<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Context Failover - Ifc Failure in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314325#M1079639</link>
    <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;will issuing both commands need an ASA 'reboot' afterwards?&lt;/P&gt;&lt;P&gt;i wanted to avoid an outage as much as possible.&lt;/P&gt;</description>
    <pubDate>Fri, 26 Mar 2021 08:50:51 GMT</pubDate>
    <dc:creator>johnlloyd_13</dc:creator>
    <dc:date>2021-03-26T08:50:51Z</dc:date>
    <item>
      <title>ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4313898#M1079599</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;i'm trying to figure out why anyconnect VPN doesn't work during "failover" to secondary ASA. it only works on the primary.&lt;/P&gt;&lt;P&gt;i already applied the anyconnect apex/premium license on the primary and from my understanding should be "shared" with secondary.&lt;/P&gt;&lt;P&gt;checking 'show failover' it seems there's an interface failure but i don't see any L1 issue on the MGMT0/0 port on both primary and secondary. i can ping each other's MGMT IP and can see the MGMT0/0 MAC address on the ports on separate switches.&lt;/P&gt;&lt;P&gt;the only difference is that primary has FP/SFR module while secondary doesn't. also secondary Internal-Data0/1 is down/down. can someone advise what else needs to be checked? perhaps this is a bug?&lt;/P&gt;&lt;P&gt;should i monitor the 'MGMT' interface in admin context: monitor-interface MGMT?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act# sh ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.8(4)20 &amp;lt;system&amp;gt;&lt;BR /&gt;Firepower Extensible Operating System Version 2.2(2.124)&lt;BR /&gt;Device Manager Version 7.12(2)&lt;/P&gt;&lt;P&gt;Compiled on Thu 02-Apr-20 10:26 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa984-20-smp-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ciscoasa up 231 days 13 hours&lt;BR /&gt;failover cluster up 2 years 303 days&lt;/P&gt;&lt;P&gt;Hardware: ASA5545, 12288 MB RAM, CPU Lynnfield 2659 MHz, 1 CPU (8 cores)&lt;BR /&gt;ASA: 6454 MB RAM, 1 CPU (1 core)&lt;BR /&gt;Internal ATA Compact Flash, 8192MB&lt;BR /&gt;BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)&lt;BR /&gt;Boot microcode : CNPx-MC-BOOT-2.00&lt;BR /&gt;SSL/IKE microcode : CNPx-MC-SSL-SB-PLUS-0005&lt;BR /&gt;IPSec microcode : CNPx-MC-IPSEC-MAIN-0026&lt;BR /&gt;Number of accelerators: 1&lt;BR /&gt;Baseboard Management Controller (revision 0x1) Firmware Version: 2.4&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;0: Int: Internal-Data0/0 : address is 6cb2.ae69.6618, irq 11&lt;BR /&gt;1: Ext: GigabitEthernet0/0 : address is 6cb2.ae69.661d, irq 5&lt;BR /&gt;2: Ext: GigabitEthernet0/1 : address is 6cb2.ae69.6619, irq 5&lt;BR /&gt;3: Ext: GigabitEthernet0/2 : address is 6cb2.ae69.661e, irq 10&lt;BR /&gt;4: Ext: GigabitEthernet0/3 : address is 6cb2.ae69.661a, irq 10&lt;BR /&gt;5: Ext: GigabitEthernet0/4 : address is 6cb2.ae69.661f, irq 5&lt;BR /&gt;6: Ext: GigabitEthernet0/5 : address is 6cb2.ae69.661b, irq 5&lt;BR /&gt;7: Ext: GigabitEthernet0/6 : address is 6cb2.ae69.6620, irq 10&lt;BR /&gt;8: Ext: GigabitEthernet0/7 : address is 6cb2.ae69.661c, irq 10&lt;BR /&gt;9: Int: Internal-Data0/1 : address is 0000.0001.0002, irq 0&lt;BR /&gt;10: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0&lt;BR /&gt;11: Int: Internal-Data0/2 : address is 0000.0001.0003, irq 0&lt;BR /&gt;12: Ext: Management0/0 : address is 6cb2.ae69.6618, irq 0&lt;BR /&gt;13: Int: Internal-Data0/3 : address is a2c2.f400.0011, irq 0&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 300 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 10 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2500 perpetual &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 2500 perpetual&lt;BR /&gt;Total VPN Peers : 2500 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 2 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;IPS Module : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;BR /&gt;Cluster Members : 2 perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5545 VPN Premium license.