You are on page 1of 14

Configuration Overview

Cisco Application Control Engine (ACE) 4710 Appliance


Configuration for High Availability

The Cisco® Application Control Engine (ACE) 4710 Appliance provides a comprehensive
application delivery solution, helps ensure application availability, accelerates application
performance, and protects applications while simultaneously reducing data center costs.
Take full advantage of new and enhanced purpose-built hardware to help lower your total
cost of ownership (TCO) and improve both end-user and IT productivity.

Overview
The Cisco ACE 4710 appliance provides maximized application availability to help ensure business
continuity and the best service to end users by taking advantage of availability through highly
scalable Layer 4 load balancing and Layer 7 content switching, and minimizes effects of
application, device, or Web site failure. The Cisco ACE 4710 appliance provides accelerated
performance of Web-based applications by using patented acceleration technologies and delivers
highly efficient data compression to speed up application response times; improve server
performance by offloading Secure Sockets Layer (SSL) and TCP. The Cisco ACE 4710 appliance
acts as a last line of server defense by providing protection against application threats and denial-
of-service (DoS) attacks with features such as deep packet inspection, network and protocol
security, and highly scalable access control capabilities. This provides lower total cost of ownership
and minimizes costs by reducing the number of required servers and load balancers, lowers power
and cooling requirements, increases IT productivity, and provides faster application deployments by
taking advantage of the unique virtualized architecture. This configuration overview, targeted at
enterprise and service provider customers, helps ensure the optimized and secure delivery of
mission-critical application traffic in a highly available environment. This document provides a best
practice example of how to configure the Cisco ACE 4710 appliance in a high available
environment.

Challenge
Maintaining application availability and ensuring business continuity is a major concern of IT
administrators. Companies are challenged to keep up with demand as more viewers access their
Web sites. Seasonal fluctuations and concentrated marketing campaigns that generate a flood of
Web traffic provide infrastructure and scaling challenges. Real-time tracking of how servers are
performing is crucial to making sure that Web sites are serving up content in a timely fashion.
However, accurate real-time tracking could be challenging with large server farms. Many mission-
critical applications require transparent failover to occur within a second of a system becoming
unresponsive. Website and server uptime is critical for supporting business revenue and driving
profits. Highly available services ensure that viewers can access a company’s Web site and
applications without interruption. Client trust can be built and reinforced by a site’s availability, as
users are unlikely to return again if the site is occasionally offline, experience performance
degradation, or is inaccessible.

Business Benefits

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 14
Configuration Overview

The Cisco ACE 4710 appliance configuration for high availability provides all the elements needed
to mitigate these challenges. The Cisco ACE 4710 Appliance offers the following major benefits:

• Scalability: The Cisco ACE 4710 appliance enables transparent scaling of Web sites and
applications. New Web sites and application services can be deployed on the Cisco ACE
4710 appliance without disruption to existing services. This could be done by
implementing virtualization on the Cisco ACE 4710 appliance. This provides an effective
method of adding new Web sites and application services during seasonal fluctuations
and concentrated marketing campaigns and resolves the challenge of keeping up with
demand as more viewers access their Web sites and applications. The Cisco ACE 4710
appliance has four physical gigabit Ethernet interfaces supporting port channeling and
dot1q trunking. This provides you the ability to channel and trunk any combination of
VLANs accessing all four physical interfaces. With the combination of trunked VLANs and
port-channeled interfaces this provides the best level of interface and device scalability
available today.

• Virtualization: Virtualization is the ability to logically partition a single physical device into
many virtual contexts. Each virtual context must has all the capabilities of the actual
physical device, and each virtual context is independent and isolated so that it appears to
be a unique physical device from the viewpoint of the network and the network
administrator. With virtualization, each virtual context can be allocated its own resources
and quality of service (QoS) with bursting capability to the virtual IP address (VIP) or real
IP address (RIP) level if desired. Each virtual context can also be assigned its own
configuration files, management interfaces, and access-control policies in which access
control privileges are assigned to users based on their administrative roles.

