Asa Vpn Load Balancing Configuration



Client

Contents

In these times that remote work is a must in most companies, IT teams need a fast and reliable way to improve and rapidly grow in remote access VPN capabilities. One of the fastest ways to do that is to deploy Cisco ASAs with VPN load balancing. The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes.

Introduction

Load balancing is the ability to have Cisco VPN Clients shared across multiple Adaptive Security Appliance (ASA) units without user intervention. Load-balancing ensures that the public IP address is highly available to users. For example, if the Cisco ASA that services the public IP address fails, another ASA in the cluster assumes the public IP address.

Prerequisites

Requirements

Ensure that you meet these requirements before you attempt this configuration:

  • You have assigned IP addresses on your ASAs and configured the default gateway.

  • IPsec is configured on the ASAs for the VPN Client users.

  • VPN users are able to connect to all ASAs with the use of their individually assigned public IP address.

  • Asa Load Balancing Vpn And Aws Asa Vpn Configuration GET Asa Load Balancing Vpn And Aws Asa Vpn Configuration IN LOW PRICES.
  • The ASA distributes the traffics to all Interfaces, which means you have the functioning Load balancing, furthermore if you lost one or two Interface the whole traffics will be distribute to the Interfaces which are available. If you run the Port Channel on the ASA then you are permitted to make up to 200 VLANs.
  • Apply the following to both ASA’s: enable conf t sysopt connection tcpmss 1350 sysopt connection preserve-vpn-flows. The first command clamps the TCP MSS/payload to 1350 bytes, and the second command keeps stateful connections even if the vpn temporarily drops. North ASA config.
  • Cluster Configuration Select Configuration Features VPN Load Balancing, and check Participate in Load Balancing Cluster to enable VPN. Complete these steps to configure the parameters for all ASAs participating in the cluster in the VPN Cluster. Type the IP address of the cluster in the.

Eligible Clients

Load balancing is effective only on remote sessions initiated with these clients:

  • Cisco VPN Client (release 3.0 or later)

  • Cisco VPN 3002 Hardware Client (release 3.5 or later)

  • CiscoASA 5505 when acting as an Easy VPN client

All other clients, including LAN-to-LAN connections, can connect to a security appliance on which load balancing is enabled, but they cannot participate in load balancing.

Components Used

The information in this document is based on these software and hardware versions:

  • VPN Client Software Releases 4.6 and later

  • Cisco ASA Software Releases 7.0.1 and later

    Note: Extends load balancing support to ASA 5510 and ASA models later than 5520 that have a Security Plus license with the 8.0(2) version.

The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Network Diagram

This document uses this network setup:

Conventions

Refer to the Cisco Technical Tips Conventions for more information on document conventions.

Restrictions

  • VPN virtual cluster IP address, User Datagram Protocol (UDP) port, and shared secret must be identical on every device in the virtual cluster.

  • All devices in the virtual cluster must be on the same outside and inside IP subnets.

Configuration

IP Address Assignment

Ensure that the IP addresses are configured on the outside and inside interfaces and you are able to get to the Internet from your ASA.

Note: Ensure that ISAKMP is enabled on both the inside and outside interface. Select Configuration > Features > VPN > IKE > Global Parameters in order to verify this.

Cluster Configuration

This procedure shows how to use the Cisco Adaptive Security Device Manager (ASDM) to configure load balancing.

Asa Vpn Load Balancing Configuration

Note: Many of the parameters in this example have default values.

  1. Select Configuration > Features > VPN > Load Balancing, and check Participate in Load Balancing Cluster to enable VPN load balancing.

  2. Complete these steps to configure the parameters for all ASAs participating in the cluster in the VPN Cluster Configuration group box:

    1. Type the IP address of the cluster in the Cluster IP Address text box.

    2. Click Enable IPSec Encryption.

    3. Type the encryption key in the IPSec Shared Secret text box and type it again in the Verify Secret text box.

  3. Configure the options in the VPN Server Configuration group box:

    1. Select an interface that accepts the incoming VPN connections in the Public list.

    2. Select an interface that is the private interface in the Private list.

    3. (Optional) Change the priority that the ASA has in the cluster in the Priority text box.

    4. Type an IP address for the Network Address Translation (NAT) Assigned IP Address if this device is behind a firewall that uses NAT.

  4. Repeat the steps on all the participating ASAs in the group.

The example in this section uses these CLI commands to configure load balancing:

Monitoring

Select Monitoring > Features > VPN > VPN Statistics > Cluster Loads to monitor the load balancing feature on the ASA.

Verify

Use this section to confirm that your configuration works properly.

The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output.

  • show vpn load-balancing—Verifies the VPN load balancing feature.

Troubleshoot

Balancing

Use this section to troubleshoot your configuration.

Troubleshooting Commands

The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output.

Note: Refer to Important Information on Debug Commands before you use debug commands.

  • debug vpnlb 250—Used to troubleshoot the VPN load balancing feature.

Asa Vpn Load Balancing Configuration App

Related Information