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Failover cluster licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 300 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 20 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2500 perpetual &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 2500 perpetual&lt;BR /&gt;Total VPN Peers : 2500 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 4 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;IPS Module : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5545 VPN Premium license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act# sh int ip b&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;GigabitEthernet0/0 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/0.1605 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1.50 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1.1610 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1.1650 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.317 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1653 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1655 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1660 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1666 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1667 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.1137 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.1229 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.1350 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1601 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1651 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1652 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1800 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/5 unassigned YES unset administratively down down&lt;BR /&gt;GigabitEthernet0/6 unassigned YES unset administratively down down&lt;BR /&gt;GigabitEthernet0/7 172.31.0.65 YES unset up up&lt;BR /&gt;Internal-Control0/0 127.0.1.1 YES unset up up&lt;BR /&gt;Internal-Data0/0 unassigned YES unset up up&lt;BR /&gt;Internal-Data0/1 unassigned YES unset up up&lt;BR /&gt;Internal-Data0/2 unassigned YES unset up up&lt;BR /&gt;Internal-Data0/3 unassigned YES unset up up&lt;BR /&gt;Management0/0 unassigned YES unset up up&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa/pri/act# sh failover history&lt;BR /&gt;==========================================================================&lt;BR /&gt;From State To State Reason&lt;BR /&gt;==========================================================================&lt;/P&gt;&lt;P&gt;17:50:55 UTC Mar 1 2021&lt;BR /&gt;Active Config Applied Active Other unit wants me Active&lt;/P&gt;&lt;P&gt;17:19:02 UTC Mar 24 2021&lt;BR /&gt;Active Failed Interface check&lt;/P&gt;&lt;P&gt;17:19:05 UTC Mar 24 2021&lt;BR /&gt;Failed Standby Ready Interface check&lt;/P&gt;&lt;P&gt;17:19:27 UTC Mar 24 2021&lt;BR /&gt;Standby Ready Failed Interface check&lt;/P&gt;&lt;P&gt;17:24:07 UTC Mar 24 2021&lt;BR /&gt;Failed Standby Ready Interface check&lt;/P&gt;&lt;P&gt;17:24:30 UTC Mar 24 2021&lt;BR /&gt;Standby Ready Failed Interface check&lt;/P&gt;&lt;P&gt;17:24:32 UTC Mar 24 2021&lt;BR /&gt;Failed Standby Ready Interface check&lt;/P&gt;&lt;P&gt;17:28:33 UTC Mar 24 2021&lt;BR /&gt;Standby Ready Just Active Set by the config command&lt;/P&gt;&lt;P&gt;17:28:33 UTC Mar 24 2021&lt;BR /&gt;Just Active Active Drain Set by the config command&lt;/P&gt;&lt;P&gt;17:28:33 UTC Mar 24 2021&lt;BR /&gt;Active Drain Active Applying Config Set by the config command&lt;/P&gt;&lt;P&gt;17:28:33 UTC Mar 24 2021&lt;BR /&gt;Active Applying Config Active Config Applied Set by the config command&lt;/P&gt;&lt;P&gt;17:28:33 UTC Mar 24 2021&lt;BR /&gt;Active Config Applied Active Set by the config command&lt;/P&gt;&lt;P&gt;==========================================================================&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act# sh failover state&lt;/P&gt;&lt;P&gt;State Last Failure Reason Date/Time&lt;BR /&gt;This host - Primary&lt;BR /&gt;Active Ifc Failure 17:24:30 UTC Mar 24 2021&lt;BR /&gt;admin MGMT: Failed&lt;BR /&gt;Other host - Secondary&lt;BR /&gt;Standby Ready Ifc Failure 12:48:17 UTC Feb 25 2021&lt;BR /&gt;admin MGMT: Failed&lt;/P&gt;&lt;P&gt;====Configuration State===&lt;BR /&gt;Sync Done - STANDBY&lt;BR /&gt;====Communication