<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4477918#M1084132</link>
    <description>&lt;P&gt;Hi Mr. Milos! I hope all is good! just today we had the opportunity to apply the VMWARE prerequisites (along with a Cisco TAC Engineer in the maintenance window) that you mentioned in your message a long time ago. I come back here to write to you that after applying the 3 tunning indicated in the document on the Firewall Interfaces (all interfaces not only on the management and failover interfaces like the aforementioned document !!) the problem was solved !!! !&lt;BR /&gt;But... unfortunately, during the maintenance window, we faced another problem... when we forced failover using CISCO FDM, the failover worked fine, but the output of the SH FAILOVER command&amp;nbsp; showed us the WAITING status when the correct status would be MONITORED for all interfaces in use. We decided to keep the TAC open and the CISCO Engineer will continue to look into this issue.&lt;BR /&gt;Have you ever seen this kind of problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show failover&lt;BR /&gt;Failover On&lt;BR /&gt;Failover unit Secondary&lt;BR /&gt;Failover LAN Interface: failover-link GigabitEthernet0/3 (up)&lt;BR /&gt;Reconnect timeout 0:00:00&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 4 of 311 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;failover replication http&lt;BR /&gt;Version: Ours 9.14(1)150, Mate 9.14(1)150&lt;BR /&gt;Last Failover at: 14:51:20 UTC Sep 30 2021&lt;BR /&gt;This host: Secondary - Active&lt;BR /&gt;Active time: 14336 (sec)&lt;BR /&gt;slot 0: ASAv hw/sw rev (/9.14(1)150) status (Up Sys)&lt;BR /&gt;Interface idmz (172.31.3.140): Testing (Waiting)&lt;BR /&gt;Interface inside (10.199.0.253): Normal (Waiting)&lt;BR /&gt;Interface dmz-satelite (10.12.20.2): Testing (Waiting)&lt;BR /&gt;Interface diagnostic (0.0.0.0): Normal (Waiting)&lt;BR /&gt;slot 1: snort rev (1.0) status (up)&lt;BR /&gt;slot 2: diskstatus rev (1.0) status (up)&lt;BR /&gt;Other host: Primary - Standby Ready&lt;BR /&gt;Active time: 1598 (sec)&lt;BR /&gt;Interface idmz (172.31.3.141): Normal (Waiting)&lt;BR /&gt;Interface inside (10.199.0.250): Normal (Waiting)&lt;BR /&gt;Interface dmz-satelite (10.12.20.3): Normal (Waiting)&lt;BR /&gt;Interface diagnostic (0.0.0.0): Normal (Waiting)&lt;BR /&gt;slot 1: snort rev (1.0) status (up)&lt;BR /&gt;slot 2: diskstatus rev (1.0) status (up)&lt;/P&gt;&lt;P&gt;Stateful Failover Logical Update Statistics&lt;BR /&gt;Link : failover-link GigabitEthernet0/3 (up)&lt;BR /&gt;Stateful Obj xmit xerr rcv rerr&lt;BR /&gt;General 2234881 0 349581397 0&lt;BR /&gt;sys cmd 575612 0 575606 0&lt;BR /&gt;up time 0 0 0 0&lt;BR /&gt;RPC services 0 0 0 0&lt;BR /&gt;TCP conn 497437 0 119291793 0&lt;BR /&gt;UDP conn 1151016 0 229657866 0&lt;BR /&gt;ARP tbl 10769 0 43784 0&lt;BR /&gt;Xlate_Timeout 0 0 0 0&lt;BR /&gt;IPv6 ND tbl 0 0 0 0&lt;BR /&gt;VPN IKEv1 SA 0 0 0 0&lt;BR /&gt;VPN IKEv1 P2 0 0 0 0&lt;BR /&gt;VPN IKEv2 SA 0 0 0 0&lt;BR /&gt;VPN IKEv2 P2 0 0 0 0&lt;BR /&gt;VPN CTCP upd 0 0 0 0&lt;BR /&gt;VPN SDI upd 0 0 0 0&lt;BR /&gt;VPN DHCP upd 0 0 0 0&lt;BR /&gt;SIP Session 0 0 0 0&lt;BR /&gt;SIP Tx 0 0 0 0&lt;BR /&gt;SIP Pinhole 0 0 0 0&lt;BR /&gt;Route Session 0 0 3 0&lt;BR /&gt;Router ID 0 0 0 0&lt;BR /&gt;User-Identity 0 0 2 0&lt;BR /&gt;CTS SGTNAME 0 0 0 0&lt;BR /&gt;CTS PAC 0 0 0 0&lt;BR /&gt;TrustSec-SXP 0 0 0 0&lt;BR /&gt;IPv6 Route 0 0 0 0&lt;BR /&gt;STS Table 0 0 0 0&lt;BR /&gt;Umbrella Device-ID 0 0 0 0&lt;BR /&gt;Rule DB B-Sync 0 0 1 0&lt;BR /&gt;Rule DB P-Sync 47 0 12340 0&lt;BR /&gt;Rule DB Delete 0 0 2 0&lt;/P&gt;&lt;P&gt;Logical Update Queue Information&lt;BR /&gt;Cur Max Total&lt;BR /&gt;Recv Q: 0 49 351904077&lt;BR /&gt;Xmit Q: 0 1 2250942&lt;/P&gt;</description>