• Availability and reliability: The Cisco ACE 4710 appliance uses a highly robust
architecture. This architecture provides separation of the control and data paths, helping
to ensure separation of device control and connection management. The Cisco ACE 4710
appliance could be implemented either in Active/Active or Active/Standby using
virtualization. This implementation allows you to distribute processing across both
appliances. The Cisco ACE 4710 appliance supports both stateful failover and the
replication of the sticky entries per physical or virtual context. Stateful failover contains all
the flow-state information necessary for the standby to take over if the active becomes
unresponsive.

The Cisco ACE 4710 Appliance Solution


To maximize application and infrastructure availability, the Cisco ACE 4710 appliance takes
advantage of all four gigabit Ethernet interfaces and ACE virtualization. These interfaces can be
port-channeled together to create one logical connection between the Cisco ACE 4710 appliance
and connected to Cisco Catalyst Series Switches. Trunked VLANs can be used to carry
client/server messaging, management traffic and fault tolerance (FT) communication. Virtualization
on the Cisco ACE 4710 appliance enables you to separate the FT configuration from the load
balancing and optimization services. Except for interface and peer tracking, all FT configurations
can be configured on the Admin context. This simplifies the FT configuration on the Cisco ACE
4710 appliances providing benefits for manageability and operations. This Admin virtual context
would also be used for management. In this document the management VLAN 110 is also the
native VLAN.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 14
Configuration Overview

The Cisco ACE 4710 appliance will use the remaining gigabit Ethernet interfaces in the event of a
link failure. As a result of using port channeling, no FT state will change unless all four gigabit
Ethernet interfaces go down. With the addition of interface and peer tracking, failover can be
detected earlier. You can configure the Cisco ACE 4710 appliance to track and detect failures of
the gateways or hosts. FT gateway tracking can be enabled on the Cisco ACE 4710 appliance
using an ICMP probe to automatically failover if the ICMP pings fails between ACE and connected
Cisco Catalyst Series Switch. This configuration is configured within each virtual context.
Therefore, if the FT gateway tracking ICMP ping fails, all virtual context will failover to the backup.
For this to work effectively the Cisco ACE 4710 appliance requires preempt to be enabled and the
priority set.

Figure 1. Network Topology example

The network topology in figure 1 consists of a redundant pair of Cisco Catalyst Series Switches
also configured for high availability using Hot Standby Router Protocol (HSRP). The Cisco ACE
4710 appliance will use the HSRP standby address as its default gateway. The network topology
consists of multiple VLANs and port channels. Port channel 1 represents four grouped physical
gigabit Ethernet interfaces between the Cisco ACE 4710 appliance “ACE-APP1” and Catalyst
Series Switch. The following four VLANs are trunked across port channel 1.

• VLAN 110 – Native vlan used for management. Only the Admin context is added to vlan
110

• VLAN 211 –Client traffic

• VLAN 411 – Servers located on VLAN 411

• VLAN 999 – FT Interface VLAN used explicitly for the Cisco ACE 4710 appliance FT
communication

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 14
Configuration Overview

The port channel between the two Cisco Catalyst Series Switches will need to trunk all four VLANS
plus any additional VLANs necessary. The Cisco ACE 4710 appliances are configured in routed
mode. Therefore, the servers’ default gateway will use the alias IP address on interface VLAN 411
on the Cisco ACE 4710 appliance. The alias address is the same IP address on both “ACE-APP-1”
and “ACE-APP-2”. Only the active Cisco ACE 4710 appliances or virtual context will forward
client/server traffic. You can only ARP for the alias IP address once the FT group is inservice.

