<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Outside Interface FAILOVER in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697723#M14473</link>
    <description>&lt;P&gt;I have tried configuring this on my ASA, sadly same outcome.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Aug 2018 09:34:28 GMT</pubDate>
    <dc:creator>KyleHB</dc:creator>
    <dc:date>2018-08-30T09:34:28Z</dc:date>
    <item>
      <title>Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697643#M14468</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like your help regarding my simple topology. Here it is below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa1.PNG" style="width: 965px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/17780iB39F41B4F81FEB34/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa1.PNG" alt="asa1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was trying out my failover by shutting down interfaces and seeing if an automatic failover occurs. All is working but one. When I shut down the Gi0/24 of the L3 switch and the Gi0/1 of the Primary/Active ASA going to the ISP, I am no longer able to access the Internet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa2.PNG" style="width: 570px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/17782iDF2E7343800AA87E/image-dimensions/570x472?v=v2" width="570" height="472" role="button" title="asa2.PNG" alt="asa2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My goal is that when I shut these interfaces, the OUTSIDE interface of the STANDBY ASA should take over, knowing that the OUTSIDE interface of the PRIMARY/ACTIVE&amp;nbsp;ASA is no longer reachable. However, I am unable to achieve this task as all the traffic is still being sent to the PRIMARY/ACTIVE ASA and is still routing the traffic to its own outside interface, even though it is down.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is my configuration below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 1.1.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;channel-group 1 mode on&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;description STATE Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Port-channel1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 100.100.100.1 255.255.255.0 standby 100.100.100.2&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;access-list inside-in extended permit ip any any&lt;BR /&gt;access-list outside-in extended permit ip any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface FAILOVER GigabitEthernet0/2&lt;BR /&gt;failover key *****&lt;BR /&gt;failover link STATE GigabitEthernet0/3&lt;BR /&gt;failover interface ip FAILOVER 10.10.10.1 255.255.255.0 standby 10.10.10.2&lt;BR /&gt;failover interface ip STATE 20.20.20.1 255.255.255.0 standby 20.20.20.2&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;sla monitor 10&lt;BR /&gt;type echo protocol ipIcmpEcho 8.8.8.8 interface outside&lt;BR /&gt;num-packets 3&lt;BR /&gt;request-data-size 1392&lt;BR /&gt;timeout 1000&lt;BR /&gt;frequency 3&lt;BR /&gt;sla monitor schedule 10 life forever start-time now&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;!&lt;BR /&gt;track 1 rtr 10 reachability&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname priority state&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance for those who can help me!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kyle&lt;/P&gt;
&lt;P&gt;Jr. Network Engr.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697643#M14468</guid>
      <dc:creator>KyleHB</dc:creator>
      <dc:date>2020-02-21T16:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697691#M14469</link>
      <description>Hi,&lt;BR /&gt;You don't appear to have a standby IP address defined on your OUTSIDE interface. E.g.&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 1.1.1.1 255.255.255.0 stanndy 1.1.1.3&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 30 Aug 2018 08:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697691#M14469</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-08-30T08:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697696#M14470</link>
      <description>Hi Kyle,
Few network designs or businesses cater for a double network failure and that's what this situation is
The way the ASA works is that there is an active firewall and a standby firewall
All traffic passes through the active firewall and the standby firewall monitors it to see if it should take over
If something goes wrong with the active ASA i.e. a hardware failure, a link failure, etc. the standby ASA takes over and becomes the active firewall
What won't happen is what you're expecting i.e. traffic to enter one ASA and exit a different ASA
These are not like active/active firewalls so traffic can't enter one ASA and exit another</description>
      <pubDate>Thu, 30 Aug 2018 09:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697696#M14470</guid>
      <dc:creator>dmckone</dc:creator>
      <dc:date>2018-08-30T09:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697706#M14471</link>
      <description>Put this command to failover when outside is dead.&lt;BR /&gt;&lt;BR /&gt;monitor-interface outside&lt;BR /&gt;</description>
      <pubDate>Thu, 30 Aug 2018 09:18:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697706#M14471</guid>
      <dc:creator>Mohammed al Baqari</dc:creator>
      <dc:date>2018-08-30T09:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697722#M14472</link>
      <description>&lt;P&gt;Thanks for your reply. So to solve this issue, I would need to configure Active/Active Instead?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 09:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697722#M14472</guid>
      <dc:creator>KyleHB</dc:creator>
      <dc:date>2018-08-30T09:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697723#M14473</link>
      <description>&lt;P&gt;I have tried configuring this on my ASA, sadly same outcome.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 09:34:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697723#M14473</guid>
      <dc:creator>KyleHB</dc:creator>
      <dc:date>2018-08-30T09:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Outside Interface FAILOVER</title>
      <link>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697882#M14535</link>
      <description>No because you can't have data come in one ASA and then exit out another
As far as I'm aware, even vendor firewalls that provide fully active/active solutions don't allow you to do that. They allow traffic to come into the left firewall for instance and exit the same firewall but the return traffic can come into the right firewall and exit the right firewall
The ASA offers only a pseudo active/active solution which is best for multi-tenancy for instance with say the left firewall active for odd numbered customers and the right active for even numbered customers
Although there is a connection between the two ASAs this is just for communication and monitoring. It doesn't pass user data
What you're dealing with here is a double network failure and you have several single points of failure that need to be addressed in the design
What you want to do is to give the ASA redundant links by bundling them together and ideally connecting them to different switches
E.g. Cisco's stackwise technology allows you to join two physical switches together into one logical switch
You can then connect each ASA to both switches and use LACP to bundle the interfaces into a single logical interface. This gives you redundancy in the interfaces and the switches
And you do that for both the inside and outside zones, but that means you'll need 4 physical switches
Alternatively, you could connect two interfaces from the left firewall to the left switch and bundle them together. You connect two interfaces from the right firewall to the right switch and bundle them together. Then you connect the two switches together using multiple links and LACP but again you'll need 4 switches in total
I would never advise using the same pair of switches for the inside and outside connections to save money. You really want physical separacy and some ISO certifications will insist on it because the potential exists for someone to logically introduce a backdoor
If you design the network in that way, the chances of a double network failure are pretty slim but you can't rule it out
Just remember to connect the two ISP links to the different outside switches as well. You shouldn't connect them directly to the firewalls because you'd have an increased risk of failure e.g. the left ASA going down when the right ISP circuit is already down</description>
      <pubDate>Thu, 30 Aug 2018 13:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-interface-failover/m-p/3697882#M14535</guid>
      <dc:creator>dmckone</dc:creator>
      <dc:date>2018-08-30T13:07:42Z</dc:date>
    </item>
  </channel>
</rss>

