<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You can share interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619388#M195180</link>
    <description>&lt;P&gt;You can share interfaces between contexts. You will probably have to hard code the mac addresses for shared interfaces in each context.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also with active/active &amp;nbsp;failover you can only have a context (A) active on 1 firewall......... not both&lt;/P&gt;</description>
    <pubDate>Tue, 14 Apr 2015 19:54:50 GMT</pubDate>
    <dc:creator>Andre Neethling</dc:creator>
    <dc:date>2015-04-14T19:54:50Z</dc:date>
    <item>
      <title>ASA and Asa context mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619384#M195176</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we are planning to upgrade our firewalls in DC. We have planned to remove few of them aswell.&lt;/P&gt;&lt;P&gt;so totally 6 firewalls are getting migrated to&amp;nbsp;&amp;nbsp;2 firewalls.our Design team&amp;nbsp;planned&amp;nbsp;to have&amp;nbsp;asa's multi context mode, so that we can divide the traffic and use 1 context for VPN(remote and site2site)&amp;nbsp;alone. But i told them in context mode Remote access will not work. Now they are planning to change the design. My suggestion is to design in single mode.I have few questions related to that new design.&lt;/P&gt;&lt;P&gt;1. I want to know what are the uses and limitations of multi context in a single origination/network. I know its much usefull for service providers. Here we are one company and we manage all networks.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;As i said we have 6 firewalls, 2 of them are used only for web traffic. they will not talk to any other network, only web traffic. So can we create security levels,ACL's and&amp;nbsp;&amp;nbsp;make web traffic alone to get separate from my normal traffic in single mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please suggest, I will come out with more questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Satya.M&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619384#M195176</guid>
      <dc:creator>satya mothukuri</dc:creator>
      <dc:date>2019-03-12T05:45:14Z</dc:date>
    </item>
    <item>
      <title>Yes multiple context mode</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619385#M195177</link>
      <description>&lt;P&gt;You're right, &amp;nbsp;multiple context mode does not support remote access VPNs although it does support L2L VPNs.&lt;/P&gt;&lt;P&gt;1) I have used contexts in a DC environment (not service provider) for different business units.&lt;/P&gt;&lt;P&gt;So for example we had a large Oracle platform that was critical to the business and they had their own context which isolated them from any configuration errors made in other contexts.&lt;/P&gt;&lt;P&gt;And you can control access per context which meant less experienced people&amp;nbsp;didn't get full access to some of the more important contexts.&lt;/P&gt;&lt;P&gt;Other uses may be if you want to delegate control of certain contexts to different administrative people which can be useful in a large organisation.&lt;/P&gt;&lt;P&gt;Really depends on what you need to do.&lt;/P&gt;&lt;P&gt;2) Yes you can use specific interfaces for your web traffic and control who or what can access the servers.&lt;/P&gt;&lt;P&gt;You don't need contexts to control traffic in that way, you simply configure the appropriate security levels and acls to only allow the traffic you want.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2015 21:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619385#M195177</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-04-09T21:09:40Z</dc:date>
    </item>
    <item>
      <title>Tnx Jon,many cases i saw</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619386#M195178</link>
      <description>&lt;P&gt;Tnx&amp;nbsp;Jon,&lt;/P&gt;&lt;P&gt;many cases i saw which leads to easy administration and split FW&amp;nbsp;to diff diff companies.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for traffic separation, i didnt get any. I also want to know&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;if we need to use interface sharing bw context, is there any limitations.&lt;/LI&gt;&lt;LI&gt;If we plan active active on two hardware, i mean Context A is active on Firewall 1 and Context A active in firewall 2.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Any paln that Cisco come up with remote access VPN in next release.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Satya.M&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2015 09:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619386#M195178</guid>
      <dc:creator>satya mothukuri</dc:creator>
      <dc:date>2015-04-10T09:43:04Z</dc:date>
    </item>
    <item>
      <title>Any Info much appreciated   :</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619387#M195179</link>
      <description>&lt;P&gt;Any Info much appreciated &amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2015 10:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619387#M195179</guid>
      <dc:creator>satya mothukuri</dc:creator>
      <dc:date>2015-04-14T10:22:17Z</dc:date>
    </item>
    <item>
      <title>You can share interfaces</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619388#M195180</link>
      <description>&lt;P&gt;You can share interfaces between contexts. You will probably have to hard code the mac addresses for shared interfaces in each context.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also with active/active &amp;nbsp;failover you can only have a context (A) active on 1 firewall......... not both&lt;/P&gt;</description>
      <pubDate>Tue, 14 Apr 2015 19:54:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-asa-context-mode/m-p/2619388#M195180</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-04-14T19:54:50Z</dc:date>
    </item>
  </channel>
</rss>

