<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You could use separate 4948 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559544#M206138</link>
    <description>&lt;P&gt;You could use separate 4948 switches in the one side if you setup the cluster in individual interface mode. However the Cisco recommendation is to use spanned Etherchannel which is only possible when the switches are in a stack, VSS or VPC configuration - all&amp;nbsp;things the 4948 cannot do.&lt;/P&gt;&lt;P&gt;Active/Active term is generally used to refer to an HA mode that is only available in multiple context ASA configurations. The overall pair is active/active but a given context is always active/standby.&lt;/P&gt;&lt;P&gt;You might find the Cisco live presentation &lt;A href="https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=78721&amp;amp;backBtn=true"&gt;BRKSEC-3032&lt;/A&gt; useful. Also listen to the TAC Security podcasts on ASA clustering.&lt;/P&gt;</description>
    <pubDate>Mon, 01 Dec 2014 14:50:35 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-12-01T14:50:35Z</dc:date>
    <item>
      <title>ASA clustering</title>
      <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559540#M206134</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;Can anyone explain is this list of switches are complete? For example&amp;nbsp;4500x or Nexus 3064 can do same(VSS/vPC),&amp;nbsp;I think, but they are not listed.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/ha-cluster.html" target="_blank"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/ha-cluster.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;Table 7-2 External Hardware and Software Support for ASA Clustering&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559540#M206134</guid>
      <dc:creator>Andrej Zverev</dc:creator>
      <dc:date>2019-03-12T04:54:46Z</dc:date>
    </item>
    <item>
      <title>The ones listed are the ones</title>
      <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559541#M206135</link>
      <description>&lt;P&gt;The ones listed are the ones Cisco has tested and verified compatible. Other models may work fine but haven't necessarily been tested.&lt;/P&gt;&lt;P&gt;The Etherchannel / LACP mechanisms are pretty sensitive though for interoperability with an ASA cluster so proceed carefully when going outside the recommended switch types. I'd say especially so when working with a VSS- or VPC-enable downstream set of of switches.&lt;/P&gt;&lt;P&gt;You can always open a proactive TAC case to ask them to validate your configuration and check their internal knowledge base for possible concerns.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Oct 2014 14:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559541#M206135</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-10-12T14:21:06Z</dc:date>
    </item>
    <item>
      <title>Thank you! Will try asks</title>
      <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559542#M206136</link>
      <description>&lt;P&gt;Thank you! Will try asks details from TAC&lt;/P&gt;</description>
      <pubDate>Sun, 12 Oct 2014 15:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559542#M206136</guid>
      <dc:creator>Andrej Zverev</dc:creator>
      <dc:date>2014-10-12T15:02:44Z</dc:date>
    </item>
    <item>
      <title>Hi MArvin ,  Can in configure</title>
      <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559543#M206137</link>
      <description>&lt;P&gt;Hi Marvin ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can in configure cluster on ASA , if i have two 4948 on separate ASA ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;4948 will in inside interfaces.&lt;/P&gt;&lt;P&gt;Topology is &amp;nbsp;in picture .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any link where i can see difference between ASA cluster , and ASA Active/Active mode .&lt;/P&gt;&lt;P&gt;Regarding data flow , capacity etc&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I asume that Active/Active is capable only with two ASA , and ASA Cluster is capable up to 8 ASA .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;KR&lt;/P&gt;</description>
      <pubDate>Mon, 01 Dec 2014 11:35:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559543#M206137</guid>
      <dc:creator>startx001</dc:creator>
      <dc:date>2014-12-01T11:35:21Z</dc:date>
    </item>
    <item>
      <title>You could use separate 4948</title>
      <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559544#M206138</link>
      <description>&lt;P&gt;You could use separate 4948 switches in the one side if you setup the cluster in individual interface mode. However the Cisco recommendation is to use spanned Etherchannel which is only possible when the switches are in a stack, VSS or VPC configuration - all&amp;nbsp;things the 4948 cannot do.&lt;/P&gt;&lt;P&gt;Active/Active term is generally used to refer to an HA mode that is only available in multiple context ASA configurations. The overall pair is active/active but a given context is always active/standby.&lt;/P&gt;&lt;P&gt;You might find the Cisco live presentation &lt;A href="https://www.ciscolive.com/online/connect/sessionDetail.ww?SESSION_ID=78721&amp;amp;backBtn=true"&gt;BRKSEC-3032&lt;/A&gt; useful. Also listen to the TAC Security podcasts on ASA clustering.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Dec 2014 14:50:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559544#M206138</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-12-01T14:50:35Z</dc:date>
    </item>
    <item>
      <title>Ok, I'm sharing some</title>
      <link>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559545#M206139</link>
      <description>&lt;P&gt;Ok, I'm sharing some information after talking with cisco's guys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use any switch, but switches from list are confirmed what they are doing proper traffic distribution, like if you have pair of ASA in cluster in this case a good switch can do almost 50/50 traffic distribution and bad switch can do 70/30 and in this case some of your ASA's can be overloaded.&lt;/P&gt;&lt;P&gt;That's all &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2015 14:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-clustering/m-p/2559545#M206139</guid>
      <dc:creator>Andrej Zverev</dc:creator>
      <dc:date>2015-02-03T14:44:34Z</dc:date>
    </item>
  </channel>
</rss>

