Peer in Cold State. Incremental Sync Failure: SSL Keyfile does not exist

Unanswered Question
Feb 9th, 2010
User Badges:
  • Super Silver, 17500 points or more
  • Cisco Designated VIP,

    2017 Firewalling, Network Management, VPN

I am gettng the subject message when trying to sync my ACE modules. I am running A2(1.0a) right now (about to upgrade to 1.6a).

Both primary and backup ACE report the identical output from a "show crypto files" down to the individual file sizes.

Any tips?

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 4.8 (8 ratings)
Marvin Rhoads Tue, 02/09/2010 - 21:35
User Badges:
  • Super Silver, 17500 points or more
  • Cisco Designated VIP,

    2017 Firewalling, Network Management, VPN

I found the answer in the Cisco Application Control Engine Module SSL Configuration Guide. Basically once you get out of sync (because the keys wern't loaded on both modules in my case) you need to take the units out of aut sync and then but them back in to force a bulk synchronization.

sslcfggd.fmb /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;}

In a redundant configuration, the ACE does not synchronize the SSL certificates and key pairs that are present in the active context to the standby context of an FT group. If the ACE performs a configuration synchronization and does not find the necessary certs and keys on the standby, config sync fails and the standby enters the STANDBY_COLD state. To copy the certs and keys to the standby context, you must export the certs and keys from the active context to an FTP or TFTP server using the crypto export command, and then import the certs and keys to the standby context using the crypto import command. For more information about importing and exporting certs and keys, see the “Importing or Exporting Certificate and Key Pair Files” section.

To return the standby context to the STANDBY_HOT state after a config sync failure, ensure that you have imported the necessary SSL certs and keys to the standby context, and then perform a bulk sync of the active context configuration by entering the following commands in configuration mode in the active context of the FT group: ft auto-sync running-config

2.ft auto-sync running-config

Hope this helps somone else avoid this bump.

huangedmc Wed, 02/10/2010 - 22:16
User Badges:

I see that you plan on upgrading to A2(1.6a).

We'd been running that code for a while, and it had been rock solid until the primary ACE module failed over to secondary after a memory corruption bug hit us: CSCta06378

The bug is fixed in A2(2.3), so I'd go w/ that version instead.

Thanks for the tip about the config sync issue.

Instead of disabling auto-sync and then re-enabling it, we've been doing shut & no shut on the ft interface, which seems to work too.

I'll give your method a try next time we have the same issue.

Sean Merrow Thu, 02/11/2010 - 09:58
User Badges:
  • Silver, 250 points or more


If you need to force a config-sync, you are better off bouncing the ft auto-sync run.  This is because the config-sync is the only thing affected when you do this.  If you bounce the FT interface, you could cause both of your ACE modules to become active (unless you have FT Query VLAN configured).  If the standby ACE becomes active even for a second, it will GARP for the IPs it owns and could corrupt ARP tables in adjacent devices.

Hope this helps,


aakagarw Thu, 05/10/2012 - 22:40
User Badges:
  • Cisco Employee,

Thanks guys,

I am new born baby for ACE, but I know that a bit and learning too. I had similar issue, I found both ACEs had same cert/ssl keys for the context.

All I did went to Active ACE context and : ft auto-sync running-config

2.ft auto-sync running-config

Problem Solved. thanks for the post Marvin.


alessandro.dona Wed, 05/29/2013 - 09:11
User Badges:


i'm trying to import the certs and keys to secondary ACE but i'm not able because on secondary all conf are disabled.

What is the procedure in order i can import also when on secondary?

Should i launch "no ft auto.sync", import and then "auto-sync" or what else?



aakagarw Wed, 05/29/2013 - 09:13
User Badges:
  • Cisco Employee,

You are not required to goin config mode to import cert - that can be done from User exec mode

alessandro.dona Wed, 05/29/2013 - 09:16
User Badges:

I know but when i try to write crypto i got error...i think i should de-refernce ssl proxy key and cert....importo on secondaru anc then refercen again....

aakagarw Wed, 05/29/2013 - 09:17
User Badges:
  • Cisco Employee,

Would you mind pasting the error you get?

Marvin Rhoads Thu, 04/14/2016 - 20:01
User Badges:
  • Super Silver, 17500 points or more
  • Cisco Designated VIP,

    2017 Firewalling, Network Management, VPN


Glad to know my posting is still helping 6 years later. :)

Thanks for letting me know


This Discussion