ACE 4710 HA Configuration
ACE 4710 HA Configuration
The Cisco® Application Control Engine (ACE) 4710 Appliance provides a comprehensive
application delivery solution, helps ensure application availability, accelerates application
performance, and protects applications while simultaneously reducing data center costs.
Take full advantage of new and enhanced purpose-built hardware to help lower your total
cost of ownership (TCO) and improve both end-user and IT productivity.
Overview
The Cisco ACE 4710 appliance provides maximized application availability to help ensure business
continuity and the best service to end users by taking advantage of availability through highly
scalable Layer 4 load balancing and Layer 7 content switching, and minimizes effects of
application, device, or Web site failure. The Cisco ACE 4710 appliance provides accelerated
performance of Web-based applications by using patented acceleration technologies and delivers
highly efficient data compression to speed up application response times; improve server
performance by offloading Secure Sockets Layer (SSL) and TCP. The Cisco ACE 4710 appliance
acts as a last line of server defense by providing protection against application threats and denial-
of-service (DoS) attacks with features such as deep packet inspection, network and protocol
security, and highly scalable access control capabilities. This provides lower total cost of ownership
and minimizes costs by reducing the number of required servers and load balancers, lowers power
and cooling requirements, increases IT productivity, and provides faster application deployments by
taking advantage of the unique virtualized architecture. This configuration overview, targeted at
enterprise and service provider customers, helps ensure the optimized and secure delivery of
mission-critical application traffic in a highly available environment. This document provides a best
practice example of how to configure the Cisco ACE 4710 appliance in a high available
environment.
Challenge
Maintaining application availability and ensuring business continuity is a major concern of IT
administrators. Companies are challenged to keep up with demand as more viewers access their
Web sites. Seasonal fluctuations and concentrated marketing campaigns that generate a flood of
Web traffic provide infrastructure and scaling challenges. Real-time tracking of how servers are
performing is crucial to making sure that Web sites are serving up content in a timely fashion.
However, accurate real-time tracking could be challenging with large server farms. Many mission-
critical applications require transparent failover to occur within a second of a system becoming
unresponsive. Website and server uptime is critical for supporting business revenue and driving
profits. Highly available services ensure that viewers can access a company’s Web site and
applications without interruption. Client trust can be built and reinforced by a site’s availability, as
users are unlikely to return again if the site is occasionally offline, experience performance
degradation, or is inaccessible.
Business Benefits
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 14
Configuration Overview
The Cisco ACE 4710 appliance configuration for high availability provides all the elements needed
to mitigate these challenges. The Cisco ACE 4710 Appliance offers the following major benefits:
• Scalability: The Cisco ACE 4710 appliance enables transparent scaling of Web sites and
applications. New Web sites and application services can be deployed on the Cisco ACE
4710 appliance without disruption to existing services. This could be done by
implementing virtualization on the Cisco ACE 4710 appliance. This provides an effective
method of adding new Web sites and application services during seasonal fluctuations
and concentrated marketing campaigns and resolves the challenge of keeping up with
demand as more viewers access their Web sites and applications. The Cisco ACE 4710
appliance has four physical gigabit Ethernet interfaces supporting port channeling and
dot1q trunking. This provides you the ability to channel and trunk any combination of
VLANs accessing all four physical interfaces. With the combination of trunked VLANs and
port-channeled interfaces this provides the best level of interface and device scalability
available today.
• Virtualization: Virtualization is the ability to logically partition a single physical device into
many virtual contexts. Each virtual context must has all the capabilities of the actual
physical device, and each virtual context is independent and isolated so that it appears to
be a unique physical device from the viewpoint of the network and the network
administrator. With virtualization, each virtual context can be allocated its own resources
and quality of service (QoS) with bursting capability to the virtual IP address (VIP) or real
IP address (RIP) level if desired. Each virtual context can also be assigned its own
configuration files, management interfaces, and access-control policies in which access
control privileges are assigned to users based on their administrative roles.
• Availability and reliability: The Cisco ACE 4710 appliance uses a highly robust
architecture. This architecture provides separation of the control and data paths, helping
to ensure separation of device control and connection management. The Cisco ACE 4710
appliance could be implemented either in Active/Active or Active/Standby using
virtualization. This implementation allows you to distribute processing across both
appliances. The Cisco ACE 4710 appliance supports both stateful failover and the
replication of the sticky entries per physical or virtual context. Stateful failover contains all
the flow-state information necessary for the standby to take over if the active becomes
unresponsive.
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 14
Configuration Overview
The Cisco ACE 4710 appliance will use the remaining gigabit Ethernet interfaces in the event of a
link failure. As a result of using port channeling, no FT state will change unless all four gigabit
Ethernet interfaces go down. With the addition of interface and peer tracking, failover can be
detected earlier. You can configure the Cisco ACE 4710 appliance to track and detect failures of
the gateways or hosts. FT gateway tracking can be enabled on the Cisco ACE 4710 appliance
using an ICMP probe to automatically failover if the ICMP pings fails between ACE and connected
Cisco Catalyst Series Switch. This configuration is configured within each virtual context.
