1.2.3 Ensure 'Failover' is enabled

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Enables failover between the security appliance and another security appliance in order to achieve high availability

Rationale:

Enabling failover helps to meet the availability requirement of the security CIA (Confidentiality - Integrity - Availability) triad, ensuring a physical and logical redundancy of firewalls in order to avoid service disruption should the security appliance or its component fails. It requires to identical systems in hardware and software version connected through a failover and a state links.

Solution

Follow the steps below to enable active/standby failover. The commands are run in the system execution space

* Step 1: For each appliance, identify the failover link physical interface <failover_interface_physical> and assign it a name <failover_interface_name> and IP address <failover_interface_ip> and subnet mask <failover_interface_mask>. Identify the other device IP address for each appliance as <peer_failover_ip>
* Step 2: For each appliance, identify the state link physical interface <state_interface_physical> and assign it a name <state_interface_name> and IP address <state_interface_ip> and subnet mask <state_interface_mask>. Identify the other device IP address for each appliance as <peer_state_ip>
* Step 3: Run the following on the Active device to set it as primary node

HOSTNAME(CONFIG)#FAILOVER LAN UNIT PRIMARY

* Step 4: Run the following on the Standby device to set it as secondary node

HOSTNAME(CONFIG)#FAILOVER LAN UNIT SECONDARY

* Step 5: Run the following on both security appliances

HOSTNAME(CONFIG)# FAILOVER LAN INTERFACE _<failover_interface_name> <failover_interface_physical>_
HOSTNAME(CONFIG)#FAILOVER INTERFACE IP _<failover_interface_name> <failover_interface_ip>_ _<failover_interface_mask>_ STANDBY _<peer_failover_ip>_
HOSTNAME(CONFIG)#INTERFACE _<failover_interface_physical>_
HOSTNAME(CONFIG-IF)#NO SHUTDOWN
HOSTNAME(CONFIG)#FAILOVER LINK _<state_interface_name> <state_interface_physical>_
<STRONG>HOSTNAME(CONFIG)#failover interface ip _<state_interface_name> <state_interface_ip> <state_interface_mask>_ STANDBY_ <peer_state_ip>_
<STRONG>HOSTNAME(CONFIG)#INTERFACE _<state_interface_physical_<strong>_>_
HOSTNAME(CONFIG-IF)#NO SHUTDOWN
hostname(config)# failover</strong>
HOSTNAME(CONFIG)# WRITE MEMORY

See Also

https://benchmarks.cisecurity.org/tools2/cisco/CIS_Cisco_Firewall_Benchmark_v4.0.0.pdf