    <pubDate>Thu, 30 Sep 2021 20:39:33 GMT</pubDate>
    <dc:creator>GiovanniStavale53399</dc:creator>
    <dc:date>2021-09-30T20:39:33Z</dc:date>
    <item>
      <title>Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mode</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451295#M1082963</link>
      <description>&lt;P&gt;Hello everyone! We have a Firepower 2110 FTD IMAGE in HA Configuration on different VM Servers on different CPDs, where Vlan Failover is a Layer 2 extended. When we forced a failover on the primary FTD, flows did not migrate to the secondary firewall. We suspect that is because the FTD Primary Firewall's Mac address remains registered on the Primary Firewall's virtual switch port. That makes sense? something set up wrong?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 17:22:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451295#M1082963</guid>
      <dc:creator>GiovanniStavale53399</dc:creator>
      <dc:date>2021-08-18T17:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 ASA IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451327#M1082965</link>
      <description>&lt;P&gt;Do you have high level diagram how these connected, since you suspected the ARP table ? are you see the ARP table on switch&amp;nbsp; ?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 16:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451327#M1082965</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-18T16:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451430#M1082972</link>
      <description>&lt;P&gt;Hi Balaji! Thank you for your attention! Sorry for my mistake! Image is FTD, not ASA! I am really sorry! I have attached the HLD here and yes, we saw the MAC address of the primary FTD registered on the Core switch after the mode switch executed. Here is some evidences we collected after we forced the failover via the switch mode command:&lt;/P&gt;&lt;P&gt;Hostname: BRVIX5SECXFW002 (Primary)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;show version&lt;BR /&gt;----------------[ BRVIX5SECXFW002 ]-----------------&lt;BR /&gt;Model : Cisco Firepower Threat Defense for VMWare (75) Version 6.6.1 (Build 91)&lt;BR /&gt;----------------------------------------------------&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 9.14(1)150&lt;BR /&gt;SSP Operating System Version 2.8(1.129)&lt;BR /&gt;Compiled on Tue 15-Sep-20 23:14 GMT by builders&lt;BR /&gt;System image file is "boot:/asa9141-150-smp-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;BR /&gt;BRVIX5SECXFW002 up 7 days 4 hours&lt;BR /&gt;failover cluster up 7 days 4 hours&lt;BR /&gt;Hardware: NGFWv, 8192 MB RAM, CPU Xeon 4100/6100/8100 series 2300 MHz, 1 CPU (4 cores)&lt;BR /&gt;Internal ATA Compact Flash, 50176MB&lt;BR /&gt;Slot 1: ATA Compact Flash, 50176MB&lt;BR /&gt;BIOS Flash Firmware Hub @ 0x0, 0KB&lt;BR /&gt;0: Int: Internal-Data0/0 : address is 0050.5682.fa34, irq 