<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Stateful Failover in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123305#M1113280</link>
    <description>&lt;P&gt;So we use h323 and SIP depending on phones, but the its mainly h323. When I do a "show H323 ras" on the active, I can see h323 calls, but cannot see those on the standby unit. should I see them?&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jun 2024 10:20:47 GMT</pubDate>
    <dc:creator>Man29er</dc:creator>
    <dc:date>2024-06-03T10:20:47Z</dc:date>
    <item>
      <title>ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123256#M1113272</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;I'm trying to establish if I have my firewall setup correctly for stateful failover. We've had reports that failing over the firewalls caused ip phones to drop their calls, suggesting it is not setup as stateful. From what I can establish, it is setup correctly.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;FIREWALL1# sh run | inc failover&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface FAILOVER GigabitEthernet1/8&lt;BR /&gt;failover key *****&lt;BR /&gt;failover replication http&lt;BR /&gt;failover link FAILOVER GigabitEthernet1/8&lt;BR /&gt;failover interface ip FAILOVER 10.10.10.1 255.255.255.252 standby 10.10.10.2&lt;BR /&gt;no failover wait-disable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Stateful Failover Logical Update Statistics&lt;BR /&gt;Link : FAILOVER GigabitEthernet1/8 (up)&lt;BR /&gt;Stateful Obj xmit xerr rcv rerr&lt;BR /&gt;General 270651667 0 9977695 6&lt;BR /&gt;sys cmd 126320 0 126320 0&lt;BR /&gt;up time 0 0 0 0&lt;BR /&gt;RPC services 0 0 0 0&lt;BR /&gt;TCP conn 202463432 0 8101532 0&lt;BR /&gt;UDP conn 62368435 0 1620812 6&lt;BR /&gt;ARP tbl 5693559 0 129030 0&lt;BR /&gt;Xlate_Timeout 0 0 0 0&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The only command I may have got incorrect is the line;-&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;failover link FAILOVER GigabitEthernet1/8. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I found a reference saying;-&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;If the Stateful Failover link uses the failover link or a regular data interface, then you only need to supply the&amp;nbsp;if_name&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;&amp;nbsp;argumen&lt;/EM&gt;t.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If this configuration is all correct, is there any adjustments I can make so calls are not dropped when we failover? Calls will be RTP over UDP, which will I guess the failover does not keep the state up.&lt;/P&gt;&lt;P&gt;Firewalls are 5516-X running 9.16(4)57 and Phones handsets are Avaya.&lt;/P&gt;&lt;P&gt;Thanks in advance for any advice.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 09:38:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123256#M1113272</guid>
      <dc:creator>Man29er</dc:creator>
      <dc:date>2024-06-03T09:38:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123270#M1113274</link>
      <description>&lt;P&gt;Config is ok. Stateful failover for SIP is supported since ASA 8.0.2 so calls shouldn't drop. You can check that SIP connections are replicated to the standby unit, I believe "show sip" should display sessions there too. But after that you'll need to open TAC case as troubleshooting is nearly impossible on live system due to the lack of conditional debug for SIP feature. Failover debugs are also not useful on a production system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 09:41:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123270#M1113274</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-06-03T09:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123273#M1113275</link>
      <description>&lt;P&gt;There are two timeout&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Floating timeout and conn holddown timeout&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try shortest these timeout abd check the udp traffic if it drop any more or not&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 09:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123273#M1113275</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-03T09:43:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123284#M1113277</link>
      <description>&lt;P&gt;These commands have nothing to do with failover, but I agree that it worth to verify if NSF (non-stop forwarding) is configured, provided that you use OSPF or BGP on ASA so that routes are not lost during failover event. This is not needed in case of static routing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 09:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123284#M1113277</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-06-03T09:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123287#M1113278</link>
