Uploaded by kritikatipl

HA (1)

advertisement
Kritika Sharma
Epm# 7608
High Availability
Use
●
HA1 logs
Less mp-log ha_agent.log
To reduce dependency on single FW
Modes
Active -Active
Active - Passive
Link monitoring daemon
BRD-agent
HA1 Daemon -> HA-agent
HA2 Daemon - > PAN-DHA
Active (Management Plane/out of band ) - Passive (Data Plane /in
band port)
***Passive device is not participating in Traffic (ARP learning & packet
forwarding) nor responding on broadcast msg,Because of that switch
can’t lean MAC address of Passive FW******** until & unless GARP will
not triggered****
Non- monitoring Traffic :
PAN-OS upgrade / License
(This all part of
Management Plane)
​
​Election
setting
Lowest = Best
Default Priority : 100
Group Id : 1-63 must be same
on both FW
Active - Active – (Split Brain )
In every 20sec Passive FW send Hello msg/Raw
ping msg to active FW if 3 continuous msg are
respond delayed by active , passive FW declare it
self active and active still working as active
Dedicated Ports
800
3K/5K/7K
1.
Priority set -Less
Priority wins
2.
Less Mac address wins
3.
Small IP address wins
Hold time
Preemptive -After the failover
FW waiting for preemptive time
holder to become Active again
Forcefully taking control back ,
should be mark on both
Promotion - When Passive peer
waiting before declaring herself
active
Pre-Requirement to be HA pair
1. Same PAN-OS version (9.0.0-Plug ins)
Maximum no of Flaps :
Active to non-functional : 3
2. Hardware - NA1 config
3. Plugins - H1, H2
4. Configuration
5. Licenses
HA2 responsible
Session sync- work on MAC no need to assign IP -PAN-DHA
daemon
It is taking all sessions from the active & landing towards the passive.
HA1 responsible
Syn control Plane need to assign IP Or on IP address
1.Heartbeats - Are Raw ping msg work on TCP port no 28769
(Passive to Active )
Flap is happening 3 time
conjunctively
Link Monitoring
Is related to Ethernets
Individual : Any
Group : All
Then Group will be preferred
Path monitoring
Is related to upstream and
downstream device with the
help of static route ping we can
check their status
HA1- TCP port no 28769 with HA-Agent Daemon for clear
text communication with peers.- we configured in clear
text
TCP use port no 28 for encrypted connection over SSH
(see below image)
Key exchange
HA1-backup - 28770 with work on heartbeats and hello
msg
HA1-back use heartbeats and hello msg
Who generates Heartbeats ?
Passive FW: in every 20sec heartbeats sent by passive to active.
(Router/switches)
Every 200ms msg trigger after
missed of 2 times failover will
occurs
If Active FW doesn't reply after 3 conjunctive pings msg , passive
declare it self Active
2.Hello Msg : (Active to Passive)
Is MD5# value of the Active FW’s Running configuration
HA-running-config.local.Xml (# value)
Passive compare previous # value with new if difference to config
sync
Passive FW Do state syn if previous MD5# the value is differ from the
current.
3.State Syn : (who is who)
A. Inti : staying for 60sec after bootup, for pair discovery &
negotiation waiting , device become active if negotiation (who
is active who is passive )haven't started
B. Active : Traffic handling operational state (Priority is less , IP
and MAc are shorter and less)
A. Passive : Normal Backup Sate , Traffic handling interface are
maintained under up/down depending upon the config.
Passive state will change if GARP Trigger
B. Tentative : due to analysis purpose we have marked FW under
this state
C. Suspended : 3 Flaps
Active-NoN-Functional-Passive-Active
Active-NoN-Functional-Passive-Active
Active-NoN-Functional-Passive-Active
Suspended
Switch off the HA pair and remove from the HA pair
D. Non-Functional : when any active FW is not working well due
to error
4. Config Syn : like Hello Msg
5. Compatibility exchange
Msg exchange called TLV msg
●
●
●
●
●
Same PAN-OS version (9.0.0-Plug ins)
Hardware
Plugins - H1, H2
Configuration
Licenses
# Imp
HA1 - & - HA1 backup should be on different networks
HA1-Backup & HA2- Backup– interface backup is optional
Syn to peer come when peera identify
Bses on HA1 we decided how is active and passive
●
●
●
●
Capability exchange
State syn (who is who)
Hello msg
1st config syn is manual
Question : I'm not able to see the config after done with configuration ?
Ans : This is the very 1st config syn
Initially both FW's are out of sync : A manually configuration syn needed to be done on both to bring the
firewall into a sync state and enable automated config sync
# Imp- Don’t get sync in HA
Device specify configuration
As we know passive firewall replicated active firewalls data - but ACC application command centers and log data
are not syn
# Imp -Failover cases
Case 1:
When active Firewall didn’t respond , Passive FW’s three continuous raw ping msgs - Failover occurs
Active/Passive heartbeats polling
Case 2:
When Management plane didn’t boot up properly , make cause of Failover occurs
****MP take decisions of Data Plane*****
Case 3:
When priority is changed
Seems like Failover but not
# Imp - Summary
Device-High Availability
How to we know HA2 is fail with help of keep-Alive
Failover occured when link monitoring is enable
1.
