<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASAV In Azure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356468#M1027342</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need to configure site to site VPN in&amp;nbsp; ASAV HA&amp;nbsp; in azure.It will helpful if anyone can share the doc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rightnow&amp;nbsp; HA is working fine in ASAV.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:34:21 GMT</pubDate>
    <dc:creator>amaresh_22jan</dc:creator>
    <dc:date>2020-02-21T15:34:21Z</dc:date>
    <item>
      <title>ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356468#M1027342</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need to configure site to site VPN in&amp;nbsp; ASAV HA&amp;nbsp; in azure.It will helpful if anyone can share the doc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rightnow&amp;nbsp; HA is working fine in ASAV.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:34:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356468#M1027342</guid>
      <dc:creator>amaresh_22jan</dc:creator>
      <dc:date>2020-02-21T15:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356510#M1027343</link>
      <description>What is stopping your here. VPN in ASAv same as VPN in ASA appliance.&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Mar 2018 09:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356510#M1027343</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-28T09:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356546#M1027344</link>
      <description>&lt;P&gt;Thanks for your response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since there are two Firewall , What will be the peer IP ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do I require to configure on both the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Mar 2018 11:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356546#M1027344</guid>
      <dc:creator>amaresh_22jan</dc:creator>
      <dc:date>2018-03-28T11:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356970#M1027346</link>
      <description>No. ASA Failover will maintain same IP on active firewall&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Mar 2018 18:35:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3356970#M1027346</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-28T18:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3357228#M1027348</link>
      <description>&lt;P&gt;Thanks for the update.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As of now both the firewall&amp;nbsp; (Active and standby ) has the public IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On which IP the VPN needs to configured.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Mar 2018 06:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3357228#M1027348</guid>
      <dc:creator>amaresh_22jan</dc:creator>
      <dc:date>2018-03-29T06:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3357867#M1027349</link>
      <description>On the other end, you should point to the active asa IP. This IP will be&lt;BR /&gt;retained whether the active unit is primary or secondary&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 02:37:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3357867#M1027349</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-30T02:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3357995#M1027350</link>
      <description>&lt;P&gt;I have gone through some doc it clearly indicates the config of primary doesn't get sync to secondary .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So is it required to carry out the config on both the firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 09:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3357995#M1027350</guid>
      <dc:creator>amaresh_22jan</dc:creator>
      <dc:date>2018-03-30T09:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3358001#M1027351</link>
      <description>That's isn't correct. I have two ASAv active in front of me now and config&lt;BR /&gt;synced. Can you share the link to the doc&lt;BR /&gt;</description>
      <pubDate>Fri, 30 Mar 2018 09:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3358001#M1027351</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-03-30T09:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3358052#M1027352</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before You Begin&lt;BR /&gt;• Configure these settings in the system execution space in single context mode.&lt;BR /&gt;• Configure these settings on both the primary and secondary units. There is no synching of configuration&lt;BR /&gt;from the primary unit to the secondary unit.&lt;BR /&gt;• Have your Azure environment information available, including your Azure Subscription ID and Azure&lt;BR /&gt;authentication credentials for the Service Principal.&lt;BR /&gt;Procedure&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 13:22:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3358052#M1027352</guid>
      <dc:creator>amaresh_22jan</dc:creator>
      <dc:date>2018-03-30T13:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3358855#M1027353</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Request to validate the Doc .Let me know whether the doc is correct one.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Apr 2018 07:24:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3358855#M1027353</guid>
      <dc:creator>amaresh_22jan</dc:creator>
      <dc:date>2018-04-02T07:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3682445#M1027354</link>
      <description>&lt;P&gt;Old thread I know, but the peer IP will be the Front End&amp;nbsp;load balancer IP. Create load balancer rules for ports UDP/500 IKE and 4500/NAT-T. The traffic will then be delivered to the active ASA. I have this configuration working. Use port 44441 for the health probe for the rules,&amp;nbsp;if you have configured the load balancer probe as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;failover cloud port probe 44441 interface management&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With reference to the syncing of configurations, I don't think this is possible in Azure as the IP configurations are different on each device for the different ASAv&amp;nbsp;interfaces.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Aug 2018 18:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3682445#M1027354</guid>
