- Configuring NAT for IP Address Conservation
- Using Application-Level Gateways with NAT
- MSRPC ALG Support for Firewall and NAT
- Configuring NAT for High Availability
- Integrating NAT with MPLS VPNs
- Monitoring and Maintaining NAT
- Configuring Stateful Interchassis Redundancy
- Stateless Network Address Translation 64
- Stateful Network Address Translation 64
- Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- IP Multicast Dynamic NAT
- Match-in-VRF Support for NAT
- Finding Feature Information
- Restrictions for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Information About Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- How to Configure Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Configuration Examples for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Example: Configuring a Redundancy Application Group and a Redundancy Group Protocol
- Example: Configuring Data, Control, and Asymmetric Routing Interfaces
- Example: Configuring a Redundant Interface Identifier and Asymmetric Routing on an Interface
- Example: Configuring Dynamic Inside Source Translation with Asymmetric Routing
- Additional References
- Feature Information for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
The Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT feature supports the forwarding of packets from a standby redundancy group to the active redundancy group for packet handling. If this feature is not enabled, the return TCP packets forwarded to the router that did not receive the initial synchronization (SYN) message are dropped because they do not belong to any known existing session.
This module provides an overview of asymmetric routing and describes how to configure asymmetric routing
- Finding Feature Information
- Restrictions for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Information About Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- How to Configure Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Configuration Examples for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Additional References
- Feature Information for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Restrictions for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
Information About Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Asymmetric Routing Overview
- Asymmetric Routing Support in Firewalls
- Asymmetric Routing in NAT
- Asymmetric Routing in a WAN-LAN Topology
Asymmetric Routing Overview
Asymmetric routing occurs when packets from TCP or UDP connections flow in different directions through different routes. In asymmetric routing, packets that belong to a single TCP or UDP connection are forwarded through one interface in a redundancy group (RG), but returned through another interface in the same RG. In asymmetric routing, the packet flow remains in the same RG. When you configure asymmetric routing, packets received on the standby RG are redirected to the active RG for processing. If asymmetric routing is not configured, the packets received on the standby RG may be dropped.
Asymmetric routing determines the RG for a particular traffic flow. The state of the RG is critical in determining the handling of packets. If an RG is active, normal packet processing is performed. In case the RG is in a standby state and you have configured asymmetric routing and the asymmetric-routing always-divert enable command, packets are diverted to the active RG. Use the asymmetric-routing always-divert enable command to always divert packets received from the standby RG to the active RG.
The figure below shows an asymmetric routing scenario with a separate asymmetric-routing interlink interface to divert packets to the active RG.
Figure 1 | Asymmetric Routing Scenario |
The following rules apply to asymmetric routing:
- 1:1 mapping exists between the redundancy interface identifier (RII) and the interface.
- 1:n mapping exists between the interface and an RG. (An interface can have multiple RGs.)
- 1:n mapping exists between an RG and applications that use it. (Multiple applications can use the same RG).
- 1:1 mapping exists between an RG and the traffic flow. The traffic flow must map only to a single RG. If a traffic flow maps to multiple RGs, an error occurs.
- 1:1 or 1:n mapping can exist between an RG and an asymmetric-routing interlink as long as the interlink has sufficient bandwidth to support all the RG interlink traffic.
Asymmetric routing consists of an interlink interface that handles all traffic that is to be diverted. The bandwidth of the asymmetric-routing interlink interface must be large enough to handle all expected traffic that is to be diverted. An IPv4 address must be configured on the asymmetric-routing interlink interface, and the IP address of the asymmetric routing interface must be reachable from this interface.
Note |
We recommend that the asymmetric-routing interlink interface be used for interlink traffic only and not be shared with high availability (HA) control or data interfaces because the amount of traffic on the asymmetric-routing interlink interface could be quite high. |
Asymmetric Routing Support in Firewalls
For intrabox asymmetric routing support, the firewall does a stateful Layer 3 and Layer 4 inspection of Internet Control Message Protocol (ICMP), TCP, and UDP packets. The firewall does a stateful inspection of TCP packets by verifying the window size and order of packets. The firewall also requires the state information from both directions of the traffic for stateful inspection. The firewall does a limited inspection of ICMP information flows. It verifies the sequence number associated with the ICMP echo request and response. The firewall does not synchronize any packet flows to the standby redundancy group (RG) until a session is established for that packet. An established session is a three-way handshake for TCP, the second packet for UDP, and informational messages for ICMP. All ICMP flows are sent to the active RG.
