<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HA firewall to single ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449247#M238286</link>
    <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;I have a client who is replacing a single firewall with dual HA firewalls (in different locations) connected by fibre.&lt;/P&gt;&lt;P&gt;The current connection is a single copper connection, using static routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Q:&amp;nbsp; Is there a way to utilise the single ASA5510 we have and connect to both these firewalls and maintain connectivity in the event of a failure of their primary firewall ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A picture is worth a 1,000 words. &amp;nbsp;Apologies for not including sooner.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:13:51 GMT</pubDate>
    <dc:creator>Reece Boucher</dc:creator>
    <dc:date>2019-03-12T04:13:51Z</dc:date>
    <item>
      <title>HA firewall to single ASA</title>
      <link>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449247#M238286</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;I have a client who is replacing a single firewall with dual HA firewalls (in different locations) connected by fibre.&lt;/P&gt;&lt;P&gt;The current connection is a single copper connection, using static routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Q:&amp;nbsp; Is there a way to utilise the single ASA5510 we have and connect to both these firewalls and maintain connectivity in the event of a failure of their primary firewall ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A picture is worth a 1,000 words. &amp;nbsp;Apologies for not including sooner.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449247#M238286</guid>
      <dc:creator>Reece Boucher</dc:creator>
      <dc:date>2019-03-12T04:13:51Z</dc:date>
    </item>
    <item>
      <title>Hi  Boucher ,</title>
      <link>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449248#M238290</link>
      <description>&lt;P&gt;Hi &amp;nbsp;Boucher ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Yes it possible to run HA between two ASA with help of fiber link , the main criteria is you need to have two separate fiber link (one of fail over interface &amp;amp; another for Data monitoring interface) &amp;nbsp;, similarly the network latency to reach other end via your fiber must be very least .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Failover link can be connected back to back directly /via switch to your asa failover interface , but for data interface you will have inside and outside interface which will be monitored for fail over status , for this connectivity you need have layer 2 switch at both end &amp;nbsp;, passing both your inside &amp;amp; outside vlan of your firewall . The fiber link between this layer 2 swtich , should be used a trunk link .&lt;/P&gt;
&lt;P&gt;Fiber link 1 - failover link&lt;/P&gt;
&lt;P&gt;Fiber Link 2 - Data link for outside &amp;amp; inside interface of firewall , must be configured as trunk &amp;nbsp;&lt;/P&gt;
&lt;P&gt;You have to tweak failover polltime to standby device using below commands&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/77809-pixfailover.html#prereq"&gt;http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/77809-pixfailover.html#prereq&lt;/A&gt;&lt;/P&gt;
&lt;H3 style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; line-height: normal;"&gt;&lt;A name="poll"&gt;Failover Polltime&lt;/A&gt;&lt;/H3&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;In order to specify the failover unit poll and hold times, use the&amp;nbsp;&lt;B&gt;failover polltime&lt;/B&gt;&amp;nbsp;command in global configuration mode.&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;The&amp;nbsp;&lt;TT&gt;failover polltime unit msec [time]&lt;/TT&gt;&amp;nbsp;represents the time interval in order to check the standby unit's existence by polling hello messages.&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;Similarly, the&amp;nbsp;&lt;TT&gt;failover holdtime unit msec [time]&lt;/TT&gt;&amp;nbsp;represents the setting a time period during which a unit must receive a hello message on the failover link, after which the peer unit is declared failed.&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;In order to specify the data interface poll and hold times in an Active/Standby failover configuration, use the&amp;nbsp;&lt;B&gt;failover polltime interface&lt;/B&gt;&amp;nbsp;command in global configuration mode. In order to restore the default poll and hold times, use the&amp;nbsp;&lt;B&gt;no&lt;/B&gt;&amp;nbsp;form of this command.&lt;/P&gt;
&lt;BLOCKQUOTE style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;
&lt;PRE style="font-size: 11px; overflow: auto; max-width: 650px; min-width: 400px; height: auto;"&gt;
&lt;B&gt;failover polltime interface [msec] &lt;SPAN style="font-weight: normal; font-style: italic;"&gt;time&lt;/SPAN&gt; [holdtime &lt;SPAN style="font-weight: normal; font-style: italic;"&gt;time&lt;/SPAN&gt;]&lt;/B&gt;
&lt;/PRE&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;Use the&amp;nbsp;&lt;B&gt;failover polltime interface&lt;/B&gt;&amp;nbsp;command in order to change the frequency at which hello packets are sent out on data interfaces. This command is available for Active/Standby failover only. For Active/Active failover, use the&amp;nbsp;&lt;B&gt;polltime interface&lt;/B&gt;command in the failover group configuration mode instead of the&amp;nbsp;&lt;B&gt;failover polltime interface&lt;/B&gt;&amp;nbsp;command.&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;You cannot enter a&amp;nbsp;&lt;B&gt;&lt;SPAN style="font-weight: normal; font-style: italic;"&gt;holdtime&lt;/SPAN&gt;&amp;nbsp;&lt;/B&gt;value that is less than 5 times the interface poll time. With a faster poll time, the security appliance can detect failure and trigger failover faster. However, faster detection can cause unnecessary switchovers when the network is temporarily congested. Interface testing begins when a hello packet is not heard on the interface for over half the hold time.&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;HTH&lt;/P&gt;
&lt;P style="color: rgb(0, 0, 0); font-family: arial, helvetica, sans-serif; font-size: 12px; line-height: normal;"&gt;&lt;BR /&gt;Sandy&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2014 04:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449248#M238290</guid>
      <dc:creator>SANTHOSHKUMAR SARAVANAN</dc:creator>
      <dc:date>2014-05-22T04:01:41Z</dc:date>
    </item>
    <item>
      <title>Not sure if I understood your</title>
      <link>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449249#M238294</link>
      <description>Not sure if I understood your question but from what I understood, both locations will have dual ASA FWs but there is only one link in between which is fiber. If that is the case then you will need to terminate your WAN link to an L2 switch in each location then your firewalls to that L2 switch as well so all firewalls have connectivity to the WAN.</description>
      <pubDate>Thu, 22 May 2014 05:44:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449249#M238294</guid>
      <dc:creator>jpl861</dc:creator>
      <dc:date>2014-05-22T05:44:40Z</dc:date>
    </item>
    <item>
      <title>John, The correct topology is</title>
      <link>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449250#M238298</link>
      <description>&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The correct topology is a single ASA 5510 (our f/w) to dual f/w's (unknown make) at the other end. &amp;nbsp;I am not sure there is a L2 switch at their end. &amp;nbsp;That would make life so much easier.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 May 2014 02:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449250#M238298</guid>
      <dc:creator>Reece Boucher</dc:creator>
      <dc:date>2014-05-23T02:13:26Z</dc:date>
    </item>
    <item>
      <title>Actually that is nto a big</title>
      <link>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449251#M238299</link>
      <description>Actually that is nto a big iasue if they have two firewalls. It would work on their end but there will be no redundancy if their secondary firewall does not have connectivity to the WAN.

We had that problem before as the ISP gave us a /30 WAN IP so we can only use one. I assigned the IP to the active firewall with no standby IP (this is for ASA anyway) but I terminated the link to an L2 switch into its own VLAN. So whenever I switch active roles between primary/secondary, the second firewall can communicate to the WAN. So not a big issue if you just have one on your side.</description>
      <pubDate>Fri, 23 May 2014 04:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ha-firewall-to-single-asa/m-p/2449251#M238299</guid>
      <dc:creator>jpl861</dc:creator>
      <dc:date>2014-05-23T04:38:15Z</dc:date>
    </item>
  </channel>
</rss>

