<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Single ASA 5512-X directly connected to Active/Standy ASA 5512X  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288548#M344121</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The primary IP should always be your gateway, because this IP goes to standby with a failover. &lt;/P&gt;&lt;P&gt;Cabling is ok for this, because with a switch between them, you'll have a single point of failure again ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael &lt;BR /&gt; &lt;BR /&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 23 Aug 2013 08:52:15 GMT</pubDate>
    <dc:creator>Michael Muenz</dc:creator>
    <dc:date>2013-08-23T08:52:15Z</dc:date>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X pair</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288547#M344119</link>
      <description>&lt;P&gt;I was wondering if anyone could offer any advice or tips to how this proposed configuration would function. I planned on putting 2 interfaces on my single ASA 5512-X in an outside VLAN with the IP 192.168.1.1. One of these connections would run to the Active ASA and the other connection would run to the Standby ASA. I do not own the redundant ASAs but that network admin is working with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is, in the redundant ASA config one will be using the primary IP of 192.168.1.2 and the Standby will be using the 192.168.1.3. Will my single ASA have issues seeing both of these devices or should my static routes pointing to 192.168.1.2 as the next hop be sufficient in controlling the routing. I was concerned about my single device seeing 2 other devices and somehow getting confused on where to route the data, I wouldn't want data to be routed to the standby interface as that will be in standby mode and I'm assuming drop the traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this method a good design? Instead of putting 2 ports on my single ASA in the outside VLAN should I instead just use a switch to connect the 2 links coming from the redundant ASAs and then just run 1 link from the switch to my single ASA? I'd appreciate any advice!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/3/2/152238-Firewalls.jpg" alt="Firewalls.jpg" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:29:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288547#M344119</guid>
      <dc:creator>Mark Mattix</dc:creator>
      <dc:date>2019-03-12T02:29:42Z</dc:date>
    </item>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288548#M344121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The primary IP should always be your gateway, because this IP goes to standby with a failover. &lt;/P&gt;&lt;P&gt;Cabling is ok for this, because with a switch between them, you'll have a single point of failure again ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael &lt;BR /&gt; &lt;BR /&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 08:52:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288548#M344121</guid>
      <dc:creator>Michael Muenz</dc:creator>
      <dc:date>2013-08-23T08:52:15Z</dc:date>
    </item>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288549#M344122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply Michael but I have another question. I'm trying to configure this and I cannot issue the int vlan command. I have read elsewhere that you have to use subinterfaces with a trunk link but I am not trunking these ports anywhere. I just want ot create an outside vlan in order to associate 2 ports with the outside vlan. Is this possible?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 20:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288549#M344122</guid>
      <dc:creator>Mark Mattix</dc:creator>
      <dc:date>2013-08-23T20:11:52Z</dc:date>
    </item>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288550#M344126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, only the 5505 supports VLAN's because the ports on the 55XX are routed ports, not swichports.&lt;/P&gt;&lt;P&gt;Cheapest solution would be to put a switch beween them. Sorry!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael &lt;BR /&gt; &lt;BR /&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Aug 2013 07:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288550#M344126</guid>
      <dc:creator>Michael Muenz</dc:creator>
      <dc:date>2013-08-26T07:16:22Z</dc:date>
    </item>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288551#M344129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Michael, I was thinking about using a switch in front of them but thought there would be a better way or doing it. I appreciate your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 12:34:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288551#M344129</guid>
      <dc:creator>Mark Mattix</dc:creator>
      <dc:date>2013-08-27T12:34:02Z</dc:date>
    </item>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288552#M344131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have another question, if I have 20+ different subnets behind firewall 192.168.1.1 should I be using PAT to go to the other network? Also if I have a server on one of my networks that the redundant firewall side needs to reach should I do a static NAT? Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Aug 2013 16:21:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288552#M344131</guid>
      <dc:creator>Mark Mattix</dc:creator>
      <dc:date>2013-08-27T16:21:30Z</dc:date>
    </item>
    <item>
      <title>Single ASA 5512-X directly connected to Active/Standy ASA 5512X</title>
      <link>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288553#M344136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You mean traffic between these networks or traffic going to outside? If outside I'd say yes, because you don't have full control over the other firewall pair.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have an inside server I'd expand the network 192.168.1.0/29 to 28 or 27 and add a NAT IP to the firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael &lt;BR /&gt; &lt;BR /&gt;Please rate all helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Aug 2013 09:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-asa-5512-x-directly-connected-to-active-standy-asa-5512x/m-p/2288553#M344136</guid>
      <dc:creator>Michael Muenz</dc:creator>
      <dc:date>2013-08-28T09:27:37Z</dc:date>
    </item>
  </channel>
</rss>

