<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Setting up failover on two ASA 5525-X firewalls in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547010#M235407</link>
    <description>&lt;P&gt;I inherited two 5525-X firewalls. The one has a VPN Premium License, while the other I can only get to boot into ROMMON mode. There also does not appear to be any flash drive on which I can save the config, so I am guessing the two were bought to be in active/standby mode. I can make all the changes to the first, but can save nothing to the 2nd.&lt;/P&gt;&lt;P&gt;I ahve looked around for some docs on setting up failover on the cisco site and the Internet, but am coming up short. Any suggestions?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Here's the current config for the primary ASA. Again, the 2nd has not flash nor can I save any configs to it.&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 200 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Active/Active &amp;nbsp;perpetual&lt;BR /&gt;Encryption-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Encryption-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Security Contexts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;GTP/GPRS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 750 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 750 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;IPS Module &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Cluster &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5525 VPN Premium license.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:39:30 GMT</pubDate>
    <dc:creator>kerryjcox</dc:creator>
    <dc:date>2019-03-12T04:39:30Z</dc:date>
    <item>
      <title>Setting up failover on two ASA 5525-X firewalls</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547010#M235407</link>
      <description>&lt;P&gt;I inherited two 5525-X firewalls. The one has a VPN Premium License, while the other I can only get to boot into ROMMON mode. There also does not appear to be any flash drive on which I can save the config, so I am guessing the two were bought to be in active/standby mode. I can make all the changes to the first, but can save nothing to the 2nd.&lt;/P&gt;&lt;P&gt;I ahve looked around for some docs on setting up failover on the cisco site and the Internet, but am coming up short. Any suggestions?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Here's the current config for the primary ASA. Again, the 2nd has not flash nor can I save any configs to it.&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 200 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Unlimited &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Active/Active &amp;nbsp;perpetual&lt;BR /&gt;Encryption-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Encryption-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Security Contexts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;GTP/GPRS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect Premium Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Other VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 750 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 750 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;AnyConnect for Cisco VPN Phone &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : 2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Intercompany Media Engine &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;IPS Module &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;BR /&gt;Cluster &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled &amp;nbsp; &amp;nbsp; &amp;nbsp; perpetual&lt;/P&gt;&lt;P&gt;This platform has an ASA5525 VPN Premium license.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547010#M235407</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2019-03-12T04:39:30Z</dc:date>
    </item>
    <item>
      <title>In the first place what you</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547011#M235409</link>
      <description>&lt;P&gt;In the first place what you have given us in this post is the show version and not the config of the ASA5525X.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the second place there is no point in talking about failover until you have solved the issue of the other ASA booting into ROMMON. If the ASA is operating in ROMMON then it is not surprising that you can not save the config. You tell us that the ASA boots into ROMMON but have not told us whether you have been able to get the ASA out of ROMMON and into operating mode. If so what did you do to get it into operating mode? In any case we should determine what causes the ASA to boot into ROMMON. Probably a good place to start would be for you to connect to the console of that ASA, power it up, and capture and post all of the output generated during the boot process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547011#M235409</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2014-08-20T14:26:25Z</dc:date>
    </item>
    <item>
      <title>Point taken.Am attaching a</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547012#M235410</link>
      <description>&lt;P&gt;Point taken.&lt;/P&gt;&lt;P&gt;Am attaching a copy of the primary ASA 5525. I was able to successfully configure the failover portion as you can see, and it is no wonder indeed why they are not communicating.&lt;/P&gt;&lt;P&gt;However, I am able to partially configure the failover ASA 5525, but the config will not write nor will it communicate due to space issues. I am certain I am simply missing a couple items here.&lt;/P&gt;&lt;P&gt;See below:&lt;/P&gt;&lt;P&gt;Firewall Mode [Routed]:&amp;nbsp;&lt;BR /&gt;Enable password [&amp;lt;use current password&amp;gt;]:&amp;nbsp;&lt;BR /&gt;Allow password recovery [yes]?