<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic confguring ASA with multiple security context and Active/Active in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203620#M361761</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Oh, I see.&amp;nbsp; It's a single 10 gig fiber from each ASA in the pair to a 6509-E in a pair for internal and another single 10 gig to a pair of 3560 switches for outside.&amp;nbsp; The 6509-Es are configured in non-VSS mode.&amp;nbsp; Likely each context will only need 1 interface but I'm still in the middle of figuring out the best way to handle the default route to these two contexts from the 6509s.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Feb 2013 19:46:36 GMT</pubDate>
    <dc:creator>DannyHuston</dc:creator>
    <dc:date>2013-02-20T19:46:36Z</dc:date>
    <item>
      <title>confguring ASA with multiple security context and Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203616#M361757</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a guide someone can point me to help configure a pair of ASA to be active/active failover and have multiple security contexts for different environment?&amp;nbsp; What I want to do is make a logical firewall for Production and another logical firewall for Development networks so I don't have to purchase 2 pairs of firewalls for these.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203616#M361757</guid>
      <dc:creator>DannyHuston</dc:creator>
      <dc:date>2019-03-12T01:02:46Z</dc:date>
    </item>
    <item>
      <title>confguring ASA with multiple security context and Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203617#M361758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to ASA software 8.4 configuration guide and section of Active/Active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ha_active_active.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/ha_active_active.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres another older document for configuring Active/Active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080834058.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080834058.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What ASAs do you have and what software level are they on?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Feb 2013 21:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203617#M361758</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-19T21:10:46Z</dc:date>
    </item>
    <item>
      <title>confguring ASA with multiple security context and Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203618#M361759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks.&amp;nbsp; I have a pair of 5585-X running 9.1 code.&amp;nbsp; So maybe I'm confusing myself.&amp;nbsp; When you do active/active you basically create two contexts and one is primary and the other is backup/secondary.&amp;nbsp; However since each context exists on both appliances that's treated as active/active?&amp;nbsp; Am I correct on that?&amp;nbsp; How would I then configure different security contexts if I want a production firewall and a separate development firewall? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 18:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203618#M361759</guid>
      <dc:creator>DannyHuston</dc:creator>
      <dc:date>2013-02-20T18:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: confguring ASA with multiple security context and Active/Act</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203619#M361760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In an Active/Active Failover pair you basically have 2 ASA firewalls that are configured to "mode multiple" and are therefore in Multiple Context Mode (which is naturally a requirement for Active/Active)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you initially change the ASA to "mode multiple" it will convert its current configuration (if I remember correctly) to be the configuration of the "context admin". This Security Context will be the management Context of the Failover Pair and you will therefore have to connect to the ASA through one of its interfaces to have access to all the Security Contexts. The "admin" Context isnt counted when counting the amount of Security Contexts. (For Licensing purposes that is)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You then create a basic Failover configuration between the 2 physical ASA units like any other Failover Pair. These configurations are done in the System Context space.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also configure 2 Failover Groups. Each Failover group can be defined to use whichever ASA as their default Active device. When you have decided that, you can attach context to either of the 2 Failover Groups. In a 2 Security Context environment you would naturally keep one Context in Group 1 and one Context in Group 2 and have each of the Contexts Active in different physical device to balance the use of the devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If either of the physical devices would happen to fail, the other unit will take the Active role for the failed units Context. You can also configure a "preempt" feature under the Failover Group configurations which will define a timeframe after which the original Active device will take over after it has first recovered from its problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your question of how to configure this is quite broad to really give any specific answer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We dont know anything about the rest of the devices in the network and how you are going to attach the ASAs to the network (Ethernet / Fibre (or was it Fiber &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;)), how the interfaces will be configured (Trunk with subinterfaces, Normal Routed ports or perhaps a Port-channel with or without Trunk) and how many interfaces do you need to use in each context, just to name a few.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 19:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203619#M361760</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-20T19:25:58Z</dc:date>
    </item>
    <item>
      <title>confguring ASA with multiple security context and Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203620#M361761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Oh, I see.&amp;nbsp; It's a single 10 gig fiber from each ASA in the pair to a 6509-E in a pair for internal and another single 10 gig to a pair of 3560 switches for outside.&amp;nbsp; The 6509-Es are configured in non-VSS mode.&amp;nbsp; Likely each context will only need 1 interface but I'm still in the middle of figuring out the best way to handle the default route to these two contexts from the 6509s.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 19:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203620#M361761</guid>
      <dc:creator>DannyHuston</dc:creator>
      <dc:date>2013-02-20T19:46:36Z</dc:date>
    </item>
    <item>
      <title>confguring ASA with multiple security context and Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203621#M361762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have problems with routing you could naturally isolate the routing tables of production and development network to their own VRF instances instead of having them both in the global routing table on the 6509s.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 19:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203621#M361762</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-20T19:51:08Z</dc:date>
    </item>
    <item>
      <title>confguring ASA with multiple security context and Active/Active</title>
      <link>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203622#M361763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. One last question. I made sub-interfaces and assigned one of each to a new context and that is working fine.&amp;nbsp; What about the admin context?&amp;nbsp; Is it best practice to SSH/ASDM into one of the contexts and then use changeto to get to admin/system or should i make another sub-interface on different vlan and allocate that to the admin context?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2013 22:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/confguring-asa-with-multiple-security-context-and-active-active/m-p/2203622#M361763</guid>
      <dc:creator>DannyHuston</dc:creator>
      <dc:date>2013-02-20T22:27:45Z</dc:date>
    </item>
  </channel>
</rss>