Looking at the network topology in figure 1, the Cisco ACE 4710 appliance configuration below, you
will notice the FT configuration consists of three pieces. This includes the FT interface VLAN, FT
peer and FT group. The FT interface VLAN, VLAN 999 is a designated VLAN between the two
Cisco ACE 4710 appliances. All FT traffic is sent over this VLAN including:

● ACE redundancy protocol packets


● Heart Beats
● Configuration sync packets
● State replication packets
The election of the active Cisco ACE 4710 appliance within each FT group is based on a
priority. The Cisco ACE 4710 appliance configured with the higher priority is elected as the
active member. If a member with a higher priority is found after the other member becomes
active, the new member becomes active because it has a higher priority. This behavior is
known as preemption and is enabled by default. You can override this default behavior by
disabling preemption. You can see from the configuration that ACE-APP1 has a higher priority. If
priorities of both members are equal, the member with the higher IP address becomes active. If
preempt is disabled, failover does not happen based on priorities.

Each FT group acts as an independent FT instance. It is recommended to create a unique FT


group per virtual context. You will see from the configuration a virtual context is associated with
each FT group. When a failover occurs, the active Cisco ACE 4710 appliance in the FT group now
becomes standby and the original standby Cisco ACE 4710 appliance becomes active. Failover
can occur for the following reasons:

● The active Cisco ACE 4710 appliance becomes unresponsive


● A FT gateway tracking host or interface fails
● You enter the ft switchover command to force a failover. This is per context level

Example of the Cisco ACE 4710 Appliance and Catalyst Series Switches
Configuration
The complete ACE 4710 Appliance configurations are as follows:

ACE-APP1
ACE-APP1/Admin# show run
Generating configuration....

resource-class LoadBalancingResources
limit-resource all minimum 0.00 maximum unlimited
limit-resource sticky minimum 10.00 maximum equal-to-min

boot system image:c4710ace-mz.A1_8_0a.bin

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 14
Configuration Overview

login timeout 60

peer hostname ACE-APP2


hostname ACE-APP1
interface gigabitEthernet 1/1
channel-group 1
no shutdown
interface gigabitEthernet 1/2
channel-group 1
no shutdown
interface gigabitEthernet 1/3
channel-group 1
no shutdown
interface gigabitEthernet 1/4
channel-group 1
no shutdown
interface port-channel 1
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
no shutdown

class-map type management match-any remote-access


description remote-access-traffic-match
2 match protocol telnet any
3 match protocol ssh any
4 match protocol icmp any
5 match protocol http any
6 match protocol https any

policy-map type management first-match remote-mgmt


class remote-access
permit

interface vlan 110


ip address 172.25.91.201 255.255.255.0
alias 172.25.91.204 255.255.255.0
peer ip address 172.25.91.202 255.255.255.0
service-policy input remote-mgmt
no shutdown

ft interface vlan 999


ip address 10.1.1.1 255.255.255.0
peer ip address 10.1.1.2 255.255.255.0
no shutdown

ft peer 1
heartbeat interval 300

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 14
Configuration Overview

heartbeat count 20
ft-interface vlan 999
query-interface vlan 110

ft group 3
peer 1
priority 110
associate-context Admin
inservice

ip route 0.0.0.0 0.0.0.0 172.25.91.1

context LoadBalancing
allocate-interface vlan 211
allocate-interface vlan 411
member LoadBalancingResources
context WAAS
description WAAS Virtual Device
allocate-interface vlan 210-211

ft group 1
peer 1
priority 110
associate-context LoadBalancing
inservice
ft group 2
peer 1
priority 110
associate-context WAAS
inservice

Looking at the Cisco ACE 4710 appliance configuration you can see the channel-group added to
each gigabit Ethernet interface. This tells the interface what port channel it belongs to. After the
interfaces you can see the configuration of the port channel on the Cisco ACE 4710 appliance.
Note the VLANs that are being trunked on the port channel. IP addresses for both the active and
standby appliance are configured on the FT interface VLAN. FT peer 1 specifies the FT interface
VLAN, heart beats and query interface VLAN. Configuring a query interface allows you to assess
the health of the active FT group member prior to failing over. Disadvantage of the query
interface VLAN is it increases failover time.