Any of FW interface is down it will occured
2.
Management to Management Plane HA1 goes down then if link monitoring was enabled then failover , If no
link monitoring then Split-Brain will happen , solution of Split brain is HA1 Backup.
3.
Active FW busy in Management plane work , Passive was waiting for heartbeats reply and 3 pings
continuous was missed then it will wait until promotion hold timer and declare it self Active
Management Plane of FW1 HA1 is refused to boot o Active FW
Why HA1 is down
if HA1 link is down and there is no configured HA1 backup link or if HA1 link is down and HA1 backup link is
configured but also down then stabilize your HA setup by suspending the "passive" firewall in A/P setup and the
"active secondary" in A/A setup to avoid "split brain" problem this can be done under Device > High Availability
> Operational Commands by clicking on "Suspend local device for high availability" then proceed with
troubleshooting HA1 link down.
Syn to peer only come when peer identify
Auto — > interface are up but in disable mode not participating in ARP learning & Forwarding
HA1 is Down : Reason
Peer IP need to check 2. Own IP need to check 3. HA Enable forgot to check 4. Group Id is not same 5. Mode
issue selected wrong
HA1 link is down — > what will next
Active suspend , Remove from Pair— Peer unknow —> Passive become Active (No link monitoring )---To
HA1 link is fine — >
Active FW due to business didn;t reply 3 continuous heartbeats —> Passive become Active and active still
Active —- Split Brain
HA2 Down
Session syn mismatch
suspend Can
suspend Active from CLI —- > Request HA suspend
Administrator —> Device HA→ Manually Suspend
3 Flaps A-NF-P-A A-NF-P-A A-NF-P-A
If an HA link is down trace the physical cable and troubleshoot Layer 1 using KB article
●
Normal FW divided into
●
Management plane (Config-login-reporting ) and Data plane
●
●
Data plane for interfaces & Traffic
●
HA-Agent
●
PAN-DHA
●
BRDagent link monitoring - link flapping
●
AuthD
●
RoutD (Management)- all possible route
●
Mp-Reply Best Rout twin demon with RoutD no sysd support for communication
●
IKE-Mgr IPsec Phase 1
●
TunnD IPsec Phase 2
●
SSLVN GP Demon
●
rcrvr
●
MServer
URL filtering
configuration Management
Active-Active
Both FW are using for monitoring purpose
Active Primary
Active secondary
Which part of Traffic Handle by Which FW we need to monitor - For That we use HA3
Session-ID was created by Primary active and now traffic was handing by secondary FW this type of Asymmetric
routing
Firewall constant disconnection from Panorama
1.
Check IP connectivity between the devices.
2.
Make sure port 3978 is open and available from the device to Panorama.
3.
Make sure that a certificate has been generated or installed on Panorama.
4.
Confirm the serial number configured in Panorama (case sensitive).
5.
If a permitted IP list is configured for the management interface, make sure that Panorama IP is allowed in the list. By
default, it will allow all IPs if a list is not specified.
6.
Make sure Panorama is on a version greater than or equal to that of the managed devices. Panorama can manage
devices running supported PAN-OS versions of the same or a lower release.
7.
Check MTU settings on the managed device, as the value may need to be reduced. If a device on the path is fragmenting
packets, communication from Managed Device to Panorama will not succeed. Check the MTU settings on intermediate
router as well.
8.
Verify that there is not a large time difference between the clock (Date/Time) on Panorama and the clock (Date/Time) on
the managed device.
Panorama
•
Panorama is a centralized management tool which is used to manage firewall configuration,
log management and reporting.
1.
Legacy mode
Only VM series Panorama can be configured in legacy mode.
Only one virtual disk is supported at a time.
52 GB System disk space required
11 GB is used for log storage
Used for managing firewall configuration and logs are forwarded but limited
disk space.
2.
Panorama mode
i.
8.0 and later, VM Panorama can be configured in mixed.
ii.
What is mixed mode?
1.
iii.
Cannot be configured as a dedicated logger.
iv.
81GB system disk space is required
v.
3.
Can be used to manage firewalls and be
configured as a log collector
Virtual disks can be added for log collection. Each disk can be upto
2TB.
Management Only mode
a.
Introduced from PANOS 8.1
b.
Minimum requirement is 4 CPU and 8 GB memory
c.
It is only responsible for managing the firewalls.
d.
Log collection is not supported.
e.
4.
A panorama running in Management-Only mode will not have any
internal log-collector. So, Panorama will drop incoming device logs from
devices.
Log Collector mode
a.
Introduced in 8.1 and later.
b.
Minimum requirement 16gb memory and 8 CPU's
c.
All collectors in collector group must be same platform.
d.
Each virtual disk should be 2 GB up to 12 disks.
e.
NFS is not supported
varrcvr
ha_agent
ikemgr
rasmgr
routed
dhcpd
logrcvr
websrvr
sslmgr
satd
authd
pppoed
dnsproxyd
cryptod
sslvpn
l2ctrld
useridd
Download