Tuesday, May 31, 2022

configure the "capability vrf lite"

 It is noteworthy to mention that on Cisco routers, if an OSPF process is run in a VRF then it automatically and unconditionally considers itself to be an ABR - it believes to be connected to a so-called MPLS Superbackbone (even though there may be no BGP/MPLS configured on the router at all).

This may pose problems if such a router is actually a part of a network that uses multiple areas. Consider the following scenario:

R1 (VRF) --- Link in Area 1 --- R2 --- Link in Area 0 --- R3

Here, R2 is obviously an ABR because it has two links, one in Area 0, the other in Area 1. R1 is, by all means, an internal router in Area 1. However, because R1 runs the link toward R2, and OSPF over this link, in a VRF, R1 considers itself to also be an ABR toward the MPLS Superbackbone.

As a result, R1 - thinking it is an ABR - will not place any networks from Area 0 nor from any other area behind R2 into its routing table, because by OSPF rules, an ABR processes only those inter-area routes (that is, LSA-3 and LSA-4) that have been received over an adjacency in Area 0, and R1 has no such adjacency. The end result will be that R1 will be unable to talk with any network outside its own Area 1.

This behavior on R1 is also deactivated by the

"capability vrf-lite" command.

Thus, "capability vrf-lite" has several effects:

  • The router stops considering itself as the ABR connected to the MPLS Superbackbone
  • The router will ignore the DN bit set in LSA-3, LSA-5 and LSA-7, and will not set this bit when doing redistribution into OSPF
  • The router will ignore the tag value received in LSA-5 and LSA-7, and it will not set this value to any specific value when doing redistribution into OSPF.
Refer:

https://community.cisco.com/t5/routing/where-to-configure-the-quot-capability-vrf-lite-quot-on-ce-or-pe/td-p/2812305

Thursday, May 5, 2022

Advertise directly connected subnet in BGP in Palo alto

To advertise a directly connected subnet in BGP on Palo alto FW, you will need to create a redistribution profile. In that profile you will need to mention the protocol i.e. BGP or OSPF you want to run.




Wednesday, May 4, 2022

AWS - Direct Connect things to consider

 1. Direct connect gateway to number of vpc contraint. We can only connect 10 VPCs(via VGW - virtual pvt gateway) per direct connect gateway.

 - https://docs.aws.amazon.com/directconnect/latest/UserGuide/limits.html

2. Can have only 1 transit VIF per direct connect circuit.

3. Consider latency on the circuit and the physical path

4. Make sure that Direct connect circuits are not connected on a single hardware. Should raise a ticket with AWS to confirm that.


Monday, May 2, 2022

Broadcast traffic handling on Cisco 9500

 

Broadcast traffic handling on Cisco 9500

 

Faced interesting issue today - 


Traffic coming from remote site with destination IP of broadcast IP was not getting any replies. Performed packet capture on C9500 outgoing SVI and found that traffic was not going out.


Found this link of cisco blog to fix the issue.


Need to apply ip network-broadcast on incoming SVI and ip directed-broadcast on outgoing SVI to fix the issue!

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/17-3/configuration_guide/rtng/b_173_rtng_9500_cg/configuring_ip_unicast_routing.html#topic_jgn_gxx_kgb

 

Feature Information for IP Unicast Routing

Release

Feature

Feature Information

Cisco IOS XE Everest 16.5.1a

IP Unicast Routing

IP Unicast Routing is a routing process that forwards traffic to an unicast address. Routers and Layer 3 switches route packets either through preprogrammed static routes or through default routes.

Cisco IOS XE Amsterdam 17.3.1

New command ip network-broadcast

ip network-broadcast command was introduced to receive and accept network-prefix-directed broadcast packets.

Table 5. Feature Information for IP Unicast Routing







Friday, January 14, 2022

Yum or Apt-get

 Package managers - Yum, apt-get


Which package manager to use in different Linux based OS:

RedHat/AWS Linux uses yum

Ubuntu uses apt-get

Debian uses dpkg

Monday, September 13, 2021

Cisco ASA Failover

 Cisco ASA Failover

For uninterrupted network access using redundancy appliances.

- Uses IP protocol number 105 SCPS - space communications protocol standards)

- Uses IP protocol number 8, 9 for stateful updates


Types of Failover

1. Hardware or Regular Failover

Client had to reconnect using the redundant device.