ACE-APP2

ACE-APP2/Admin# show run


Generating configuration....
resource-class LoadBalancingResources
limit-resource all minimum 0.00 maximum unlimited
limit-resource sticky minimum 10.00 maximum equal-to-min

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 14
Configuration Overview

boot system image:c4710ace-mz.A1_8_0a.bin


login timeout 60

peer hostname ACE-APP1


hostname ACE-APP2

interface gigabitEthernet 1/1


channel-group 1
no shutdown
interface gigabitEthernet 1/2
channel-group 1
no shutdown
interface gigabitEthernet 1/3
channel-group 1
no shutdown
interface gigabitEthernet 1/4
channel-group 1
no shutdown
interface port-channel 1
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
no shutdown

class-map type management match-any remote-access


description remote-access-traffic-match
2 match protocol telnet any
3 match protocol ssh any
4 match protocol icmp any
5 match protocol http any
6 match protocol https any

policy-map type management first-match remote-mgmt


class remote-access
permit

interface vlan 110


ip address 172.25.91.202 255.255.255.0
alias 172.25.91.204 255.255.255.0
peer ip address 172.25.91.201 255.255.255.0
service-policy input remote-mgmt
no shutdown

ft interface vlan 999


ip address 10.1.1.2 255.255.255.0
peer ip address 10.1.1.1 255.255.255.0
no shutdown

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 14
Configuration Overview

ft peer 1
heartbeat interval 300
heartbeat count 20
ft-interface vlan 999
query-interface vlan 110

ft group 3
peer 1
peer priority 110
associate-context Admin
inservice

ip route 0.0.0.0 0.0.0.0 172.25.91.1

context LoadBalancing
allocate-interface vlan 211
allocate-interface vlan 411
member LoadBalancingResources
context WAAS
description WAAS Virtual Device
allocate-interface vlan 210-211

ft group 1
peer 1
peer priority 110
associate-context LoadBalancing
inservice
ft group 2
peer 1
peer priority 110
associate-context WAAS
inservice

The configuration below shows the port-channels configured between the Cisco Catalyst Series
Switches. I configured two unique port-channels as shown below. You will also need to trunk your
allowed VLANs over the channel. In the example I have also trunked the native management
VLAN.

Configuration from one of the Cisco Catalyst Series Switch

interface Port-channel1
description ACE-APP1
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 14
Configuration Overview

switchport mode trunk


no ip address
!
interface Port-channel2
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address

interface GigabitEthernet4/13
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/14
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/15
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/16
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 14
Configuration Overview

switchport trunk allowed vlan 110,211,411,999


switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/17
description ACE-APP1
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 1 mode on
!
interface GigabitEthernet4/18
description ACE-APP1
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 1 mode on
!
interface GigabitEthernet4/19
description ACE-APP1
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 1 mode on
!
interface GigabitEthernet4/20
description ACE-APP1
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 1 mode on

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 14
Configuration Overview

Output from the Cisco ACE 4710 Appliance configured in high availability
The following output from show ft commands shows the current FT status and other useful
information:
ACE-APP1/Admin# show ft group 1 status

FT Group : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_ACTIVE
Peer State : FSM_FT_STATE_STANDBY_HOT
Peer Id : 1
No. of Contexts : 1

ACE-TME-APP2/Admin# show ft group 1 status

FT Group : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_STANDBY_HOT
Peer State : FSM_FT_STATE_ACTIVE
Peer Id : 1
No. of Contexts : 1

The show ft group status shows the current state of both members in the group. The show ft group
detail provides detailed information of the ft status. Looking at the output below you can clearly see
the context name that is associated with this ft group. You can also see the configuration sync
between the two ACE 4710 Appliances is enabled and working correctly. The Active member will
automatically sync the configuration with the standby peer. The show ft group status command
output will also show the time the configuration was synced.