State===&lt;BR /&gt;Mac set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;/pri/act# sh failover&lt;BR /&gt;Failover On&lt;BR /&gt;Failover unit Primary&lt;BR /&gt;Failover LAN Interface: failover GigabitEthernet0/7 (up)&lt;BR /&gt;Reconnect timeout 0:00:00&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 12 of 316 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;Version: Ours 9.8(4)20, Mate 9.8(4)20&lt;BR /&gt;Serial Number: Ours FCH21411111, Mate FCH21412222&lt;BR /&gt;Last Failover at: 17:28:33 UTC Mar 24 2021&lt;BR /&gt;This host: Primary - Active&lt;BR /&gt;Active time: 80373 (sec)&lt;/P&gt;&lt;P&gt;admin Interface MGMT (10.1.1.93): Normal (Monitored)&lt;/P&gt;&lt;P&gt;slot 1: SFR5545 hw/sw rev (N/A/6.2.0-362) status (Up/Up)&lt;BR /&gt;ASA FirePOWER, 6.2.0-362, Up, (Not-Monitored)&lt;BR /&gt;slot 1: SFR5545 hw/sw rev (N/A/6.2.0-362) status (Up/Up)&lt;BR /&gt;ASA FirePOWER, 6.2.0-362, Up, (Not-Monitored)&lt;BR /&gt;Other host: Secondary - Standby Ready&lt;BR /&gt;Active time: 570 (sec)&lt;BR /&gt;slot 0: ASA5545 hw/sw rev (3.1/9.8(4)20) status (Up Sys)&lt;/P&gt;&lt;P&gt;admin Interface MGMT (10.1.1.94): Normal (Monitored)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa/pri/act/admin# sh run monitor&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;no monitor-interface service-module&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act/admin# ping MGMT 10.1.1.94 repeat 1000&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 1000, 100-byte ICMP Echos to 10.1.1.94, timeout is 2 seconds:&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;!!!!!!!!!!!!!!!!!!!!&lt;BR /&gt;Success rate is 100 percent (1000/1000), round-trip min/avg/max = 1/1/10 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/pri/act# sh module&lt;/P&gt;&lt;P&gt;Mod Card Type Model Serial No.&lt;BR /&gt;---- -------------------------------------------- ------------------ -----------&lt;BR /&gt;0 ASA 5545-X with SW, 8 GE Data, 1 GE Mgmt ASA5545 FCH21411111&lt;BR /&gt;ips Unknown N/A FCH21411111&lt;BR /&gt;cxsc Unknown N/A FCH21411111&lt;BR /&gt;sfr FirePOWER Services Software Module ASA5545 FCH21411111&lt;/P&gt;&lt;P&gt;Mod MAC Address Range Hw Version Fw Version Sw Version&lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt;0 6cb2.ae69.6618 to 6cb2.ae69.6621 3.1 2.1(9)8 9.8(4)20&lt;BR /&gt;ips 6cb2.ae69.6616 to 6cb2.ae69.6616 N/A N/A&lt;BR /&gt;cxsc 6cb2.ae69.6616 to 6cb2.ae69.6616 N/A N/A&lt;BR /&gt;sfr 6cb2.ae69.6616 to 6cb2.ae69.6616 N/A N/A 6.2.0-362&lt;/P&gt;&lt;P&gt;Mod SSM Application Name Status SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt;ips Unknown No Image Present Not Applicable&lt;BR /&gt;cxsc Unknown No Image Present Not Applicable&lt;BR /&gt;sfr ASA FirePOWER Up 6.2.0-362&lt;/P&gt;&lt;P&gt;Mod Status Data Plane Status Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt;0 Up Sys Not Applicable&lt;BR /&gt;ips Unresponsive Not Applicable&lt;BR /&gt;cxsc Unresponsive Not Applicable&lt;BR /&gt;sfr Up Up&lt;/P&gt;&lt;P&gt;Mod License Name License Status Time Remaining&lt;BR /&gt;---- -------------- --------------- ---------------&lt;BR /&gt;ips IPS Module Disabled perpetual&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;-----&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa/sec/stby# sh ver&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.8(4)20 &amp;lt;system&amp;gt;&lt;BR /&gt;Firepower Extensible Operating System Version 2.2(2.124)&lt;BR /&gt;Device Manager Version 7.12(2)&lt;/P&gt;&lt;P&gt;Compiled on Thu 02-Apr-20 10:26 PDT by builders&lt;BR /&gt;System image file is "disk0:/asa984-20-smp-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;ciscoasa up 231 days 12 hours&lt;BR /&gt;failover cluster up 2 years 303 days&lt;/P&gt;&lt;P&gt;Hardware: ASA5545, 12288 MB RAM, CPU Lynnfield 2660 MHz, 1 CPU (8 cores)&lt;BR /&gt;ASA: 6454 MB RAM, 1 CPU (1 core)&lt;BR /&gt;Internal ATA Compact Flash, 8192MB&lt;BR /&gt;BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1)&lt;BR /&gt;Boot microcode : CNPx-MC-BOOT-2.00&lt;BR /&gt;SSL/IKE microcode : CNPx-MC-SSL-SB-PLUS-0005&lt;BR /&gt;IPSec microcode : CNPx-MC-IPSEC-MAIN-0026&lt;BR /&gt;Number of accelerators: 1&lt;BR /&gt;Baseboard Management Controller (revision 0x1) Firmware