7&lt;BR /&gt;1: Ext: GigabitEthernet0/0 : address is 0050.5682.63e8, irq 9&lt;BR /&gt;2: Ext: GigabitEthernet0/1 : address is 0050.5682.b48d, irq 11&lt;BR /&gt;3: Ext: GigabitEthernet0/2 : address is 0050.5682.a8c4, irq 10&lt;BR /&gt;4: Ext: GigabitEthernet0/3 : address is 0050.5682.f581, irq 7&lt;BR /&gt;5: Ext: GigabitEthernet0/4 : address is 0050.5682.6d24, irq 9&lt;BR /&gt;6: Ext: GigabitEthernet0/5 : address is 0050.5682.5934, irq 11&lt;BR /&gt;7: Ext: GigabitEthernet0/6 : address is 0050.5682.cb47, irq 10&lt;BR /&gt;8: Ext: GigabitEthernet0/7 : address is 0050.5682.2fe5, irq 7&lt;BR /&gt;9: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0&lt;BR /&gt;10: Int: Internal-Data0/0 : address is 0000.0000.0000, irq 0&lt;BR /&gt;11: Ext: Management0/0 : address is 0050.5682.fa34, irq 0&lt;BR /&gt;12: Int: Internal-Data0/1 : address is 0000.0100.0001, irq 0&lt;BR /&gt;13: Int: Internal-Data0/2 : address is 0000.0000.0000, irq 0&lt;BR /&gt;14: Int: Internal-Control0/1 : address is 0000.0001.0001, irq 0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;gt; show failover&lt;BR /&gt;Failover On&lt;BR /&gt;Failover unit Primary&lt;BR /&gt;Failover LAN Interface: failover-link GigabitEthernet0/3 (up)&lt;BR /&gt;Reconnect timeout 0:00:00&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 4 of 311 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;failover replication http&lt;BR /&gt;Version: Ours 9.14(1)150, Mate 9.14(1)150&lt;BR /&gt;Serial Number: Ours 9A29XJM6DWW, Mate 9A6S9UB4NXQ&lt;BR /&gt;Last Failover at: 14:28:32 UTC Aug 18 2021&lt;BR /&gt;This host: Primary - Active&lt;BR /&gt;Active time: 14630 (sec)&lt;BR /&gt;slot 0: ASAv hw/sw rev (/9.14(1)150) status (Up Sys)&lt;BR /&gt;Interface diagnostic (0.0.0.0): Normal (Waiting)&lt;BR /&gt;Interface idmz (X.X.X.X): Normal (Monitored)&lt;BR /&gt;Interface inside (Y.Y.Y.Y): Normal (Waiting)&lt;BR /&gt;Interface dmz-satelite (Z.Z.Z.Z): Normal (Waiting)&lt;BR /&gt;slot 1: snort rev (1.0) status (up)&lt;BR /&gt;slot 2: diskstatus rev (1.0) status (up)&lt;BR /&gt;Other host: Secondary - Standby Ready&lt;BR /&gt;Active time: 278 (sec)&lt;BR /&gt;Interface diagnostic (0.0.0.0): Normal (Waiting)&lt;BR /&gt;Interface idmz (X.X.X.X): Normal (Monitored)&lt;BR /&gt;Interface inside (Y.Y.Y.Y): Normal (Waiting)&lt;BR /&gt;Interface dmz-satelite (Z.Z.Z.Z): Normal (Waiting)&lt;BR /&gt;slot 1: snort rev (1.0) status (up)&lt;BR /&gt;slot 2: diskstatus rev (1.0) status (up)&lt;BR /&gt;Stateful Failover Logical Update Statistics&lt;BR /&gt;Link : failover-link GigabitEthernet0/3 (up)&lt;BR /&gt;Stateful Obj xmit xerr rcv rerr&lt;BR /&gt;General 1739355 0 83899 0&lt;BR /&gt;sys cmd 80321 0 80321 0&lt;BR /&gt;up time 0 0 0 0&lt;BR /&gt;RPC services 0 0 0 0&lt;BR /&gt;TCP conn 506321 0 0 0&lt;BR /&gt;UDP conn 1151447 0 3578 0&lt;BR /&gt;ARP tbl 1208 0 0 0&lt;BR /&gt;Xlate_Timeout 0 0 0 0&lt;BR /&gt;IPv6 ND tbl 0 0 0 0&lt;BR /&gt;VPN IKEv1 SA 0 0 0 0&lt;BR /&gt;VPN IKEv1 P2 0 0 0 0&lt;BR /&gt;VPN IKEv2 SA 0 0 0 0&lt;BR /&gt;VPN IKEv2 P2 0 0 0 0&lt;BR /&gt;VPN CTCP upd 0 0 0 0&lt;BR /&gt;VPN SDI upd 0 0 0 0&lt;BR /&gt;VPN DHCP upd 0 0 0 0&lt;BR /&gt;SIP Session 0 0 0 0&lt;BR /&gt;SIP Tx 0 0 0 0&lt;BR /&gt;SIP Pinhole 0 0 0 0&lt;BR /&gt;Route Session 3 0 0 0&lt;BR /&gt;Router ID 0 0 0 0&lt;BR /&gt;User-Identity 1 0 0 0&lt;BR /&gt;CTS SGTNAME 0 0 