<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic   in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946845#M144269</link>
    <description>&lt;P style="margin: 0px 0px 11px;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;My questions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Since I have only 1 port on each ASA use for the failover, what if that interface on the ASA or the switch port it's connected to or the cable goes faulty?&lt;FONT face="Calibri"&gt;&lt;SPAN style="color: #000080;"&gt;If you have an interface that’s being monitored by the primary and standby firewall and keep alives are being received on the monitored interface then failover will not occur even if the failover link fails. If your failover interface is up but monitored interface-s fail depending upon the failover interface policy failover will occur, by default it’s set to 1 which means only 1 interface has to fail for failover to take place. Inside interface is monitored by default (if you choose nameif inside) all other interfaces have to be set manually for monitoring.&lt;/SPAN&gt; &lt;/FONT&gt;&lt;/LI&gt;
&lt;OL style="list-style-type: lower-alpha;"&gt;
&lt;LI&gt;Both ASA become active as they lost communication to each other? Secondary doesn't receive hello from primary anymore and it thinks the primary is down, so it makes itself active? &lt;SPAN style="color: #000080;"&gt;Not if keep alives are received on monitored interfaces. If you have a situation where failover link fails due to a faulty cable or a layer 2 misconfiguration at the start up both firewalls may become active, but that's rare situation and you will need to fix the failover link to resolve the issue.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;What problem will it cause when both of the ASA become active? Traffics problem at all?&lt;SPAN style="color: #000080;"&gt;As Maltjones03 has pointed out that you will have routing issues.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;How should I avoid this problem (if any)? &amp;nbsp;I heard&amp;nbsp;about making port channel but not sure how this works and if I want to make that change, what should I expect for downtime and how should I proceed? &amp;nbsp;The ASA are in production, so, i want to make better plan (lay out pros and cons, plus plan for down time) if I introduce change to this configuration. &amp;nbsp;- &lt;SPAN style="color: #000080;"&gt;There is a redundant feature where you can have two interfaces bundled together and they work as active/standy, if the active interface goes down standby interface will take over and no port channel configuration is needed on the switch side and they will be configured as individual access ports on the switch side. Usually this is beneficial when you have&amp;nbsp;single firewall and you want redundancy at the interface level. But to my knowledge this doesn't apply to failover interface, I don't think this feature can be used to&amp;nbsp;configure redundant failover pair.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/OL&gt;</description>
    <pubDate>Sat, 10 Dec 2016 12:54:44 GMT</pubDate>
    <dc:creator>cofee</dc:creator>
    <dc:date>2016-12-10T12:54:44Z</dc:date>
    <item>
      <title>ASA5515-x: Failover Interface</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946843#M144259</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am using 2 ASA, standby and active. &amp;nbsp;They hook up to one switch. &amp;nbsp;Each ASA has a port connected to a port on the switch for failover purposes.&lt;/P&gt;
&lt;P&gt;These 2 ports on the switch has a separate/independent Vlan.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The management port on each ASA is connected to another switch with different vlan&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;My questions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Since I have only 1 port on each ASA use for the failover, what if that interface on the ASA or the switch port it's connected to or the cable goes faulty?&lt;/LI&gt;
&lt;OL style="list-style-type: lower-alpha;"&gt;
&lt;LI&gt;Both ASA become active as they lost communication to each other? Secondary doesn't receive hello from primary anymore and it thinks the primary is down, so it makes itself active?&lt;/LI&gt;
&lt;LI&gt;What problem will it cause when both of the ASA become active? Traffics problem at all?&lt;/LI&gt;
&lt;LI&gt;How should I avoid this problem (if any)? &amp;nbsp;I heard&amp;nbsp;about making port channel but not sure how this works and if I want to make that change, what should I expect for downtime and how should I proceed? &amp;nbsp;The ASA are in production, so, i want to make better plan (lay out pros and cons, plus plan for down time) if I introduce change to this configuration. &amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/OL&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946843#M144259</guid>
      <dc:creator>Ve Con</dc:creator>
      <dc:date>2019-03-12T08:38:53Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946844#M144266</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Depending on your agreed business SLA requirements, and budget, I would consider having a second switch for added resilience.&lt;/P&gt;
&lt;P&gt;I know Cisco recommend that a switch is used for the failover, and sync interface, but using a cross-over cable between the two ASA's, but this way each ASA is immediately aware of the state of its mate.&lt;/P&gt;
&lt;P&gt;If both firewalls go into active state, this would surely cause ARP issues as both firewalls would assume the active firewall MAC address and IP address.&lt;/P&gt;
&lt;P&gt;I would suggest either a stacked switch or independent switch solution.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA (1)&lt;/P&gt;
&lt;P&gt;Outside Int - ISP&lt;/P&gt;
&lt;P&gt;Inside Int - Switch 1&lt;/P&gt;
&lt;P&gt;DMZ Int - Switch 1&lt;/P&gt;
