Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
New Member

PIX515E Failover

Hi!

I am configuring a PIX515E Failover bundle loading with IOS version 6.1(4). The primary unit functions well letting inbound and outbound traffic go through according to the configuration of the access-list. When I disconnect a cable or turn off the primary unit, the failover takes over and its configuration is excatly the same as the primary unit (which is normal). However, no traffic can go beyond the the firewall's own interfaces. Ping does not get any reply from the Dell PowerConnect 3024 switch directly connected to the firewalls. I would appreciate it if anyone could give me some tips on how to solve this failover problem. Thanks.

Lucien . Bercy

2 REPLIES
Cisco Employee

Re: PIX515E Failover

Hi Lucien,

Just wondering if "clear arp" or "clear xlate" helps get the traffic passing again?

Thanks,

yatin

Anonymous
N/A

Re: PIX515E Failover

Thanks, but "clear arp" or "clear xlate" doesn't help any.

Here is my config, if this can help you better. Don't worry about the IP addresses 'cause this Laboratory if for training purposes only and is entirely isolated from the Internet.

PIX Version 6.1(4)

nameif ethernet0 outside security0

nameif ethernet1 inside security100

hostname Neptune

fixup protocol ftp 21

fixup protocol http 80

fixup protocol h323 1720

fixup protocol rsh 514

fixup protocol rtsp 554

fixup protocol smtp 25

fixup protocol sqlnet 1521

fixup protocol sip 5060

fixup protocol skinny 2000

names

access-list acl_out permit icmp any any echo-reply

access-list acl_out permit icmp any any echo

access-list acl_out permit tcp any any

access-list acl_out permit ip any any

access-list acl_out permit udp any any

pager lines 24

logging buffered debugging

interface ethernet0 100basetx

interface ethernet1 100basetx

mtu outside 1500

mtu inside 1500

ip address outside 192.168.5.1 255.255.255.0

ip address inside 172.16.8.1 255.255.255.0

ip audit info action alarm

ip audit attack action alarm

failover

failover timeout 0:00:00

failover poll 15

failover ip address outside 192.168.5.4

failover ip address inside 172.16.8.3

pdm history enable

arp timeout 14400

global (outside) 1 192.168.5.5-192.168.5.253 netmask 255.255.255.0

nat (inside) 1 0.0.0.0 0.0.0.0 0 0

static (inside,outside) 192.168.5.254 172.16.3.3 netmask 255.255.255.255 0 0

access-group acl_out in interface outside

route outside 0.0.0.0 0.0.0.0 192.168.5.2 1

route inside 172.16.3.0 255.255.255.0 172.16.8.2 1

timeout xlate 0:30:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

aaa-server TACACS+ protocol tacacs+

aaa-server RADIUS protocol radius

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

no sysopt route dnat

telnet timeout 5

ssh timeout 5

terminal width 80

Cryptochecksum:7af6813f4d75d98f77920d6e45f9378b

91
Views
0
Helpful
2
Replies
CreatePlease to create content