0 0&lt;BR /&gt;CTS PAC 0 0 0 0&lt;BR /&gt;TrustSec-SXP 0 0 0 0&lt;BR /&gt;IPv6 Route 0 0 0 0&lt;BR /&gt;STS Table 0 0 0 0&lt;BR /&gt;Umbrella Device-ID 0 0 0 0&lt;BR /&gt;Rule DB B-Sync 0 0 0 0&lt;BR /&gt;Rule DB P-Sync 54 0 0 0&lt;BR /&gt;Rule DB Delete 0 0 0 0&lt;BR /&gt;Logical Update Queue Information&lt;BR /&gt;Cur Max Total&lt;BR /&gt;Recv Q: 0 11 84107&lt;BR /&gt;Xmit Q: 0 11 2065244&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;VLAN Name Status Ports&lt;BR /&gt;---- -------------------------------- --------- -------------------------------&lt;BR /&gt;2000 BRVIX5SECXFW002-FAILOVER active Po102&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;BRVIX5TOVMBELESA-RACK36-CORE01#sh mac address-table interface po102 | in f581&lt;BR /&gt;2000 0050.5682.f581 DYNAMIC Po102&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 18:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451430#M1082972</guid>
      <dc:creator>GiovanniStavale53399</dc:creator>
      <dc:date>2021-08-18T18:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451622#M1082982</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1187555"&gt;@GiovanniStavale53399&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Is this Firepower2110 deployment or FTDv deployment (on some virtualization platform)? You are mentioning FPR2110, while your output shows it is FTDv for VMware. If it is a physical deployment, then there is a possibility that you'll need to troubleshoot connectivitty on physical level. If it is VM deployment, than you need to involve VMware part as well.&lt;/P&gt;&lt;P&gt;Another thing is that you are running FTD v6.6.1. I would advise upgrade to either recommended 6.6.4, or to more recent 6.6.5. There are couple of bugs related to HA, which might help you.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 06:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451622#M1082982</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-19T06:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451929#M1082997</link>
      <description>&lt;P&gt;Hi Mr. Milos! thank you very much for your attention! Below the answers for your questions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is this Firepower2110 deployment or FTDv deployment (on some virtualization platform)?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;FTDv deployment - VMWare&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If it is a physical deployment, then there is a possibility that you'll need to troubleshoot connectivitty on physical level. If it is VM deployment, than you need to involve VMware part as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;We agree with you but our expectation is to find someone here who lived this experience, to find out if there is any fine tuning to be done in the VMWare environment. Anyway, we will schedule a change to reproduce the problem and try to analyze it with the help of the VMware team&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Another thing is that you are running FTD v6.6.1. I would advise upgrade to either recommended 6.6.4, or to more recent 6.6.5. There are couple of bugs related to HA, which might help you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;So we´ll start a search about that bugs on Cisco site&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 15:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4451929#M1082997</guid>