The firewall does a stateless verification of policies for packets that do not belong to the ICMP, TCP, and UDP protocols.
The firewall depends on bidirectional traffic to determine when a packet flow should be aged out and diverts all inspected packet flows to the active RG. Packet flows that have a pass policy and that include the same zone with no policy or a drop policy are not diverted.
Note |
The firewall does not support the asymmetric-routing always-divert enable command that diverts packets received on the standby RG to the active RG. By default, the firewall forces all packet flows to be diverted to the active RG. |
Asymmetric Routing in NAT
By default, when asymmetric routing is configured, Network Address Translation (NAT) processes non-ALG packets on the standby RG, instead of forwarding them to the active. The NAT-only configuration (that is when the firewall is not configured) can use both the active and standby RGs for processing packets. If you have a NAT-only configuration and you have configured asymmetric routing, the default asymmetric routing rule is that NAT will selectively process packets on the standby RG. You can configure the asymmetric-routing always-divert enable command to divert packets received on the standby RG to the active RG. Alternatively, if you have configured the firewall along with NAT, the default asymmetric routing rule is to always divert the packets to the active RG.
When NAT receives a packet on the standby RG and if you have not configured the diverting of packets, NAT does a lookup to see if a session exists for that packet. If a session exists and there is no ALG associated for that session, NAT processes the packet on the standby RG. The processing of packets on the standby RG when a session exists significantly increases the bandwidth of the NAT traffic.
ALGs are used by NAT to identify and translate payload and to create child flows. ALGs require a two-way traffic to function correctly. NAT must divert all traffic to the active RG for any packet flow that is associated with an ALG. This is accomplished by checking if ALG data that is associated with the session is found on the standby RG. If ALG data exits, the packet is diverted for asymmetric routing.
Asymmetric Routing in a WAN-LAN Topology
Figure 2 | Asymmetric Routing in a WAN-LAN Topology |
How to Configure Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Configuring a Redundancy Application Group and a Redundancy Group Protocol
- Configuring Data, Control, and Asymmetric Routing Interfaces
- Configuring a Redundant Interface Identifier and Asymmetric Routing on an Interface
- Configuring Dynamic Inside Source Translation with Asymmetric Routing
Configuring a Redundancy Application Group and a Redundancy Group Protocol
DETAILED STEPS
Configuring Data, Control, and Asymmetric Routing Interfaces
Note |
Asymmetric routing, data, and control must be configured on separate interfaces. |
DETAILED STEPS
Configuring a Redundant Interface Identifier and Asymmetric Routing on an Interface
DETAILED STEPS
Configuring Dynamic Inside Source Translation with Asymmetric Routing
The following configuration is a sample dynamic inside source translation with asymmetric routing. You can configure asymmetric routing with the following types of NAT configurations--dynamic outside source, static inside and outside source, and Port Address Translation (PAT) inside and outside source translations. For more information on different types of NAT configurations, see the "Configuring NAT for IP Address Conservation" chapter.