ACE-APP1/Admin# show ft group 1 detail

FT Group : 1
No. of Contexts : 1
Context Name : LoadBalancing
Context Id : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_ACTIVE
My Config Priority : 120
My Net Priority : 120
My Preempt : Enabled
Peer State : FSM_FT_STATE_STANDBY_HOT
Peer Config Priority : 110
Peer Net Priority : 110
Peer Preempt : Enabled

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 14
Configuration Overview

Peer Id : 1
Last State Change time : Tue Nov 6 20:57:29 2007
Running cfg sync enabled : Enabled
Running cfg sync status : Running configuration sync has
completed
Startup cfg sync enabled : Enabled
Startup cfg sync status : Startup configuration sync has
completed
Bulk sync done for ARP: 1
Bulk sync done for LB: 1
Bulk sync done for ICM: 1
ACE-APP2/Admin# show ft group 1 detail

FT Group : 1
No. of Contexts : 1
Context Name : LoadBalancing
Context Id : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_STANDBY_HOT
My Config Priority : 110
My Net Priority : 110
My Preempt : Enabled
Peer State : FSM_FT_STATE_ACTIVE
Peer Config Priority : 120
Peer Net Priority : 120
Peer Preempt : Enabled
Peer Id : 1
Last State Change time : Fri Nov 9 14:10:58 2007
Running cfg sync enabled : Enabled
Running cfg sync status : Running configuration sync has
completed
Startup cfg sync enabled : Enabled
Startup cfg sync status : Startup configuration sync has
completed
Bulk sync done for ARP: 1
Bulk sync done for LB: 1
Bulk sync done for ICM: 1

The show FT peer detail provides detailed information of the FT configuration between the two
Cisco ACE 4710 appliances. This command shows the compatibility state between the two
appliances. This is extremely important as if the two appliances are not compatible configuration
synchronization will not work correctly. This applies to both version and license compatibility
checking. The show FT peer detail also shows the query interface VLAN state. Another useful
counter shown in this command is the PEER_DOWN counter. This shows how many times ACE
has transitioned from master to backup. You can also see if FT keepalive packets are getting
dropped based on the Tx/FX Keepalive Packets counter.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 14
Configuration Overview

ACE-APP1/Admin# show ft peer 1 detail

Peer Id : 1
State : FSM_PEER_STATE_COMPATIBLE
Maintenance mode : MAINT_MODE_OFF
FT Vlan : 999
FT Vlan IF State : UP
My IP Addr : 10.1.1.1
Peer IP Addr : 10.1.1.2
Query Vlan : 110
Query Vlan IF State : UP
Peer Query IP Addr : 172.25.91.202
Heartbeat Interval : 300
Heartbeat Count : 20
Tx Packets : 22636
Tx Bytes : 4916852
Rx Packets : 22627
Rx Bytes : 4908377
Rx Error Bytes : 0
Tx Keepalive Packets : 22582
Rx Keepalive Packets : 22582
TL_CLOSE count : 0
FT_VLAN_DOWN count : 0
PEER_DOWN count : 3
SRG Compatibility : COMPATIBLE
License Compatibility : COMPATIBLE
FT Groups : 3
ACE-TME-APP1/Admin#

Conclusion
The Cisco ACE 4710 Appliance high availability configuration provides information technology
administrators with a simplified solution. This solution is highly configurable and can be
manipulated based on your requirements. Using trunking and port-channeling on the Cisco ACE
4710 Appliance this enables you to follow networking best practice and recommend high available
configurations.

Why Cisco?
Cisco has been instrumental in development of high-availability standards and is a pioneer in the
delivery of business application switching infrastructure and services. Cisco ANS is a unified
portfolio of data center and wide-area solutions that secure, scale, optimize, and accelerate the
delivery of internal- and external-facing applications. These products are comprehensively
supported by a global network of Cisco field personnel and partners, online support, certified
training programs, open discussion forums, and equipment replacement in as little as 4 hours.

For More Information


Cisco ACE Application Control Engine Solution for High Availability, visit
http://cisco.com/en/US/products/hw/modules/ps2706/prod_brochure0900aecd806cecc5.html

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 14
Configuration Overview

For more information about Cisco Application Networking Services, Cisco data center solutions for
Cisco ANS, and Cisco ACE, visit http://www.cisco.com/go/applicationservices or contact your local
Cisco account representative.

Printed in USA C78-331727-01 10/06

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 14

You might also like