&amp;nbsp;&lt;BR /&gt;Clock (UTC):&lt;BR /&gt;&amp;nbsp; Year [2014]:&amp;nbsp;&lt;BR /&gt;&amp;nbsp; Month [Aug]:&amp;nbsp;&lt;BR /&gt;&amp;nbsp; Day [20]:&amp;nbsp;&lt;BR /&gt;&amp;nbsp; Time [14:38:02]:&amp;nbsp;&lt;BR /&gt;Management IP address: 10.10.0.100&lt;BR /&gt;Management network mask: 255.255.240.0&lt;BR /&gt;Host name: slcvw-failover&lt;BR /&gt;Domain name: wjbradley.local&lt;BR /&gt;IP address of host running Device Manager: 172.31.255.2&lt;/P&gt;&lt;P&gt;The following configuration will be used:&lt;BR /&gt;Enable password: &amp;lt;current password&amp;gt;&lt;BR /&gt;Allow password recovery: yes&lt;BR /&gt;Clock (UTC): 14:38:02 Aug 20 2014&lt;BR /&gt;Firewall Mode: Routed&lt;BR /&gt;Management IP address: 10.10.0.100&lt;BR /&gt;Management network mask: 255.255.240.0&lt;BR /&gt;Host name: slcvw-failover&lt;BR /&gt;Domain name: wjbradley.local&lt;BR /&gt;IP address of host running Device Manager: 172.31.255.2&lt;/P&gt;&lt;P&gt;Use this configuration and save to flash? [yes]&lt;BR /&gt;INFO: Security level for "management" set to 0 by default.&lt;BR /&gt;Cryptochecksum: a4e92204 5ed2bcc2 d45c4a79 0193b7bf&amp;nbsp;&lt;/P&gt;&lt;P&gt;%Error copying system:/running-config (Not enough space on device)&lt;BR /&gt;Error executing command&lt;BR /&gt;Error writing to flash&lt;BR /&gt;Pre-configure Firewall now through interactive prompts [yes]?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 14:54:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547012#M235410</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-08-20T14:54:56Z</dc:date>
    </item>
    <item>
      <title>Thanks for the additional</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547013#M235411</link>
      <description>&lt;P&gt;Thanks for the additional information. Am I correct in understanding that the output in your second post was generated from your second ASA after you got it out of ROMMON? What did you need to do to get it out of ROMMON?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you get it out of ROMMON and do not accept the option for the initial configuration dialogue what do you get? Are you able to do show version? do show flash?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In reading through the original post I am focusing on your statement that the second ASA does not have a flash drive. When you compare the two ASA5525X are you saying that both have a slot for a flash drive but that only the first ASA has a drive in the slot? That would be a problem. Both ASA should have a flash drive regardless of whether they are intended as a failover pair or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 15:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547013#M235411</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2014-08-20T15:12:25Z</dc:date>
    </item>
    <item>
      <title>You are correct. That output</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547014#M235412</link>
      <description>&lt;P&gt;You&amp;nbsp;are correct. That output is what happens when I manually set IP address, gateway, etc. and then upload my standard asa913-smp-k8.bin file. It comes up with those settings that I enter:&lt;/P&gt;&lt;P&gt;rommon #1&amp;gt; ADDRESS=10.10.0.100&lt;BR /&gt;rommon #2&amp;gt; SERVER=10.10.5.150&lt;BR /&gt;rommon #3&amp;gt; GATEWAY=10.10.0.1&lt;BR /&gt;rommon #4&amp;gt; IMAGE=asa913-smp-k8.bin&lt;BR /&gt;rommon #5&amp;gt; PORT=Management0/0&lt;BR /&gt;rommon #6&amp;gt; tftp&lt;/P&gt;&lt;P&gt;!!!!!!!&lt;/P&gt;&lt;P&gt;Pre-configure Firewall now through interactive prompts [yes]?&amp;nbsp;&lt;BR /&gt;Firewall Mode [Routed]:&amp;nbsp;&lt;BR /&gt;Enable password [&amp;lt;use current password&amp;gt;]:&amp;nbsp;&lt;BR /&gt;Allow password recovery [yes]?&amp;nbsp;&lt;/P&gt;&lt;P&gt;ad nauseum....&lt;/P&gt;&lt;P&gt;--------&lt;/P&gt;&lt;P&gt;If I choose not to go through the setup, I am able to bring up a prompt and get into enable mode, but not config is available.&lt;/P&gt;&lt;P&gt;Pre-configure Firewall now through interactive prompts [yes]? no&lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands.&lt;BR /&gt;slcvw-failover&amp;gt; en&lt;BR /&gt;Password:&amp;nbsp;&lt;BR /&gt;slcvw-failover#&amp;nbsp;&lt;BR /&gt;slcvw-failover# sho conf&lt;BR /&gt;No Configuration&lt;BR /&gt;slcvw-failover#&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, this does look promising. Let me work on this a bit more and see if I can get it to talk to the primary asa. I'll have to set the failover IP addresses again. I can at least see now that I can see the interfaces when I do a "sho int". And I can now make config changes. Let me see if failover works.&lt;/P&gt;&lt;P&gt;I'll get back to you shortly if I find a solution.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 15:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547014#M235412</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-08-20T15:52:33Z</dc:date>
    </item>
    <item>
      <title>Found this:http://www.cisco</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547015#M235413</link>
      <description>&lt;P&gt;Found this:&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/ha_active_standby.html&lt;/P&gt;&lt;P&gt;Looks to be about what i was looking for. Will try again to set up failover.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 17:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547015#M235413</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-08-20T17:16:14Z</dc:date>
    </item>
    <item>
      <title>Turns out the memory had come</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547016#M235414</link>
      <description>&lt;P&gt;Turns out the memory had come loose during shipping. Once I re-attached underneath the I/O module, everything is working.&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2014 21:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547016#M235414</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-08-20T21:09:04Z</dc:date>
    </item>
    <item>
      <title>I am glad that you have</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547017#M235415</link>
      <description>&lt;P&gt;I am glad that you have resolved the issue and that my suggestons were helpful. Thank you for posting back to the forum to indicate that you had resoved the problem and how you resolved it. That is helpful information. And thank you for using the rating system to mark this question as answered. This will indicate to other readers of the forum that helpful information is in this thread.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 01:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-failover-on-two-asa-5525-x-firewalls/m-p/2547017#M235415</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2014-08-21T01:21:37Z</dc:date>
    </item>
  </channel>
</rss>

