Hi,I ask if sameone knows where a can get information or if this is not the way a think.
I have a PIX-525 and two server linux. This server linux have there own ip addres and there own mac address, they are instaled in a failover squeme. So one (the active linux) stay inservice with other ip address with his mac address. When the active linux stay down the standby linux became active and he inherits the ip address of the active linux but he has there own mac address. The linux standby that becames active send gratuitous arp packet to update the table.
I'am going to attach same topology about this.
If you see there you have one virtual server that is the active server with te max with xx at the end. This xx will be replace with 99 and 98.
Active/Standby failover lets you use a standby security appliance to take over the functionality of a failed unit. When the active unit fails, it changes to the standby state while the standby unit changes to the active state. The unit that becomes active assumes the IP addresses (or, for transparent firewall, the management IP address) and MAC addresses of the failed unit and begins passing traffic. The unit that is now in standby state takes over the standby IP addresses and MAC addresses. Because network devices see no change in the MAC to IP address pairing, no ARP entries change or time out anywhere on the network
Well, let see. There is no question. I have this topology, with same linux in failover that are conected directly with same pix-525 and when the linux in failover switchover ir only mantein the ip address but the mac-address change. The pix does not accept gratuitous-arp that tells the new mac-address of the linux server in failover. Do you know if this beavior is correct?? There is samething that i can do in a way to fix this problem?? The Pix-525 have a 6.3.5 version. Thanks a lot.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :