<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall Active/Standby failover in case of Failover or state link in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821136#M1099832</link>
    <description>&lt;P&gt;Both exchange message through the other interface' when standby detects that specific percentage of monitors interface is not receive messages then standby will become active.&lt;/P&gt;
&lt;P&gt;Here cisco recommends to faster detect failover and repair it' otherwise you will face splits brain.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Apr 2023 08:08:17 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-04-25T08:08:17Z</dc:date>
    <item>
      <title>Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4820906#M1099823</link>
      <description>&lt;P&gt;Hi, I want to know if any or both of the Failover or state link between firewall failed which is required for HA configuration, which firewall will be active, How we can come to know that HA link between firewalls goes break to take the corrective action?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 04:33:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4820906#M1099823</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-25T04:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4820995#M1099826</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1109333"&gt;@Mit_har&lt;/a&gt; if the failover/state link fails there will be no failover, so the current active firewall will remain active. &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/high-availability.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/720/management-center-device-config-72/high-availability.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Monitor the firewall and individual interfaces using SNMP, this will alert you of the interface failure.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 08:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4820995#M1099826</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-04-25T08:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821042#M1099828</link>
      <description>&lt;P&gt;Hello inhamit,&lt;/P&gt;
&lt;P&gt;No FW will become active, the FW's will test the other links before the split-brain scenario. I would still recommend you configure the failover link over a redundant link (in this case you have the option for redundancy on HA link). To monitor the interfaces use monitor ifname.&lt;/P&gt;
&lt;P&gt;An example of config would be:&lt;/P&gt;
&lt;P&gt;interface Redundant 1&lt;BR /&gt;member-interface GigabitEthernetX/X&lt;BR /&gt;member-interface GigabitEthernetX/X&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover Redundant1&lt;BR /&gt;failover replication http&lt;BR /&gt;failover link failover Redundant1&lt;BR /&gt;failover interface ip failover X.X.X.X XX.XX.XX.0 standby X.X.X.Y&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 07:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821042#M1099828</guid>
      <dc:creator>DanielP211</dc:creator>
      <dc:date>2023-04-25T07:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821136#M1099832</link>
      <description>&lt;P&gt;Both exchange message through the other interface' when standby detects that specific percentage of monitors interface is not receive messages then standby will become active.&lt;/P&gt;
&lt;P&gt;Here cisco recommends to faster detect failover and repair it' otherwise you will face splits brain.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 08:08:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821136#M1099832</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-25T08:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821157#M1099838</link>
      <description>&lt;P&gt;Can we have redundant link for both state and failover link? what is the difference between Failover and State link?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 08:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821157#M1099838</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-25T08:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821166#M1099841</link>
      <description>&lt;P&gt;check above&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 08:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821166#M1099841</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-25T08:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821170#M1099843</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-knowledge-base/asa-interface-monitoring-in-failover-and-its-impact/ta-p/3144324" target="_blank"&gt;ASA- Interface monitoring in failover and its impact - Cisco Community&lt;/A&gt;&amp;nbsp;&amp;lt;&amp;lt;- cisco employe explain this better than me check link&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 08:53:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821170#M1099843</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-25T08:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821176#M1099845</link>
      <description>&lt;P&gt;So the best way to have redundant link for Failover and State link between the firewall total 2 dedicated ports on each firewall. can we have redundant link for state link? Any config?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 09:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821176#M1099845</guid>
      <dc:creator>Mit_har</dc:creator>
      <dc:date>2023-04-25T09:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall Active/Standby failover in case of Failover or state link</title>
      <link>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821177#M1099846</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/high_availability_for_firepower_threat_defense.html" target="_blank"&gt;Firepower Management Center Configuration Guide, Version 6.4 - High Availability for FTD [Cisco Secure Firewall Management Center] - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;you can use PO for failover BUT there is some note you need to check, see above link&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;for what different the different the failover link excahnge the config and heartbeat between two FW and status exchange the connection status (replication of traffic status)&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 09:04:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-active-standby-failover-in-case-of-failover-or-state/m-p/4821177#M1099846</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-04-25T09:04:45Z</dc:date>
    </item>
  </channel>
</rss>

