<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The standby address for the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550778#M234508</link>
    <description>&lt;P&gt;The standby address for the interface IP is not mandatory for the failover pair to be healthy, but it is required if the interface configuration is to be able to take over the virtual IP and MAC to function correctly.&lt;/P&gt;&lt;P&gt;If you have the same IP configured on both ASAs you will run into duplicate IP issues.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2014 09:14:54 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-10-02T09:14:54Z</dc:date>
    <item>
      <title>Firewall Failover without standby address</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550771#M234501</link>
      <description>&lt;P&gt;&lt;BR /&gt;Hello,&lt;/P&gt;&lt;P&gt;We have two ASA5525 in mode failover. Only one them has IP address configuration. For example:&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10px;"&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description outside&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 71.210.56.231 255.255.255.252&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description DMZ_Servicios&lt;BR /&gt;&amp;nbsp;nameif DMZ_Servicios&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;description DMZ_IPSEC&lt;BR /&gt;&amp;nbsp;nameif DMZ_IPSEC&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 10.110.61.225 255.255.255.240&amp;nbsp;&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10px;"&gt;ASA# sh running-config | i failover&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failoverlan GigabitEthernet0/7&lt;BR /&gt;failover key *****&lt;BR /&gt;failover link failoverlan GigabitEthernet0/7&lt;BR /&gt;failover interface ip failoverlan 1.1.1.1 255.255.255.252 standby 1.1.1.2&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 10px;"&gt;ASA# sh failover&amp;nbsp;&lt;BR /&gt;Failover On&amp;nbsp;&lt;BR /&gt;Failover unit Primary&lt;BR /&gt;Failover LAN Interface: failoverlan GigabitEthernet0/7 (up)&lt;BR /&gt;Unit Poll frequency 1 seconds, holdtime 15 seconds&lt;BR /&gt;Interface Poll frequency 5 seconds, holdtime 25 seconds&lt;BR /&gt;Interface Policy 1&lt;BR /&gt;Monitored Interfaces 3 of 216 maximum&lt;BR /&gt;Version: Ours 9.1(2), Mate 9.1(2)&lt;BR /&gt;Last Failover at: 08:10:17 UTC Sep 2 2014&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; This host: Primary - Active&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Active time: 2348911 (sec)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 0: ASA5525 hw/sw rev (1.0/9.1(2)) status (Up Sys)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface outside (71.210.56.231): Normal (Not-Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface DMZ_Servicios (192.168.1.1): Normal (Waiting)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface DMZ_IPSEC (10.110.61.225): Normal (Waiting)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface inside (10.115.70.18): Normal (Not-Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Other host: Secondary - Standby Ready&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Active time: 0 (sec)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; slot 0: ASA5525 hw/sw rev (1.0/9.1(2)) status (Up Sys)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface outside (0.0.0.0): Normal (Not-Monitored)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface DMZ_Servicios (0.0.0.0): Unknown (Waiting)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface DMZ_IPSEC (0.0.0.0): Unknown (Waiting)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Interface inside (0.0.0.0): Normal (Not-Monitored) &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If we put the secondary address in the interface, the failover works fine when we put in mode shutdown the interface (IPSEC or Servicio), but with this configuration, the secondary FW only works when the primary FW is down.&amp;nbsp;&lt;BR /&gt;Although we put in mode &amp;nbsp;monitor the interfaces (Servicios and IPSEC), the secondary FW doesn´t work if we put in mode shutdown the "Ipsec or Servicios" interface.&lt;BR /&gt;We want to know if this configuration works fine with Failover, or it is necesary (mandatory) put the secondary address in the interfaces.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550771#M234501</guid>
      <dc:creator>adiazcastro19</dc:creator>
      <dc:date>2019-03-12T04:50:12Z</dc:date>
    </item>
    <item>
      <title>By default all active</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550772#M234502</link>
      <description>&lt;P&gt;By default all active interfaces on both units will be monitored for health and making a determination of whether a unit is ready to assume active role. Only if you do not want a given interface to be included would you then use "no monitor-interface {if_name}" (&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa93/configuration/general/asa-general-cli/ha-failover.html#pgfId-1497125"&gt;Reference&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;If there is no standby address on a given interface, it can still be monitored for failover although you won't have quite the degree of assurance that is is really completely ready as the Active unit cannot affirmatively reach the standby IP address and instead relies on the Standby unit to tell it (via the failover link) that the interface is line up / protocol up. That's why you may see the status of "unknown (waiting)" on those interfaces on the Standby Ready unit.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 20:33:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550772#M234502</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-09-29T20:33:56Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin.I understand the</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550773#M234503</link>