Version: 2.4&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;0: Int: Internal-Data0/0 : address is 6cb2.ae69.6528, irq 11&lt;BR /&gt;1: Ext: GigabitEthernet0/0 : address is 6cb2.ae69.652d, irq 5&lt;BR /&gt;2: Ext: GigabitEthernet0/1 : address is 6cb2.ae69.6529, irq 5&lt;BR /&gt;3: Ext: GigabitEthernet0/2 : address is 6cb2.ae69.652e, irq 10&lt;BR /&gt;4: Ext: GigabitEthernet0/3 : address is 6cb2.ae69.652a, irq 10&lt;BR /&gt;5: Ext: GigabitEthernet0/4 : address is 6cb2.ae69.652f, irq 5&lt;BR /&gt;6: Ext: GigabitEthernet0/5 : address is 6cb2.ae69.652b, irq 5&lt;BR /&gt;7: Ext: GigabitEthernet0/6 : address is 6cb2.ae69.6530, irq 10&lt;BR /&gt;8: Ext: GigabitEthernet0/7 : address is 6cb2.ae69.652c, irq 10&lt;BR /&gt;9: Int: Internal-Data0/1 : address is 0000.0001.0002, irq 0&lt;BR /&gt;10: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0&lt;BR /&gt;11: Int: Internal-Data0/2 : address is 0000.0001.0003, irq 0&lt;BR /&gt;12: Ext: Management0/0 : address is 6cb2.ae69.6528, irq 0&lt;BR /&gt;13: Int: Internal-Data0/3 : address is a2c2.f400.0011, irq 0&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 300 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 10 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2 perpetual &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 2500 perpetual&lt;BR /&gt;Total VPN Peers : 2500 perpetual&lt;BR /&gt;AnyConnect for Mobile : Disabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Disabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 2 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;IPS Module : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;BR /&gt;Cluster Members : 2 perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5545 VPN Premium license.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Failover cluster licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces : Unlimited perpetual&lt;BR /&gt;Maximum VLANs : 300 perpetual&lt;BR /&gt;Inside Hosts : Unlimited perpetual&lt;BR /&gt;Failover : Active/Active perpetual&lt;BR /&gt;Encryption-DES : Enabled perpetual&lt;BR /&gt;Encryption-3DES-AES : Enabled perpetual&lt;BR /&gt;Security Contexts : 20 perpetual&lt;BR /&gt;Carrier : Disabled perpetual&lt;BR /&gt;AnyConnect Premium Peers : 2500 perpetual&lt;BR /&gt;AnyConnect Essentials : Disabled perpetual&lt;BR /&gt;Other VPN Peers : 2500 perpetual&lt;BR /&gt;Total VPN Peers : 2500 perpetual&lt;BR /&gt;AnyConnect for Mobile : Enabled perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Enabled perpetual&lt;BR /&gt;Advanced Endpoint Assessment : Enabled perpetual&lt;BR /&gt;Shared License : Disabled perpetual&lt;BR /&gt;Total TLS Proxy Sessions : 4 perpetual&lt;BR /&gt;Botnet Traffic Filter : Disabled perpetual&lt;BR /&gt;IPS Module : Disabled perpetual&lt;BR /&gt;Cluster : Enabled perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5545 VPN Premium license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/sec/stby# sh int ip b&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;GigabitEthernet0/0 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/0.1605 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1.50 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1.1610 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/1.1650 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.317 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1653 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1655 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1660 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1666 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/2.1667 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.1137 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.1229 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.1350 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1601 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1651 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1652 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/4.1800 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/5 unassigned YES unset administratively down down&lt;BR /&gt;GigabitEthernet0/6 unassigned YES unset administratively down down&lt;BR /&gt;GigabitEthernet0/7 