2. Stateful Failover

Active unit continually passes per-connection state information to the standby unit.

After a failover, same connection information is available at the new active unit. End users

Applications are not required to re-connect to keep the same communication session.


State information passed to the standby unit includes:

- NAT table

-TCP connection state

-UDP connection state

ICMP connection state

-ARP table

-Layer 2 bridge table(if transparent FW mode)

-HTTP connection states

-ISAKMP and IPSec SA table

-SIP signal sessions

-Dynamic Routing Protocols

-Cisco IP soft phone sessions

-VPN


State information NOT passed to the standby unit includes:

- The user authentication(uauth) table

-The HTTP connection table(unless HTTP replication is enabled)

-DHCP server address leases

-State information for modules such as the ASA IPS SSP or ASA CX SSP

SSL VPN features not included in state information:

- Smart tunnels Port forwarding, plugins, Citrix auth, Anyconnect sessions, Java applet.


Failover implementation types:

1. Active-Standby : One primary other secondary, if primary goes down secondary will take its place.

  Only one units passes traffic other units wait.

  Available both in single and multi context mode.


2. Active-Active : Need to two appliances and two security context. Each appliance will be active for one context. Both units pass network traffic

- Units must in multiple context mode.

- Supports both stateful or stateless failover


Hardware requirements:

Must be same model

Must have same type and number of interfaces

Must have same amount of RMA

Same hardware

Same modules

Exception is flash memory. 


Software requirements:

Software version must be same for better performance. 

Must be in same operating mode


License Requirement:

5505: Security plus

5510, 5512-X. :Security Plus

All other models: Base License

*5505 does NOT support Active/active failover and stateful. 

Failover Default Setting:

- No HTTP replication in stateful failover

-A single interface failure causes failover

  • -Interface poll time is 5 sec

-Interface hold time is 25 sec

-Unit poll time is 1 sec

-Unit hold time is 15 sec

-Virtual MAC add are enabled in multiple context mode. Disabled in single context mode.

-Monitoring on all interfaces, or for 5505 and ASASM all VLAN interfaces.


Failover Link

Two units in a failover pair constantly communicate over a failover link and stateful failover to determine 

The operating status of each unit. Like:

Unit state(active or standby)

Hello messages(keep-alive)

Network link status

MAC address exchange

Configuration and replication

*You can use any unused ethernet interface on the device as the failover link.

*Using a cross over ethnic cable to connect the appliance directly.


Stateful Link

To use stateful failover, you must configure a stateful failover link to pass all state information.

You have three options for configuring a stateful failover link:

-You can use a dedicated ethernet interface for the stateful failover link

-If you are using a LAN-Based failover, you can share the failover link

-You can share a regular data interface. However, this option is not recommended.


Device Initialization:

If both units boot simultaneously, then the primary becomes active and secondary unit becomes the standby.

If a unit boots and does not detect a peer, it becomes the active unit.

If a unit boots and detects a peer already running as active, it becomes standby

Primary unit MAC addresses are always coupled with the active IP addresses. The exception to this rule occurs when the secondary unit is active. To solve this problem define static MAC.


Failover Health Monitoring:

Unit Health monitoring: Appliance determines the health of the other unit by monitoring the failover link(keep-alive). 

When a unit doesn’t receive three consecutive hello messages on the failover link, the unit sends the interface hello messages on each interface, including the failover interface to validate whether or not the peer interface is responsive. The action that the security appliance takes depends upon the response from the other unit

Possible actions:

- If the security appliance receives a response on the failover interface, then it does not failover.

- If the security appliance doesn’t receive a response on the failover link, but receives a response on the another interface, then the unit doesn’t’t failover. The failover link is marked as failed. You should restore the failover link ASAP because the unit cannot failover to the standby while the failover link is down.

-If the security appliance doesn’t receive a response on any interface, then the standby unit switches to active mode and classifies the other unit as failed.


Interface Monitoring:

-Link up/down test

-Network activity test

-ARP test

-Ping test- broadcast ping

configure the "capability vrf lite"

 It is noteworthy to mention that on Cisco routers, if an OSPF process is run in a VRF then it automatically and unconditionally considers...