The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes some of the common issues with the Spanned EtherChannel Transparent Mode Inter-Site cluster.
Cisco recommends that you have knowledge of these topics:
This document is not restricted to specific software and hardware versions.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.
Starting ASA version 9.2, inter-site clustering is supported wherein the ASA units could be located in different datacenters and the Cluster Control Link (CCL) is connected over a Data Center Interconnect (DCI). The possible deployment scenarios are:
When a MAC address in the Content Addressable Memory (CAM) table changes port, a MAC MOVE notification is generated. However, a MAC MOVE notification is not generated when MAC address is added or removed from the CAM table. Suppose if a MAC address X is learned via interface GigabitEthernet0/1 in VLAN10 and after some time the same MAC is seen through GigabitEthernet0/2 in VLAN 10, then a MAC MOVE notification is generated.
Syslog from Switch:
NEXUS7K %L2FM-4-L2FM_MAC_MOVE: Mac 000c.8142.2600 in vlan 10 has moved from GigabitEthernet0/1 to GigabitEthernet0/2
Syslog from ASA:
ASA-4-412001: MAC 003a.7b58.24c5 moved from DMZ to INSIDE
Inter-site cluster deployment wherein the ASAs are configured in transparent mode bridging VLAN 1535 and VLAN 35. The inside VLAN 35 is extended over the Overlay Transport Virtualization (OTV) whereas the outside VLAN 1535 is not extended over the OTV, as shown in the image
Traffic destined to a MAC address whose entry is not present on the ASA's MAC table, as shown in the image:
In a transparent ASA, If the destination MAC address of the packet arriving on the ASA is not in the mac-address table, it sends out an Address resolution Protocol (ARP) request for that destination (if in the same subnet as BVI) or an Internet Control Message Protocol (ICMP) request with Time To Live 1(TTL 1) with source MAC as the Bridge Virtual Interface (BVI) MAC address and destination MAC address as Destination Media Access Controller (DMAC) is missed.
In the preceding case, you have these traffic flow:
It is a corner scenario. MAC tables are synchronized in clusters, so it is less likely for a member to not have an entry for a particular host. An occasional MAC-move for cluster-owned BVI MAC is deemed acceptable.
Centralized flow processing by ASA, as shown in the image:
Inspection based traffic across an ASA cluster is classified into three types:
In the case of Centralized inspection, any traffic which needs to get inspected is redirected to the master unit of the ASA cluster. If a slave unit of the ASA cluster receives the traffic, it is forwarded to the master via the CCL.
In the earlier image, you work with SQL traffic which is a Centralized Inspection Protocol (CIP) and the behavior described here is applicable for any CIP.
You receive the traffic on Datacenter 2 where you only have slave units of the ASA cluster, the master unit is located at Datacenter 1 which is ASA 1.
It is recommended to route centralized connections to whichever site hosts the master (based on priorities), as shown in the image:
For an Inter Domain Controller (DC) communication in transparent mode, this specific traffic flow is not covered or documented but this specific traffic flow does work from an ASA flow processing standpoint. However, it can result in MAC move notifications on the switch.
Traffic generated by the ASA, as shown in the image:
This specific case will be observed for any traffic which gets generated by the ASA itself. Here two possible situations are considered, wherein the ASA either tries to reach an Network Time Protocol (NTP) or a Syslog server, which are on the same subnet as that of its BVI interface.However it is not only limited to these two conditions, this situation can happen whenever traffic is generated by the ASA for any IP address which is directly connected to the BVI IP addresses.
Traffic destined to BVI IP address of the ASA from a directly connected Host, as shown in the image:
A MAC MOVE can also be observed at times when traffic is destined to the ASA's BVI IP address.
In the scenario, we have a Host machine on a directly connected network of the ASA and is trying to connect to the ASA.
ASA set to deny traffic along with which it sends a RST to the Host, as shown in the image:
In this case, we have a host Host 1 on VLAN 35, it tries to communicate with Host 2 in the same Layer 3 VLAN, however, Host 2 is actually on Datacenter 2 VLAN 1535.
There is currently no verification procedure available for this configuration.
There is currently no specific troubleshooting information available for this configuration.