172.31.0.66 YES unset up up&lt;BR /&gt;Internal-Control0/0 127.0.1.1 YES unset up up&lt;BR /&gt;Internal-Data0/0 unassigned YES unset up up&lt;BR /&gt;Internal-Data0/1 unassigned YES unset down down&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&lt;BR /&gt;Internal-Data0/2 unassigned YES unset up up&lt;BR /&gt;Internal-Data0/3 unassigned YES unset up up&lt;BR /&gt;Management0/0 unassigned YES unset up up&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa/sec/stby# sh failover history&lt;BR /&gt;==========================================================================&lt;BR /&gt;From State To State Reason&lt;BR /&gt;==========================================================================&lt;/P&gt;&lt;P&gt;17:50:55 UTC Mar 1 2021&lt;BR /&gt;Active Standby Ready Set by the config command&lt;/P&gt;&lt;P&gt;17:19:02 UTC Mar 24 2021&lt;BR /&gt;Standby Ready Just Active Other unit wants me Active&lt;/P&gt;&lt;P&gt;17:19:02 UTC Mar 24 2021&lt;BR /&gt;Just Active Active Drain Other unit wants me Active&lt;/P&gt;&lt;P&gt;17:19:02 UTC Mar 24 2021&lt;BR /&gt;Active Drain Active Applying Config Other unit wants me Active&lt;/P&gt;&lt;P&gt;17:19:02 UTC Mar 24 2021&lt;BR /&gt;Active Applying Config Active Config Applied Other unit wants me Active&lt;/P&gt;&lt;P&gt;17:19:02 UTC Mar 24 2021&lt;BR /&gt;Active Config Applied Active Other unit wants me Active&lt;/P&gt;&lt;P&gt;17:28:33 UTC Mar 24 2021&lt;BR /&gt;Active Standby Ready Other unit wants me Standby&lt;/P&gt;&lt;P&gt;==========================================================================&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa/sec/stby# sh failover state&lt;/P&gt;&lt;P&gt;State Last Failure Reason Date/Time&lt;BR /&gt;This host - Secondary&lt;BR /&gt;Standby Ready Ifc Failure 12:48:17 UTC Feb 25 2021&lt;BR /&gt;admin MGMT: Failed&lt;BR /&gt;Other host - Primary&lt;BR /&gt;Active Ifc Failure 17:24:30 UTC Mar 24 2021&lt;BR /&gt;admin MGMT: Failed&lt;/P&gt;&lt;P&gt;====Configuration State===&lt;BR /&gt;Sync Done&lt;BR /&gt;Sync Done - STANDBY&lt;BR /&gt;====Communication State===&lt;BR /&gt;Mac set&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa/sec/stby# sh module&lt;/P&gt;&lt;P&gt;Mod Card Type Model Serial No.&lt;BR /&gt;---- -------------------------------------------- ------------------ -----------&lt;BR /&gt;0 ASA 5545-X with SW, 8 GE Data, 1 GE Mgmt ASA5545 FCH21412222&lt;BR /&gt;ips Unknown N/A FCH21412222&lt;BR /&gt;cxsc Unknown N/A FCH21412222&lt;BR /&gt;sfr Unknown N/A FCH21412222&lt;/P&gt;&lt;P&gt;Mod MAC Address Range Hw Version Fw Version Sw Version&lt;BR /&gt;---- --------------------------------- ------------ ------------ ---------------&lt;BR /&gt;0 6cb2.ae69.6528 to 6cb2.ae69.6531 3.1 2.1(9)8 9.8(4)20&lt;BR /&gt;ips 6cb2.ae69.6526 to 6cb2.ae69.6526 N/A N/A&lt;BR /&gt;cxsc 6cb2.ae69.6526 to 6cb2.ae69.6526 N/A N/A&lt;BR /&gt;sfr 6cb2.ae69.6526 to 6cb2.ae69.6526 N/A N/A&lt;/P&gt;&lt;P&gt;Mod SSM Application Name Status SSM Application Version&lt;BR /&gt;---- ------------------------------ ---------------- --------------------------&lt;BR /&gt;ips Unknown No Image Present Not Applicable&lt;BR /&gt;cxsc Unknown No Image Present Not Applicable&lt;BR /&gt;sfr Unknown No Image Present Not Applicable&lt;/P&gt;&lt;P&gt;Mod Status Data Plane Status Compatibility&lt;BR /&gt;---- ------------------ --------------------- -------------&lt;BR /&gt;0 Up Sys Not Applicable&lt;BR /&gt;ips Unresponsive Not Applicable&lt;BR /&gt;cxsc Unresponsive Not Applicable&lt;BR /&gt;sfr Unresponsive Not Applicable&lt;/P&gt;&lt;P&gt;Mod License Name License Status Time Remaining&lt;BR /&gt;---- -------------- --------------- ---------------&lt;BR /&gt;ips IPS Module Disabled perpetual&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 16:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4313898#M1079599</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-03-25T16:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314097#M1079621</link>