Therefore, if the FT gateway tracking ICMP ping fails, all virtual context will failover to the backup.
For this to work effectively the Cisco ACE 4710 appliance requires preempt to be enabled and the
priority set.
The network topology in figure 1 consists of a redundant pair of Cisco Catalyst Series Switches
also configured for high availability using Hot Standby Router Protocol (HSRP). The Cisco ACE
4710 appliance will use the HSRP standby address as its default gateway. The network topology
consists of multiple VLANs and port channels. Port channel 1 represents four grouped physical
gigabit Ethernet interfaces between the Cisco ACE 4710 appliance “ACE-APP1” and Catalyst
Series Switch. The following four VLANs are trunked across port channel 1.
• VLAN 110 – Native vlan used for management. Only the Admin context is added to vlan
110
• VLAN 999 – FT Interface VLAN used explicitly for the Cisco ACE 4710 appliance FT
communication
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 14
Configuration Overview
The port channel between the two Cisco Catalyst Series Switches will need to trunk all four VLANS
plus any additional VLANs necessary. The Cisco ACE 4710 appliances are configured in routed
mode. Therefore, the servers’ default gateway will use the alias IP address on interface VLAN 411
on the Cisco ACE 4710 appliance. The alias address is the same IP address on both “ACE-APP-1”
and “ACE-APP-2”. Only the active Cisco ACE 4710 appliances or virtual context will forward
client/server traffic. You can only ARP for the alias IP address once the FT group is inservice.
Looking at the network topology in figure 1, the Cisco ACE 4710 appliance configuration below, you
will notice the FT configuration consists of three pieces. This includes the FT interface VLAN, FT
peer and FT group. The FT interface VLAN, VLAN 999 is a designated VLAN between the two
Cisco ACE 4710 appliances. All FT traffic is sent over this VLAN including:
Example of the Cisco ACE 4710 Appliance and Catalyst Series Switches
Configuration
The complete ACE 4710 Appliance configurations are as follows:
ACE-APP1
ACE-APP1/Admin# show run
Generating configuration....
resource-class LoadBalancingResources
limit-resource all minimum 0.00 maximum unlimited
limit-resource sticky minimum 10.00 maximum equal-to-min
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 14
Configuration Overview
login timeout 60
ft peer 1
heartbeat interval 300
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 14
Configuration Overview
heartbeat count 20
ft-interface vlan 999
query-interface vlan 110
ft group 3
peer 1
priority 110
associate-context Admin
inservice
context LoadBalancing
allocate-interface vlan 211
allocate-interface vlan 411
member LoadBalancingResources
context WAAS
description WAAS Virtual Device
allocate-interface vlan 210-211
ft group 1
peer 1
priority 110
associate-context LoadBalancing
inservice
ft group 2
peer 1
priority 110
associate-context WAAS
inservice
Looking at the Cisco ACE 4710 appliance configuration you can see the channel-group added to
each gigabit Ethernet interface. This tells the interface what port channel it belongs to. After the
interfaces you can see the configuration of the port channel on the Cisco ACE 4710 appliance.
Note the VLANs that are being trunked on the port channel. IP addresses for both the active and
standby appliance are configured on the FT interface VLAN. FT peer 1 specifies the FT interface
VLAN, heart beats and query interface VLAN. Configuring a query interface allows you to assess
the health of the active FT group member prior to failing over. Disadvantage of the query
interface VLAN is it increases failover time.
ACE-APP2
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 14
Configuration Overview
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 14
Configuration Overview
ft peer 1
heartbeat interval 300
heartbeat count 20
ft-interface vlan 999
query-interface vlan 110
ft group 3
peer 1
peer priority 110
associate-context Admin
inservice
context LoadBalancing
allocate-interface vlan 211
allocate-interface vlan 411
member LoadBalancingResources
context WAAS
description WAAS Virtual Device
allocate-interface vlan 210-211
ft group 1
peer 1
peer priority 110
associate-context LoadBalancing
inservice
ft group 2
peer 1
peer priority 110
associate-context WAAS
inservice
The configuration below shows the port-channels configured between the Cisco Catalyst Series
Switches. I configured two unique port-channels as shown below. You will also need to trunk your
allowed VLANs over the channel. In the example I have also trunked the native management
VLAN.
interface Port-channel1
description ACE-APP1
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 14
Configuration Overview
interface GigabitEthernet4/13
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/14
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/15
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
switchport trunk allowed vlan 110,211,411,999
switchport mode trunk
no ip address
channel-group 2 mode on
!