      <dc:creator>Shocksmith</dc:creator>
      <dc:date>2018-08-06T18:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764763#M1027355</link>
      <description>&lt;P&gt;Smith,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As of now we are using Secondary IP concept to configure multiple Public IP address for various purposes. In case of Active ASAv goes down we are migrating the public IP to back up. This would be very helpful if you share us with the Config for the load balancer concept.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you please let us know are you using the Azure External load balancer (ELB)?&lt;/P&gt;
&lt;P&gt;In case if we are going to use the ELB whether can we move all the Public IP address to the ELB and point out to the Management Interfaces of ASAv HA.?&lt;/P&gt;
&lt;P&gt;Please share&amp;nbsp; the working Config with us&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 05:56:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764763#M1027355</guid>
      <dc:creator>abushayeed.anwarali</dc:creator>
      <dc:date>2018-12-17T05:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764918#M1027356</link>
      <description>&lt;P&gt;We are using the ASAv in an HA configuration with an Azure Load Balancer. My solution is on this thread:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/firewalls/static-nat-in-azure-asav/td-p/3360353" target="_blank"&gt;https://community.cisco.com/t5/firewalls/static-nat-in-azure-asav/td-p/3360353&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 10:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764918#M1027356</guid>
      <dc:creator>Shocksmith</dc:creator>
      <dc:date>2018-12-17T10:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764936#M1027357</link>
      <description>&lt;P style="text-align: justify;"&gt;Thank you very much for your reply.&lt;/P&gt;
&lt;P style="text-align: justify;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: justify;"&gt;I have few questions.&lt;/P&gt;
&lt;P style="text-align: justify;"&gt;Did you mapped any public IP to the Management Interface of both ASAv. And for General Internet access (PAT over interface) how did you configure it.&lt;/P&gt;
&lt;P style="text-align: justify;"&gt;Is it also through Azure load balancer or you had assigned the public IP to the Management interface&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 10:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764936#M1027357</guid>
      <dc:creator>abushayeed.anwarali</dc:creator>
      <dc:date>2018-12-17T10:30:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764956#M1027358</link>
      <description>&lt;P&gt;We added a new frontend IP on the Azure&amp;nbsp;load balancer, and then created a load balanced rule that translates the incoming port on the new public IP on the load balancer&amp;nbsp;e.g. SSL 443 to a port of our choosing on the backend pool (the 2 HA ASAvs)&amp;nbsp;e.g. 6555. We then set up nat through the management interface for the internal server on each&amp;nbsp;ASAv in the HA Pair:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network&amp;nbsp;internal-web-server&lt;/P&gt;
&lt;P&gt;host &lt;EM&gt;internal_IP_of_web_server&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,management) static interface service tcp https&amp;nbsp;6555&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The traffic then comes into the new LB IP on port 443 gets translated to port 6555 on the management interface of the active ASAv in the pair which then translates it back to port 443 on the internal web server. In this way you can have multiple public IP addresses on the azure&amp;nbsp;load balancer each routing back through to different internal hosts behind the ASAvs via different ports.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This allows you to use different public IPs on the Azure Load balancer for different internal hosts behind the ASAvs. There is no way that I have found to NAT multiple public IPs directly to the&amp;nbsp;Management interface. This is because the&amp;nbsp;health probes are not supported on secondary IP addresses&amp;nbsp;assigned to the ASAv NICs through the Azure load balancer according the the Cisco documentation. We tried this and it didn't work. It is a shame this is the case. Instead we came up with the workaround above.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 11:00:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764956#M1027358</guid>
      <dc:creator>Shocksmith</dc:creator>
      <dc:date>2018-12-17T11:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764965#M1027359</link>
      <description>&lt;P style="text-align: justify;"&gt;Did you try the&amp;nbsp;PAT concept using the Azure load Balancer and ASAv or did you have any idea of that&lt;/P&gt;
&lt;P style="text-align: justify;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="text-align: justify;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 11:11:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764965#M1027359</guid>
      <dc:creator>abushayeed.anwarali</dc:creator>
      <dc:date>2018-12-17T11:11:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASAV In Azure</title>
      <link>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764967#M1027360</link>
      <description>&lt;P&gt;Did you tried or configured PAT concept between ASAv and Azure Load Balancer. If yes please share your idea on that too.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 11:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asav-in-azure/m-p/3764967#M1027360</guid>
      <dc:creator>abushayeed.anwarali</dc:creator>
      <dc:date>2018-12-17T11:13:53Z</dc:date>
    </item>
  </channel>
</rss>