      <description>&lt;P&gt;Thanks you for the reply, so would it be a case of putting the Poll times to the lowest?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Man29er_1-1717408720196.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/219934i96DEB863D8BAF9B9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Man29er_1-1717408720196.png" alt="Man29er_1-1717408720196.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 09:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123287#M1113278</guid>
      <dc:creator>Man29er</dc:creator>
      <dc:date>2024-06-03T09:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123291#M1113279</link>
      <description>&lt;P&gt;Dont adjust this timer&lt;BR /&gt;let me check effect of it on UDP traffic.&amp;nbsp;&lt;BR /&gt;the timer I suggest before is make Conn clear when the interface is change, the Poll timer is effect how fast the FW HA exchage and detect.&lt;/P&gt;
&lt;P&gt;update you today&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 06:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123291#M1113279</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-05T06:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123305#M1113280</link>
      <description>&lt;P&gt;So we use h323 and SIP depending on phones, but the its mainly h323. When I do a "show H323 ras" on the active, I can see h323 calls, but cannot see those on the standby unit. should I see them?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 10:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123305#M1113280</guid>
      <dc:creator>Man29er</dc:creator>
      <dc:date>2024-06-03T10:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123334#M1113287</link>
      <description>&lt;P&gt;I don't know. Documentation doesn't mention that state replication for RAS is not supported. Do you see H.225 and H.245 connections ("show h225" / "show h245") on standby?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 11:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123334#M1113287</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-06-03T11:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123352#M1113288</link>
      <description>&lt;P&gt;No, nothing shows on the standby for either H225 or H245. I can see H225 on active.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 11:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123352#M1113288</guid>
      <dc:creator>Man29er</dc:creator>
      <dc:date>2024-06-03T11:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123509#M1113298</link>
      <description>&lt;P&gt;Hard to say. I'd enable "logging standby", configure logging to syslog at informational level and check what standby unit logs when call is established and also right after failover event when the unit becomes active. In the syslog search for IP addresses of IP phones, gatekeeper, etc.&lt;/P&gt;&lt;P&gt;Also, I'd verify that TCP/1720 connections are present on the standby: "show conn long protocol tcp port 1720". They might still be there even if "show h225" output is empty. Same for TCP/1719. H.245, RTP and RTCP ports are all dynamic, so you may need to compare all connections for some IP phone between active and standby: "show conn long addr &amp;lt;phone&amp;gt;". Something like that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 15:55:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123509#M1113298</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-06-03T15:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123536#M1113301</link>
      <description>&lt;P&gt;Thank you. "&lt;SPAN&gt;show conn long protocol tcp port 1720" returns info on the standby that looks identical to the primary. I'll setup the logging on the secondary too. I'm away for a few days so will do that on return. Thanks for you help.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 16:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123536#M1113301</guid>
      <dc:creator>Man29er</dc:creator>
      <dc:date>2024-06-03T16:44:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123553#M1113302</link>
      <description>&lt;P&gt;Show Conn identical will good sign of healthy HA between two FW'&lt;/P&gt;
&lt;P&gt;If you can when you have time check arp table also check if it identical or not.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 16:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5123553#M1113302</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-03T16:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5124215#M1113323</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;Can you post the output of the following please?&lt;BR /&gt;&lt;EM&gt;sh failover&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sh failover interfaces&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sh run all monitor&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 08:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5124215#M1113323</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2024-06-04T08:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5124257#M1113327</link>