      <description>&lt;P&gt;No its not bug. its due to InternalData interfaces are used as various communication channels with the Firepower services module&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa.PNG" style="width: 921px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/107359i5B9595E9A2760DE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa.PNG" alt="asa.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Reference here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.ciscolive.com/c/dam/r/ciscolive/apjc/docs/2016/pdf/BRKSEC-3055.pdf" target="_blank" rel="nofollow noopener noreferrer"&gt;https://www.ciscolive.com/c/dam/r/ciscolive/apjc/docs/2016/pdf/BRKSEC-3055.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the work around here is install the sfr module on the standby firewall to fix the problem. yes you can keep the MGMT port in Admin context.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 21:07:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314097#M1079621</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-03-25T21:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314106#M1079622</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;we don't use the SFR/FP module on the FW pair.&lt;/P&gt;&lt;P&gt;can it be the other way around? i.e. uninstall or disable FP on the primary?&lt;/P&gt;&lt;P&gt;is there a way to "trick" the secondary for Internal-Data0/1 to be "up"?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 21:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314106#M1079622</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-03-25T21:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314124#M1079625</link>
      <description>&lt;P&gt;yes you can uninstall the sfr from the active asa or dont use the mgmt port use anyother data port as mgmt.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 21:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314124#M1079625</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-03-25T21:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314310#M1079635</link>
      <description>&lt;DIV id="bodyDisplay_47bd5cc90a8b55_5c2" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;'sw-module module sfr uninstall' means the software installed on the SSD drive in your ASA will delete this software premantely.&lt;/P&gt;
&lt;P&gt;'sw-module module sfr shudown' means it will power off the module so if required you can bring it up when needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;ciscoasa# &lt;STRONG&gt;sw-module module ips shutdown&lt;/STRONG&gt;&lt;BR /&gt;ciscoasa# &lt;STRONG&gt;sw-module module ips uninstall&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;however, just thinking might if you change your mind in future and want you use the SFR moudle what you can do is just mount off the hard disk at the front end of your ASA (de-seat it). but if you do not plan to use it in future than yes just uninstall it as mentioned above on these two command.&amp;nbsp;&lt;/P&gt;
&lt;DIV class="UserSignature lia-message-signature"&gt;please do not forget to rate.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 26 Mar 2021 08:32:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314310#M1079635</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-03-26T08:32:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314325#M1079639</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;will issuing both commands need an ASA 'reboot' afterwards?&lt;/P&gt;&lt;P&gt;i wanted to avoid an outage as much as possible.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 08:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314325#M1079639</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2021-03-26T08:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Context Failover - Ifc Failure</title>
      <link>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314331#M1079641</link>
      <description>&lt;P&gt;Hi Johnlloyd no you can give this commands its safe.&lt;STRONG&gt;ASA will not reload no harm to production traffic.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;its for the virtual software that works with asa will go off and un-install.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 08:56:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-context-failover-ifc-failure/m-p/4314331#M1079641</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2021-03-26T08:56:28Z</dc:date>
    </item>
  </channel>
</rss>

