<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA 5520 Failover behaviour in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005239#M401430</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I suppose you guys are correct....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But my doubt came because in Juniper SRX firewall you can assign diffrent Ip address......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;chekout this link :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/cc_deployment_scenarios.html"&gt;http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/cc_deployment_scenarios.html&lt;/A&gt;&amp;nbsp; and go in "Asymmetric Routing Chassis Cluster Scenario" section.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isn't all the kinds of firewall behaves in a same way as far as failover is concerned ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 31 Jul 2012 13:48:31 GMT</pubDate>
    <dc:creator>shekhar</dc:creator>
    <dc:date>2012-07-31T13:48:31Z</dc:date>
    <item>
      <title>Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005234#M401425</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am new to cisco Asa firewall ,, so spare me if i will ask basic doubts .. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if I want to configure ASA in Active / standby mode , then their interfaces should be in same subnet Ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now , say for e.g for DMZ &amp;amp; inside zone I am using common subnet on both ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say :- for DMZ 192.168.1.1/24 for primary ASA &amp;amp; 192.168.1.2/24 for secondary ASA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; for inside 172.16.1.1/24 for primary ASA &amp;amp; 172.16.1.2/24 for scondary ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I use different subnet for outside interfaces ,,lets say&amp;nbsp; 1.1.1.1/24 for primary ASA &amp;amp; 2.2.2.2/24 for secondary ASA.???&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:36:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005234#M401425</guid>
      <dc:creator>shekhar</dc:creator>
      <dc:date>2019-03-11T23:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005235#M401426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;In ACTIVE/STANDBY mode, both IP Addresses MUST be in the same network address. No 2-ways about it. Here's a sample for your kind reference;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;!&lt;BR /&gt;hostname HQPIXFW1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 2.2.2.1 255.255.255.248 standby 2.2.2.2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 172.16.1.1 255.255.255.0 standby 172.16.1.2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet2&lt;BR /&gt;nameif dmz&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 standby 192.168.1.2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet3&lt;BR /&gt;description LAN/STATE Failover Interface&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;access-list acl_in extended permit ip any any &lt;BR /&gt;access-list acl_out extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;failover&lt;BR /&gt;failover lan unit primary &amp;lt;--- The other unit, change this value to "secondary"&lt;BR /&gt;failover lan interface failover Ethernet3&lt;BR /&gt;failover lan enable&lt;BR /&gt;failover polltime unit 1 holdtime 3&lt;BR /&gt;failover polltime interface 3 holdtime 15&lt;BR /&gt;failover key cisco123456789&lt;BR /&gt;failover link failover Ethernet3&lt;BR /&gt;failover interface ip failover 1.1.1.1 255.255.255.252 standby 1.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-group acl_out in interface outside&lt;BR /&gt;access-group acl_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 2.2.2.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; and select the option “This Question is Answered”&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 12:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005235#M401426</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-31T12:22:58Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005236#M401427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi Ramraj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thks for ur reply,,,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case ,how can I terminate two separate links from the ISP on the ASA ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 12:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005236#M401427</guid>
      <dc:creator>shekhar</dc:creator>
      <dc:date>2012-07-31T12:26:29Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005237#M401428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Bro&lt;/P&gt;&lt;P&gt;You could either place 2 units (for redundancy purposes) of L3 Cisco switches on the outside interface of the Cisco FW (assuming both ISP links are provided in UTP cable form) or you could connect both the ISP link to 2 separate Cisco Routers and both these Cisco Routers connect to the outside interface of the Cisco FW, via L2 Cisco switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;End of the day, you still need switches for both the Cisco FW to communicate with each other for failover purposes. No 2-ways about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P/S: If you think this comment is useful, please do rate them nicely &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; and select the option “This Question is Answered”&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 13:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005237#M401428</guid>
      <dc:creator>Ramraj Sivagnanam Sivajanam</dc:creator>
      <dc:date>2012-07-31T13:26:03Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005238#M401429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And another way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use two different interfaces for you outside-connections. One will be primary, the other can only be used as backup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 13:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005238#M401429</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-31T13:37:57Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005239#M401430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I suppose you guys are correct....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But my doubt came because in Juniper SRX firewall you can assign diffrent Ip address......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;chekout this link :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/cc_deployment_scenarios.html"&gt;http://www.juniper.net/techpubs/software/junos-security/junos-security10.0/junos-security-swconfig-security/cc_deployment_scenarios.html&lt;/A&gt;&amp;nbsp; and go in "Asymmetric Routing Chassis Cluster Scenario" section.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isn't all the kinds of firewall behaves in a same way as far as failover is concerned ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 13:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005239#M401430</guid>
      <dc:creator>shekhar</dc:creator>
      <dc:date>2012-07-31T13:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA 5520 Failover behaviour</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005240#M401431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the ASA you need to activate the Security-Contexts (virtual firewalls) where one context connects to ISP1 and another context connects to ISP2. But with that deployment you are restricted to pure firewalling. No VPN, dynamic routing ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jul 2012 15:39:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5520-failover-behaviour/m-p/2005240#M401431</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-31T15:39:23Z</dc:date>
    </item>
  </channel>
</rss>