interface GigabitEthernet4/16
description ACE-APP2
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 110
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 14
Configuration Overview
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 14
Configuration Overview
Output from the Cisco ACE 4710 Appliance configured in high availability
The following output from show ft commands shows the current FT status and other useful
information:
ACE-APP1/Admin# show ft group 1 status
FT Group : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_ACTIVE
Peer State : FSM_FT_STATE_STANDBY_HOT
Peer Id : 1
No. of Contexts : 1
FT Group : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_STANDBY_HOT
Peer State : FSM_FT_STATE_ACTIVE
Peer Id : 1
No. of Contexts : 1
The show ft group status shows the current state of both members in the group. The show ft group
detail provides detailed information of the ft status. Looking at the output below you can clearly see
the context name that is associated with this ft group. You can also see the configuration sync
between the two ACE 4710 Appliances is enabled and working correctly. The Active member will
automatically sync the configuration with the standby peer. The show ft group status command
output will also show the time the configuration was synced.
FT Group : 1
No. of Contexts : 1
Context Name : LoadBalancing
Context Id : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_ACTIVE
My Config Priority : 120
My Net Priority : 120
My Preempt : Enabled
Peer State : FSM_FT_STATE_STANDBY_HOT
Peer Config Priority : 110
Peer Net Priority : 110
Peer Preempt : Enabled
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 14
Configuration Overview
Peer Id : 1
Last State Change time : Tue Nov 6 20:57:29 2007
Running cfg sync enabled : Enabled
Running cfg sync status : Running configuration sync has
completed
Startup cfg sync enabled : Enabled
Startup cfg sync status : Startup configuration sync has
completed
Bulk sync done for ARP: 1
Bulk sync done for LB: 1
Bulk sync done for ICM: 1
ACE-APP2/Admin# show ft group 1 detail
FT Group : 1
No. of Contexts : 1
Context Name : LoadBalancing
Context Id : 1
Configured Status : in-service
Maintenance mode : MAINT_MODE_OFF
My State : FSM_FT_STATE_STANDBY_HOT
My Config Priority : 110
My Net Priority : 110
My Preempt : Enabled
Peer State : FSM_FT_STATE_ACTIVE
Peer Config Priority : 120
Peer Net Priority : 120
Peer Preempt : Enabled
Peer Id : 1
Last State Change time : Fri Nov 9 14:10:58 2007
Running cfg sync enabled : Enabled
Running cfg sync status : Running configuration sync has
completed
Startup cfg sync enabled : Enabled
Startup cfg sync status : Startup configuration sync has
completed
Bulk sync done for ARP: 1
Bulk sync done for LB: 1
Bulk sync done for ICM: 1
The show FT peer detail provides detailed information of the FT configuration between the two
Cisco ACE 4710 appliances. This command shows the compatibility state between the two
appliances. This is extremely important as if the two appliances are not compatible configuration
synchronization will not work correctly. This applies to both version and license compatibility
checking. The show FT peer detail also shows the query interface VLAN state. Another useful
counter shown in this command is the PEER_DOWN counter. This shows how many times ACE
has transitioned from master to backup. You can also see if FT keepalive packets are getting
dropped based on the Tx/FX Keepalive Packets counter.
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 14
Configuration Overview
Peer Id : 1
State : FSM_PEER_STATE_COMPATIBLE
Maintenance mode : MAINT_MODE_OFF
FT Vlan : 999
FT Vlan IF State : UP
My IP Addr : 10.1.1.1
Peer IP Addr : 10.1.1.2
Query Vlan : 110
Query Vlan IF State : UP
Peer Query IP Addr : 172.25.91.202
Heartbeat Interval : 300
Heartbeat Count : 20
Tx Packets : 22636
Tx Bytes : 4916852
Rx Packets : 22627
Rx Bytes : 4908377
Rx Error Bytes : 0
Tx Keepalive Packets : 22582
Rx Keepalive Packets : 22582
TL_CLOSE count : 0
FT_VLAN_DOWN count : 0
PEER_DOWN count : 3
SRG Compatibility : COMPATIBLE
License Compatibility : COMPATIBLE
FT Groups : 3
ACE-TME-APP1/Admin#
Conclusion
The Cisco ACE 4710 Appliance high availability configuration provides information technology
administrators with a simplified solution. This solution is highly configurable and can be
manipulated based on your requirements. Using trunking and port-channeling on the Cisco ACE
4710 Appliance this enables you to follow networking best practice and recommend high available
configurations.
Why Cisco?
Cisco has been instrumental in development of high-availability standards and is a pioneer in the
delivery of business application switching infrastructure and services. Cisco ANS is a unified
portfolio of data center and wide-area solutions that secure, scale, optimize, and accelerate the
delivery of internal- and external-facing applications. These products are comprehensively
supported by a global network of Cisco field personnel and partners, online support, certified
training programs, open discussion forums, and equipment replacement in as little as 4 hours.
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 14
Configuration Overview
For more information about Cisco Application Networking Services, Cisco data center solutions for
Cisco ANS, and Cisco ACE, visit http://www.cisco.com/go/applicationservices or contact your local
Cisco account representative.
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 14