      <dc:creator>GiovanniStavale53399</dc:creator>
      <dc:date>2021-08-19T15:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4452055#M1083001</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1187555"&gt;@GiovanniStavale53399&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;For physical part, I would check connectivity - if basic connectivity for given interfaces work properly in normal mode (e.g. ping betwen active and standby address), I would start with the assumption that everyting is ok, on physical network. I never seen Cisco swich behaves this dummy so far.&lt;/P&gt;&lt;P&gt;Since it is VMware deployment, I would start with checking VMware network. Please make sure your vSwitch is configured properly. You can find prerequisites &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/vmware/ftdv/ftdv-vmware-qsg.html#pgfId-3320876" target="_self"&gt;here&lt;/A&gt;. I've seen HSRP/VRRP misbehavior if these settings are not honored. Also, explicitly states that you must configure it properly, otherwise it will cause issues with HA (you do experience described behavior).&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 19:23:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4452055#M1083001</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-08-19T19:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4477918#M1084132</link>
      <description>&lt;P&gt;Hi Mr. Milos! I hope all is good! just today we had the opportunity to apply the VMWARE prerequisites (along with a Cisco TAC Engineer in the maintenance window) that you mentioned in your message a long time ago. I come back here to write to you that after applying the 3 tunning indicated in the document on the Firewall Interfaces (all interfaces not only on the management and failover interfaces like the aforementioned document !!) the problem was solved !!! !&lt;BR /&gt;But... unfortunately, during the maintenance window, we faced another problem... when we forced failover using CISCO FDM, the failover worked fine, but the output of the SH FAILOVER command&amp;nbsp; showed us the WAITING status when the correct status would be MONITORED for all interfaces in use. We decided to keep the TAC open and the CISCO Engineer will continue to look into this issue.&lt;BR /&gt;Have you ever seen this kind of problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show failover&lt;BR /&gt;Failover On&lt;BR /&gt;Failover unit Secondary&lt;BR /&gt;Failover LAN Interface: failover-link GigabitEthernet0/3 (up)&lt;BR /&gt;Reconnect timeout 0:00:00&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 4 of 311 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;failover replication http&lt;BR /&gt;Version: Ours 9.14(1)150, Mate 9.14(1)150&lt;BR /&gt;Last Failover at: 14:51:20 UTC Sep 30 2021&lt;BR /&gt;This host: Secondary - Active&lt;BR /&gt;Active time: 14336 (sec)&lt;BR /&gt;slot 0: ASAv hw/sw rev (/9.14(1)150) status (Up Sys)&lt;BR /&gt;Interface idmz (172.31.3.140): Testing (Waiting)&lt;BR /&gt;Interface inside (10.199.0.253): Normal (Waiting)&lt;BR /&gt;Interface dmz-satelite (10.12.20.2): Testing (Waiting)&lt;BR /&gt;Interface diagnostic (0.0.0.0): Normal (Waiting)&lt;BR /&gt;slot 1: snort rev (1.0) status (up)&lt;BR /&gt;slot 2: diskstatus rev (1.0) status (up)&lt;BR /&gt;Other host: Primary - Standby Ready&lt;BR /&gt;Active time: 1598 (sec)&lt;BR /&gt;Interface idmz (172.31.3.141): Normal (Waiting)&lt;BR /&gt;Interface inside (10.199.0.250): Normal (Waiting)&lt;BR /&gt;Interface dmz-satelite (10.12.20.3): Normal (Waiting)&lt;BR /&gt;Interface diagnostic (0.0.0.0): Normal (Waiting)&lt;BR /&gt;slot 1: snort rev (1.0) status (up)&lt;BR /&gt;slot 2: diskstatus rev (1.0) status (up)&lt;/P&gt;&lt;P&gt;Stateful Failover Logical Update Statistics&lt;BR /&gt;Link : failover-link GigabitEthernet0/3 (up)&lt;BR /&gt;Stateful Obj xmit xerr rcv rerr&lt;BR /&gt;General 2234881 0 349581397 0&lt;BR /&gt;sys cmd 575612 0 575606 0&lt;BR /&gt;up time 0 0 0 0&lt;BR /&gt;RPC services 0 0 0 0&lt;BR /&gt;TCP conn 497437 0 119291793 0&lt;BR /&gt;UDP conn 1151016 0 229657866 0&lt;BR /&gt;ARP tbl 10769 0 43784 0&lt;BR /&gt;Xlate_Timeout 0 0 0 0&lt;BR /&gt;IPv6 ND tbl 0 0 0 0&lt;BR /&gt;VPN IKEv1 SA 0 0 0 0&lt;BR /&gt;VPN IKEv1 P2 0 0 0 0&lt;BR /&gt;VPN IKEv2 SA 0 0 0 0&lt;BR /&gt;VPN IKEv2 P2 0 0 0 0&lt;BR /&gt;VPN CTCP upd 0 0 0 0&lt;BR /&gt;VPN SDI upd 0 0 0 0&lt;BR /&gt;VPN DHCP upd 0 0 0 0&lt;BR /&gt;SIP Session 0 0 0 0&lt;BR /&gt;SIP Tx 0 0 0 0&lt;BR /&gt;SIP Pinhole 0 0 0 0&lt;BR /&gt;Route Session 0 0 3 0&lt;BR /&gt;Router ID 0 0 0 0&lt;BR /&gt;User-Identity 0 0 2 0&lt;BR /&gt;CTS SGTNAME 0 0 0 0&lt;BR /&gt;CTS PAC 0 0 0 0&lt;BR /&gt;TrustSec-SXP 0 0 0 0&lt;BR /&gt;IPv6 Route 0 0 0 0&lt;BR /&gt;STS Table 0 0 0 0&lt;BR /&gt;Umbrella Device-ID 0 0 0 0&lt;BR /&gt;Rule DB B-Sync 0 0 1 0&lt;BR /&gt;Rule DB P-Sync 47 0 12340 0&lt;BR /&gt;Rule DB Delete 0 0 2 0&lt;/P&gt;&lt;P&gt;Logical Update Queue Information&lt;BR /&gt;Cur Max Total&lt;BR /&gt;Recv Q: 0 49 351904077&lt;BR /&gt;Xmit Q: 0 1 2250942&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 20:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4477918#M1084132</guid>
      <dc:creator>GiovanniStavale53399</dc:creator>
      <dc:date>2021-09-30T20:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firepower 2110 FTD IMAGE in HA MODE Failed when force a Switch Mod</title>
      <link>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4478102#M1084136</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1187555"&gt;@GiovanniStavale53399&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Glad to hear that it helped.&lt;/P&gt;&lt;P&gt;I haven't noticed where in the document is stated that it applies only to management interface. From my standpoint, it is clear that it must be applied to all interfaces, as these settings will allow ASA to learn traffic not destined for its physical MAC address (in simplified explanation). This is required as active MAC address is a floating address, and can be seen on both devices at some point.&lt;/P&gt;&lt;P&gt;Have you applied this configuration on all hosts in your infrastructure (all on which ASA can exist)? Based on the outputs, it looks to me that it could happen that change was not done on all vSwitch-es.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 06:19:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-2110-ftd-image-in-ha-mode-failed-when-force-a-switch/m-p/4478102#M1084136</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2021-10-01T06:19:18Z</dc:date>
    </item>
  </channel>
</rss>

