Configuring The Load Balancing Cluster Attributes - Cisco PIX 500 Series Configuration Manual

Security appliance command line
Hide thumbs Also See for PIX 500 Series:
Table of Contents

Advertisement

Configuring Load Balancing

Configuring the Load Balancing Cluster Attributes

To configure the load-balancing cluster attributes for each device in the cluster, do the following steps:
Step 1
Set up VPN load balancing by entering the vpn load-balancing command in global configuration mode:
hostname(config)# vpn load-balancing
hostname(config-load-balancing)#
This enters vpn-load-balancing configuration mode, in which you can configure the remaining
load-balancing attributes.
Configure the IP address of the cluster to which this device belongs. This command specifies the single
Step 2
IP address that represents the entire virtual cluster. Choose an IP address that is within the public subnet
address range shared by all the security appliances in the virtual cluster
hostname(config-load-balancing)# cluster ip address ip_address
hostname(config-load-balancing)#
For example, to set the cluster IP address to 192.168.10.10, enter the following command:
hostname(config-load-balancing)# cluster ip address 192.168.10.10
hostname(config-load-balancing)#
Configure the cluster port.This command specifies the UDP port for the virtual cluster in which this
Step 3
device is participating. The default value is 9023. If another application is using this port, enter the UDP
destination port number you want to use for load balancing.
hostname(config-load-balancing)# cluster port port_number
hostname(config-load-balancing)#
For example, to set the cluster port to 4444, enter the following command:
hostname(config-load-balancing)# cluster port 4444
hostname(config-load-balancing)#
Step 4
Optionally, enable IPSec encryption for the cluster. The default is no encryption. This command enables
or disables IPSec encryption. If you configure this check attribute, you must first specify and verify a
shared secret.The security appliances in the virtual cluster communicate via LAN-to-LAN tunnels using
IPSec. To ensure that all load-balancing information communicated between the devices is encrypted,
enable this attribute.
hostname(config-load-balancing)# cluster encryption
hostname(config-load-balancing)#
Note
Cisco Security Appliance Command Line Configuration Guide
29-10
When using encryption, you must have previously configured the load-balancing inside
interface. If that interface is not enabled on the load-balancing inside interface, you get an error
message when you try to configure cluster encryption.
If the load-balancing inside interface was enabled when you configured cluster encryption, but
was disabled before you configured the participation of the device in the virtual cluster, you get
an error message when you enter the participate command (or, in ASDM, select the Participate
in Load Balancing Cluster check box), and encryption is not enabled for the cluster.
To use cluster encryption, you musts enable isakmp on the inside interface, using the crypto
isakmp enable command with the inside interface specified.
Chapter 29
Setting General IPSec VPN Parameters
OL-12172-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5500 series

Table of Contents