23 ESTAB Out TCP 200 10.1.17.7:23 192.168.199.100:12801 ESTAB In TCP 400 192.168.199.100:11265 10.1.17.4:23 ESTAB Out TCP 200 10.1.17.4:23 192.168.199.100:11265 ESTAB Each is shown with the In and Out VLANs, so you can see the connection traffic in both directions. Notice that the CSM doesn't have a way to display a connection and the firewall that has been assigned to handle it. |
|