<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Your latest attachment is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561914#M234320</link>
    <description>&lt;P&gt;Your latest attachment is pretty close to what I was thinking.&lt;/P&gt;&lt;P&gt;I would add a second interface on each ASA to the switches.&lt;/P&gt;&lt;P&gt;So (considering the "Inside" interfaces of ASA1 for example) it would have one physical interface&amp;nbsp;allocated to context 1 and connected to a port in VLAN2&amp;nbsp;and a second physical interface allocated to context 2 and connected to a port in VLAN 3.&lt;/P&gt;&lt;P&gt;An alternative would be to stick with a single physical interface and allocate subinterfaces (on a trunk) to each context.&lt;/P&gt;&lt;P&gt;You could further add redundancy by creating Etherchannels (with either the physical or logical interface approach).&lt;/P&gt;</description>
    <pubDate>Sun, 09 Nov 2014 14:53:17 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-11-09T14:53:17Z</dc:date>
    <item>
      <title>ASA active/active failover back to back</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561909#M234311</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for HA&amp;nbsp; I want to connect 4 ASA's in active/active failover with each ASA having two contexts.&lt;/P&gt;&lt;P&gt;The reason I need this is to separate two domains. Each domain has the ASA pair in active/active failover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this possible and what would you need to do it&amp;nbsp; ie a switch or two in between ?&lt;/P&gt;&lt;P&gt;I know you need switches or vlans to do the LAN side as the failover context needs to be in the same network. So I'm assuming you would need to do something similar between the 4 ASA's ???&lt;/P&gt;&lt;P&gt;Would you put 2 switches trunked together carrying two vlans, one for each context ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX1 |- &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ? &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX1 |-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX2 |- &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ? &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX2 |-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX1 |- &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ? &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX1 |-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -| CTX2 |- &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ? &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; -| CTX2 |-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:54:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561909#M234311</guid>
      <dc:creator>ksherwood</dc:creator>
      <dc:date>2019-03-26T00:54:06Z</dc:date>
    </item>
    <item>
      <title>Your diagram shows CTX1 and</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561910#M234313</link>
      <description>&lt;P&gt;Your diagram shows CTX1 and CTX2 on both pairs. Is that what you want?&lt;/P&gt;&lt;P&gt;Why wouldn't you have a single pair of ASAs with four contexts each? That would be closer to the secure multitenant data center reference architecture.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Nov 2014 14:51:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561910#M234313</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-08T14:51:38Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,                 </title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561911#M234315</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes, that would be much easier, but both pairs of ASA's are owned by separate parties who each want to control their firewalls and filtering, hence my comment about two different domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of us (domains) might have to give way as this design is turning out to be quite a challenge.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas ?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 04:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561911#M234315</guid>
      <dc:creator>ksherwood</dc:creator>
      <dc:date>2014-11-09T04:40:39Z</dc:date>
    </item>
    <item>
      <title>Well quite frankly if I were</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561912#M234316</link>
      <description>&lt;P&gt;Well quite frankly if I were the CIO of these warring parties I'd exercise some adult supervision and tell them to play nicely.&lt;/P&gt;&lt;P&gt;That aside, if you really really need to do this the you would just connect the failover ports between each pair back-to-back.&lt;/P&gt;&lt;P&gt;Put a pair of switches (or a stack) between the two pairs of ASAs for redundancy's sake. Each context has an interface dedicated facing the other domain's ASAs across that switch fabric.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 04:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561912#M234316</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-09T04:59:18Z</dc:date>
    </item>
    <item>
      <title>Do you mind drawing it up for</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561913#M234318</link>
      <description>&lt;P&gt;Do you mind drawing it up for me. I'm cautious that it's no good putting the same contexts onto the same switch as this would negate any failover possibility if that switch went down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've attached what I thought might work to cover any redundancies. Would this work ?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 08:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561913#M234318</guid>
      <dc:creator>ksherwood</dc:creator>
      <dc:date>2014-11-09T08:38:55Z</dc:date>
    </item>
    <item>
      <title>Your latest attachment is</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561914#M234320</link>
      <description>&lt;P&gt;Your latest attachment is pretty close to what I was thinking.&lt;/P&gt;&lt;P&gt;I would add a second interface on each ASA to the switches.&lt;/P&gt;&lt;P&gt;So (considering the "Inside" interfaces of ASA1 for example) it would have one physical interface&amp;nbsp;allocated to context 1 and connected to a port in VLAN2&amp;nbsp;and a second physical interface allocated to context 2 and connected to a port in VLAN 3.&lt;/P&gt;&lt;P&gt;An alternative would be to stick with a single physical interface and allocate subinterfaces (on a trunk) to each context.&lt;/P&gt;&lt;P&gt;You could further add redundancy by creating Etherchannels (with either the physical or logical interface approach).&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 14:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561914#M234320</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-09T14:53:17Z</dc:date>
    </item>
    <item>
      <title>Isn't that what i have done ?</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561915#M234322</link>
      <description>&lt;P&gt;Isn't that what i have done ?&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 23:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561915#M234322</guid>
      <dc:creator>ksherwood</dc:creator>
      <dc:date>2014-11-09T23:53:52Z</dc:date>
    </item>
    <item>
      <title>Your drawing only showed an</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561916#M234324</link>
      <description>&lt;P&gt;Your drawing only showed an inside interface from the left hand ASAs going to V2 for ASA1 and V3 for ASA2.&lt;/P&gt;&lt;P&gt;I was suggesting both ASA1 and 2 should have&amp;nbsp;connections to both V2 and V3&amp;nbsp;to account for the failover scenario. Likewise for ASA3 and ASA4.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2014 04:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561916#M234324</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-11-10T04:11:24Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin, Would you be able</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561917#M234326</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would you be able to assist me on this question:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/discussion/12316661/asa-5505-lan-no-internet-tcp-teardown-deny-connection-logs#comment-10062986&lt;/P&gt;&lt;P&gt;I desperately need help to get it sorted. Would really appreciate help&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2014 10:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561917#M234326</guid>
      <dc:creator>Ravi</dc:creator>
      <dc:date>2014-11-10T10:12:19Z</dc:date>
    </item>
    <item>
      <title>I'm not sure what you mean.</title>
      <link>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561918#M234328</link>
      <description>&lt;P&gt;I'm not sure what you mean. The facing ASA's are all on the outside. I'm also thinking the Trunk is not necessary.&lt;/P&gt;&lt;P&gt;Just to clarify, ASA1 would be active for context 1 and standby for context 2.&lt;/P&gt;&lt;P&gt;ASA2 would be active for context 2 and standby for context 1.&lt;/P&gt;&lt;P&gt;That's why the failover interfaces cross to continue the path. Does this sound right ?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Nov 2014 07:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-active-active-failover-back-to-back/m-p/2561918#M234328</guid>
      <dc:creator>ksherwood</dc:creator>
      <dc:date>2014-11-15T07:08:04Z</dc:date>
    </item>
  </channel>
</rss>

