Skip to main content

ASA5585-X Does not support EIGRP between contexts

Since upgrading to the ASA5585-X firewall running in multi-context mode we have had a number of questions around functionality.  We raised a case with Cisco TAC to find out why EIGRP peering is not supported between contexts.  This was their response:-

Thank you for your patience on this case; the behavior you are seeing on the ASA is expected since inter-context exchange of multicast is not supported

“Context Guidelines
EIGRP instances cannot form adjacencies with each other across shared interfaces because inter-context exchange of multicast traffic is not supported.”


As a workaround, you can configure static neighbors but it is supported only on point-to-point links.




So due to inter-context exchange of multicast traffic not being supported, EIGRP cannot work either.  When they say static neighbours, they mean statically configured unicast neighbours for both EIGRP and OSPF.  This however only works for a single configured neighbour on a point to point interface.
The workaround I guess is to apply static routes between the contexts.  I would hazard a guess that this works best when you have auto-mac turned on so that every interface is assigned a unique MAC.  Otherwise the classifier engine would get very confused.

Comments

Popular posts from this blog

Moving the SSH port on a CISCO router

If you admin your routers over the internet you probably know you should be using SSH. Telnet being sent in clear text is easily sniffed and your passwords captured. However Cisco routers use the standard TCP port 22 for their SSH service. As soon as you open this up to the world and turn on SSH access logging you will start to see hundreds of IP's connecting to your device and running dictionary attacks against you using standard username and password combinations. The majority of these IP's seem to originate from China or Russia and they find your open port extremely quickly. This is very anoying it fills up your log files with these attacks and uses up your system resources dealing with them. I believe they are simply running scans for any open TCP port 22. For this reason I decided I could cut down the amount of attacks by moving the SSH port to a different number. One thing you should know before we start is that there is no way to actually change the SSH port number o...

Error Message %DUAL-6-NBRINFO: EIGRP-IPv4 34256

If you see the error  %DUAL-6-NBRINFO: EIGRP-IPv4 xxxx  is blocked: not on common subnet then it simply means that there are EIGRP devices sending multicast hellos on an interface which have a different IP Range configured to the receiving router.  160617: .Feb 22 15:11:05.194 GMT: %DUAL-6-NBRINFO: EIGRP-IPv4 34256: Neighbor 17 2.31.253.1 (Vlan43) is blocked: not on common subnet                                                     (172.31.252.1/31) 160618: .Feb 22 15:11:12.770 GMT: %DUAL-6-NBRINFO: EIGRP-IPv4 34256: Neighbor 19 2.168.205.0 (Vlan44) is blocked: not on common subnet (192.168.204.1/31)                                                                       ...

Installing PVDM into Cisco 2811

In order to install a PVDM into the Cisco 2800 series simply follow the steps below. Firstly power down the router and remove the case by undoing the case screws. At the back of the router near the power supply you will notice the memory (DIMM Slots) and behind them the PVDM slots (which are white). If you look closely on the mother board you will notice that one is labeled PVDM0 and the other PVDM1. If you are only installing one PVDM then you will need to install it in the PVDM0 slot. The PVDM has a little notch cut out of it which means it will only fit into the slot one way.  Locate the PVDM into the slot at a slight angle and then tip pull it upright until the clips click into place and hold it in position. Put the case back onto the router and switch it on.  Once booted do a show inventory and you should now see the PVDM listed.