&lt;P&gt;Failover Int - ASA (2)&amp;nbsp;[Dedicated VLAN]&lt;/P&gt;
&lt;P&gt;Sync Int - ASA (2)&amp;nbsp;[Dedicated VLAN]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA (2)&lt;/P&gt;
&lt;P&gt;Outside Int - ISP&lt;/P&gt;
&lt;P&gt;Inside Int - Switch 2&lt;/P&gt;
&lt;P&gt;DMZ Int - Switch 2&lt;/P&gt;
&lt;P&gt;Failover Int - ASA (1) [Dedicated VLAN]&lt;/P&gt;
&lt;P&gt;Sync Int - ASA (1)&amp;nbsp;[Dedicated VLAN]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;*Consider configuring http replication, for stateful http failover during a failover instance.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2016 12:11:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946844#M144266</guid>
      <dc:creator>mattjones03</dc:creator>
      <dc:date>2016-12-10T12:11:11Z</dc:date>
    </item>
    <item>
      <title> </title>
      <link>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946845#M144269</link>
      <description>&lt;P style="margin: 0px 0px 11px;"&gt;&lt;FONT color="#000000" face="Calibri"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;My questions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Since I have only 1 port on each ASA use for the failover, what if that interface on the ASA or the switch port it's connected to or the cable goes faulty?&lt;FONT face="Calibri"&gt;&lt;SPAN style="color: #000080;"&gt;If you have an interface that’s being monitored by the primary and standby firewall and keep alives are being received on the monitored interface then failover will not occur even if the failover link fails. If your failover interface is up but monitored interface-s fail depending upon the failover interface policy failover will occur, by default it’s set to 1 which means only 1 interface has to fail for failover to take place. Inside interface is monitored by default (if you choose nameif inside) all other interfaces have to be set manually for monitoring.&lt;/SPAN&gt; &lt;/FONT&gt;&lt;/LI&gt;
&lt;OL style="list-style-type: lower-alpha;"&gt;
&lt;LI&gt;Both ASA become active as they lost communication to each other? Secondary doesn't receive hello from primary anymore and it thinks the primary is down, so it makes itself active? &lt;SPAN style="color: #000080;"&gt;Not if keep alives are received on monitored interfaces. If you have a situation where failover link fails due to a faulty cable or a layer 2 misconfiguration at the start up both firewalls may become active, but that's rare situation and you will need to fix the failover link to resolve the issue.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;What problem will it cause when both of the ASA become active? Traffics problem at all?&lt;SPAN style="color: #000080;"&gt;As Maltjones03 has pointed out that you will have routing issues.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;How should I avoid this problem (if any)? &amp;nbsp;I heard&amp;nbsp;about making port channel but not sure how this works and if I want to make that change, what should I expect for downtime and how should I proceed? &amp;nbsp;The ASA are in production, so, i want to make better plan (lay out pros and cons, plus plan for down time) if I introduce change to this configuration. &amp;nbsp;- &lt;SPAN style="color: #000080;"&gt;There is a redundant feature where you can have two interfaces bundled together and they work as active/standy, if the active interface goes down standby interface will take over and no port channel configuration is needed on the switch side and they will be configured as individual access ports on the switch side. Usually this is beneficial when you have&amp;nbsp;single firewall and you want redundancy at the interface level. But to my knowledge this doesn't apply to failover interface, I don't think this feature can be used to&amp;nbsp;configure redundant failover pair.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/OL&gt;</description>
      <pubDate>Sat, 10 Dec 2016 12:54:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946845#M144269</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-12-10T12:54:44Z</dc:date>
    </item>
    <item>
      <title>Thanks Cofee for a great</title>
      <link>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946846#M144273</link>
      <description>&lt;P&gt;Thanks Cofee for a great explanation. &amp;nbsp;And also thanks everyone for your inputs&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;Both ASA become active as they lost communication to each other? Secondary doesn't receive hello from primary anymore and it thinks the primary is down, so it makes itself active? &lt;SPAN style="color: #0000ff;"&gt;Not if keep alives are received on monitored interfaces. If you have a situation where failover link fails due to a faulty cable or a layer 2 misconfiguration at the start up both firewalls may become active, but that's rare situation and you will need to fix the failover link to resolve the issue&lt;/SPAN&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;What if the failover link fails due to a fault cable (or loose connection) NOT at the start up of both firewalls, but in middle of the night, then 30 mins later 1 of the monitored face is down, I assume the failover cannot happen at all, correct? I have failover policy set to 1. &amp;nbsp;What else will it try to do when such things happened and eventually what will the be the state of the ASA?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;What is the Management interface for? I know it's for the FirePOWER modules to communicate, not sure if anything else use this Management interface.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2017 19:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5515-x-failover-interface/m-p/2946846#M144273</guid>
      <dc:creator>Ve Con</dc:creator>
      <dc:date>2017-02-07T19:44:18Z</dc:date>
    </item>
  </channel>
</rss>