      <description>&lt;P&gt;Hello Marvin.&lt;/P&gt;&lt;P&gt;I understand the state (waiting) of the interfaces. But with this configuration (without secondary address in no interface), when I unplug the cable (DMZ_Servicios interface) for example , and we have the failover link up/up, I understand that the failover process should work and the standby Firewall should convert in active.&lt;BR /&gt;But that process don't happened. My doubt is if the secondary address in the interfaces is necessary to work correctly. I don't find no documents in Cisco web , where explain that for the failover process work correctly is mandatory the secondary address in the interfaces.&lt;/P&gt;&lt;P&gt;Thanks for your time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 20:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550773#M234503</guid>
      <dc:creator>adiazcastro19</dc:creator>
      <dc:date>2014-09-30T20:11:19Z</dc:date>
    </item>
    <item>
      <title>We are running active/standby</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550774#M234504</link>
      <description>&lt;P&gt;We are running active/standby pairs in a few of our hospitals and have this same configuration where we are supporting regular IP traffic, IPSEC, and client VPN tunnels.&lt;/P&gt;&lt;P&gt;I would suggest putting an unused IP address on each of the standby interfaces and allowing the active firewall to monitor each interface for connectivity issues.&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this configuration I have failed over the firewalls during the day many times without dropping an ICMP ping or even a VPN connection.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 04:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550774#M234504</guid>
      <dc:creator>campbech1</dc:creator>
      <dc:date>2014-10-01T04:20:11Z</dc:date>
    </item>
    <item>
      <title>Ok then. I'll write the</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550775#M234505</link>
      <description>&lt;P&gt;Ok then. I'll write the secondary address in the interfaces, but one question more.&lt;/P&gt;&lt;P&gt;I understand that the mode (active/active in status Failover) that appear in the output of &amp;nbsp;"show version or show activation-key" commands, It isn't my problem.&lt;BR /&gt;I want to be sure before to configure the secondary address. Is there any command or procedure to change this mode?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA(config)# sh activation-key&amp;nbsp;&lt;BR /&gt;Serial Number: &amp;nbsp;xxxxxx&lt;BR /&gt;Running Permanent Activation Key: 0x9xxx 0xaxxx 0xxxxx 0xxxxx 0xxxxxx&amp;nbsp;&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 200 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;&lt;STRONG&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Active/Active &amp;nbsp;perpetual&lt;/STRONG&gt;&lt;BR /&gt;Encryption-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;....&lt;/P&gt;&lt;P&gt;This platform has an ASA5525 VPN Premium license.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Failover cluster licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 200 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;&lt;STRONG&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Active/Active &amp;nbsp;perpetual&lt;/STRONG&gt;&lt;BR /&gt;Encryption-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 18:44:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550775#M234505</guid>
      <dc:creator>adiazcastro19</dc:creator>
      <dc:date>2014-10-01T18:44:10Z</dc:date>
    </item>
    <item>
      <title>That is strictly the</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550776#M234506</link>
      <description>&lt;P&gt;That is strictly the licensing. You're configured for active/standby right now so adding the standby addresses won't harm anything.&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 18:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550776#M234506</guid>
      <dc:creator>campbech1</dc:creator>
      <dc:date>2014-10-01T18:47:01Z</dc:date>
    </item>
    <item>
      <title>Hi adiazcastro19, It is not</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550777#M234507</link>
      <description>&lt;P&gt;Hi&amp;nbsp;adiazcastro19,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is not mandatory that you have a secondary address for standby ASA, however it is required for management purpose only, such as OS upgrade and failover primary to standby and vice verse.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When it is failed-over to standby ASA, the IP addresses from primary ASA will be assigned to standby unit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that answers your question.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Oct 2014 18:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550777#M234507</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2014-10-01T18:53:34Z</dc:date>
    </item>
    <item>
      <title>The standby address for the</title>
      <link>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550778#M234508</link>
      <description>&lt;P&gt;The standby address for the interface IP is not mandatory for the failover pair to be healthy, but it is required if the interface configuration is to be able to take over the virtual IP and MAC to function correctly.&lt;/P&gt;&lt;P&gt;If you have the same IP configured on both ASAs you will run into duplicate IP issues.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 09:14:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-failover-without-standby-address/m-p/2550778#M234508</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-02T09:14:54Z</dc:date>
    </item>
  </channel>
</rss>