      <description>&lt;P&gt;Output below...&lt;/P&gt;&lt;P&gt;FIREWALL1# sh failover&lt;BR /&gt;Failover On&lt;BR /&gt;Failover unit Primary&lt;BR /&gt;Failover LAN Interface: FAILOVER GigabitEthernet1/8 (up)&lt;BR /&gt;Reconnect timeout 0:00:00&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 5 of 410 maximum&lt;BR /&gt;MAC Address Move Notification Interval not set&lt;BR /&gt;failover replication http&lt;BR /&gt;Cipher in use: 3DES/AES&lt;BR /&gt;Version: Ours 9.16(4)57, Mate 9.16(4)57&lt;BR /&gt;Serial Number: Ours JAD2xxxxx, Mate JAD2xxxxxx&lt;BR /&gt;Last Failover at: 14:52:49 GMT/BDT May 23 2024&lt;BR /&gt;This host: Primary - Active&lt;BR /&gt;Active time: 1019847 (sec)&lt;BR /&gt;slot 1: ASA5516 hw/sw rev (3.3/9.16(4)57) status (Up Sys)&lt;BR /&gt;Interface INSIDE (x.x.x.x): Normal (Monitored)&lt;BR /&gt;Interface APPS (x.x.x.x): Link Down (Not-Monitored)&lt;BR /&gt;Interface APPS2 (x.x.x.x): Link Down (Not-Monitored)&lt;BR /&gt;Interface OUTSIDE (x.x.x.x): Normal (Waiting)&lt;BR /&gt;Interface MISC (0.0.0.0): Link Down (Not-Monitored)&lt;BR /&gt;Interface APPS3 (x.x.x.x): Normal (Waiting)&lt;BR /&gt;Interface VOICE (x.x.x.x): Normal (Monitored)&lt;BR /&gt;Interface MGMT (192.168.x.x.): Normal (Monitored)&lt;BR /&gt;slot 2: SFR5516 hw/sw rev (N/A/6.2.2-81) status (Up/Up)&lt;BR /&gt;ASA FirePOWER, 6.2.2-81, Up, (Monitored)&lt;BR /&gt;slot 2: SFR5516 hw/sw rev (N/A/6.2.2-81) status (Up/Up)&lt;BR /&gt;ASA FirePOWER, 6.2.2-81, Up, (Monitored)&lt;BR /&gt;Other host: Secondary - Standby Ready&lt;BR /&gt;Active time: 13755 (sec)&lt;BR /&gt;slot 1: ASA5516 hw/sw rev (3.3/9.16(4)57) status (Up Sys)&lt;BR /&gt;Interface INSIDE (x.x.x.x): Normal (Monitored)&lt;BR /&gt;Interface APPS (0.0.0.0): Normal (Not-Monitored)&lt;BR /&gt;Interface APPS2 (0.0.0.0): Normal (Not-Monitored)&lt;BR /&gt;Interface OUTSIDE (0.0.0.0): Normal (Waiting)&lt;BR /&gt;Interface MISC (0.0.0.0): Normal (Not-Monitored)&lt;BR /&gt;Interface APPS3 (0.0.0.0): Normal (Waiting)&lt;BR /&gt;Interface VOICE (x.x.x.x): Normal (Monitored)&lt;BR /&gt;Interface MGMT (192.168.x.x): Normal (Monitored)&lt;BR /&gt;slot 2: SFR5516 hw/sw rev (N/A/6.2.2-81) status (Up/Up)&lt;BR /&gt;ASA FirePOWER, 6.2.2-81, Up, (Monitored)&lt;BR /&gt;slot 2: SFR5516 hw/sw rev (N/A/6.2.2-81) status (Up/Up)&lt;BR /&gt;ASA FirePOWER, 6.2.2-81, Up, (Monitored)&lt;/P&gt;&lt;P&gt;Stateful Failover Logical Update Statistics&lt;BR /&gt;Link : FAILOVER GigabitEthernet1/8 (up)&lt;BR /&gt;Stateful Obj xmit xerr rcv rerr&lt;BR /&gt;General 305279662 0 9989197 6&lt;BR /&gt;sys cmd 137822 0 137822 0&lt;BR /&gt;up time 0 0 0 0&lt;BR /&gt;RPC services 0 0 0 0&lt;BR /&gt;TCP conn 229734352 0 8101532 0&lt;BR /&gt;UDP conn 69223841 0 1620812 6&lt;BR /&gt;ARP tbl 6183669 0 129030 0&lt;BR /&gt;Xlate_Timeout 0 0 0 0&lt;BR /&gt;IPv6 ND tbl 0 0 0 0&lt;BR /&gt;VPN IKEv1 SA 0 0 0 0&lt;BR /&gt;VPN IKEv1 P2 0 0 0 0&lt;BR /&gt;VPN IKEv2 SA 0 0 0 0&lt;BR /&gt;VPN IKEv2 P2 0 0 0 0&lt;BR /&gt;VPN CTCP upd 0 0 0 0&lt;BR /&gt;VPN SDI upd 0 0 0 0&lt;BR /&gt;VPN DHCP upd 0 0 0 0&lt;BR /&gt;SIP Session 1 0 0 0&lt;BR /&gt;SIP Tx 1 0 0 0&lt;BR /&gt;SIP Pinhole 0 0 0 0&lt;BR /&gt;Route Session 0 0 0 0&lt;BR /&gt;Router ID 0 0 0 0&lt;BR /&gt;User-Identity 0 0 1 0&lt;BR /&gt;CTS SGTNAME 0 0 0 0&lt;BR /&gt;CTS PAC 0 0 0 0&lt;BR /&gt;TrustSec-SXP 0 0 0 0&lt;BR /&gt;IPv6 Route 0 0 0 0&lt;BR /&gt;STS Table 0 0 0 0&lt;BR /&gt;Umbrella Device-ID 0 0 0 0&lt;/P&gt;&lt;P&gt;Logical Update Queue Information&lt;BR /&gt;Cur Max Total&lt;BR /&gt;Recv Q: 0 13 9996728&lt;BR /&gt;Xmit Q: 0 1 305832185&lt;BR /&gt;FIREWALL1# show failover int&lt;BR /&gt;FIREWALL1# show failover interface&lt;BR /&gt;interface FAILOVER GigabitEthernet1/8&lt;BR /&gt;System IP Address: 10.10.10.1 255.255.255.252&lt;BR /&gt;My IP Address : 10.10.10.1&lt;BR /&gt;Other IP Address : 10.10.10.2&lt;BR /&gt;FIREWALL1# sh run all monitor&lt;BR /&gt;FIREWALL1# sh run all monitor-interface&lt;BR /&gt;monitor-interface INSIDE&lt;BR /&gt;no monitor-interface APPS&lt;BR /&gt;no monitor-interface APPS2&lt;BR /&gt;monitor-interface OUTSIDE&lt;BR /&gt;no monitor-interface MISC&lt;BR /&gt;monitor-interface APPS3&lt;BR /&gt;monitor-interface VOICE&lt;BR /&gt;monitor-interface MGMT&lt;BR /&gt;monitor-interface service-module&lt;BR /&gt;FIREWALL1#&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 09:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5124257#M1113327</guid>
      <dc:creator>Man29er</dc:creator>
      <dc:date>2024-06-04T09:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Stateful Failover</title>
      <link>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5124350#M1113331</link>
      <description>&lt;P&gt;waiting your reply about ARP&amp;nbsp;&lt;BR /&gt;also share&amp;nbsp;&lt;BR /&gt;show service-policy inspect SIP&amp;nbsp;&lt;BR /&gt;show service-policy inspect h323 ras&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;to check if policy drop the packet when the traffic shift from the Active to standby&amp;nbsp;&lt;BR /&gt;NOTE:- you need to do show service-policy at least three times to see which counter is increase&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2024 10:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-stateful-failover/m-p/5124350#M1113331</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-06-04T10:47:39Z</dc:date>
    </item>
  </channel>
</rss>