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Device> enable |
|
|
Example: Device# configure terminal |
Enters global configuration mode. |
|
Example: Device(config)# interface gigabitethernet 0/1/3 |
Configures an interface and enters interface configuration mode. |
|
Example: Device(config-if)# ip address 10.1.1.1 255.255.255.0 |
Sets a primary IP address for an interface. |
|
Example: Device(config-if)# ip nat outside |
Marks the interface as connected to the outside. |
|
Example: Device(config-if)# exit |
Exits interface configuration mode and enters global configuration mode. |
|
Example: Device(config)# redundancy |
Configures redundancy and enters redundancy configuration mode. |
|
Example: Device(config-red)# application redundancy |
Configures application redundancy and enters redundancy application configuration mode. |
|
Example: Device(config-red-app)# group 1 |
Configures a redundancy group and enters redundancy application group configuration mode. |
|
Example: Device(config-red-app-grp)# asymmetric-routing always-divert enable |
Diverts the traffic to the active device. |
|
Example: Device(config-red-app-grp)# end |
Exits redundancy application group configuration mode and enters privileged EXEC mode. |
|
Example: Device# configure terminal |
Enters global configuration mode. |
|
Example: Device(config)# ip nat pool pool1 prefix-length 24 |
|
|
Example: Device(config-ipnat-pool)# exit |
Exits IP NAT pool configuration mode and enters global configuration mode. |
|
Example: Device(config)# ip nat inside source list pool pool1 redundancy 1 mapping-id 100 |
Enables NAT of the inside source address and associates NAT with a redundancy group by using the mapping ID. |
|
Example: Device(config)# access-list 10 permit 10.1.1.1 255.255.255.0 |
Defines a standard access list for the inside addresses that are to be translated. |
|
Example: Device(config)# end |
Exits global configuration mode and enters privileged EXEC mode. |
Configuration Examples for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
- Example: Configuring a Redundancy Application Group and a Redundancy Group Protocol
- Example: Configuring Data, Control, and Asymmetric Routing Interfaces
- Example: Configuring a Redundant Interface Identifier and Asymmetric Routing on an Interface
- Example: Configuring Dynamic Inside Source Translation with Asymmetric Routing
Example: Configuring a Redundancy Application Group and a Redundancy Group Protocol
Device# configure terminal Device(config)# redundancy Device(config-red)# application redundancy Device(config-red-app)# group 1 Device(config-red-app-grp)# name group1 Device(config-red-app-grp)# priority 100 failover threshold 50 Device(config-red-app-grp)# preempt Device(config-red-app-grp)# track 50 decrement 50 Device(config-red-app-grp)# exit Device(config-red-app)# protocol 1 Device(config-red-app-prtcl)# timers hellotime 3 holdtime 10 Device(config-red-app-prtcl)# authentication md5 key-string 0 n1 timeout 100 Device(config-red-app-prtcl)# bfd Device(config-red-app-prtcl)# end
Example: Configuring Data, Control, and Asymmetric Routing Interfaces
Device# configure terminal Device(config)# redundancy Device(config-red)# application redundancy Device(config-red-app)# group 1 Device(config-red-app-grp)# data GigabitEthernet 0/0/0 Device(config-red-app-grp)# control GigabitEthernet 0/0/2 protocol 1 Device(config-red-app-grp)# timers delay 100 reload 400 Device(config-red-app-grp)# asymmetric-routing interface GigabitEthernet 0/1/1 Device(config-red-app-grp)# asymmetric-routing always-divert enable Device(config-red-app-grp)# end
Example: Configuring a Redundant Interface Identifier and Asymmetric Routing on an Interface
Device# configure terminal Device(config)# interface GigabitEthernet 0/1/3 Device(config-if)# redundancy rii 600 Device(config-if)# redundancy group 1 decrement 20 Device(config-if)# redundancy asymmetric-routing enable Device(config-if)# end
Example: Configuring Dynamic Inside Source Translation with Asymmetric Routing
Device(config)# interface gigabitethernet 0/1/3 Device(config-if)# ip address 10.1.1.1 255.255.255.0 Device(config-if)# ip nat outside Device(config-if)# exit Device(config)# redundancy Device(config-red)# application redundancy Device(config-red-app)# group 1 Device(config-red-app-grp)# asymmetric-routing always-divert enable Device(config-red-app-grp)# end Device# configure terminal Device(config)# ip nat pool pool1 prefix-length 24 Device(config-ipnat-pool)# exit Device(config)# ip nat inside source list pool pool1 redundancy 1 mapping-id 100 Device(config)# access-list 10 permit 10.1.1.1 255.255.255.0
Additional References
Related Documents
Related Topic | Document Title |
---|---|
Cisco IOS commands |
|
Security commands |
|
Firewall inter-chassis redundancy |
"Configuring Firewall Stateful Inter-Chassis Redundancy" module |
NAT inter-chassis redundancy |
Standards and RFCs
Standard/RFC | Title |
---|---|
No new or modified standards or RFCs are supported by this feature, and support for existing standards or RFCs has not been modified by this feature. |
-- |
MIBs
MIB | MIBs Link |
---|---|
No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature. |
To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use Cisco MIB Locator found at the following URL: |
Technical Assistance
Description | Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT |
Feature Name | Releases | Feature Information |
---|---|---|
Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT |
Cisco IOS XE Release 3.5S |
The Interchassis Asymmetric Routing Support for Zone-Based Firewall and NAT feature supports the forwarding of packets from a standby redundancy group to the active redundancy group for packet handling. The following commands were introduced or modified: asymmetric-routing, redundancy asymmetric-routing enable. |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.