<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 2 X ASA's Failover - Only one ISP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032797#M402887</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since budget is an issue, I would suggest that get the cheapest L2 switch (doesn't need to be L3 switch at all) as all you need is connecting the 3 ports to the same VLAN. Doesn't even have to be a switch with VLAN capabilities (but switch nowadays probably does have that by default). But in any case, you can just plug those 3 ports into the switch without any configuration on the switch as that is how basic you would need the switch to be in your case &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 14 Oct 2012 20:25:03 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-14T20:25:03Z</dc:date>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032794#M402884</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got a pair of 5540 ASA's and would like to fo some high availibility to guard against disaster, however the design has only one internet link that is terminated on the OUTSIDE interface, public IP being on a /30. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im trying to come up with a solution, other than swinging the cable when there are issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideass other than buying a new pipe!&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 01:04:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032794#M402884</guid>
      <dc:creator>jaishaan14</dc:creator>
      <dc:date>2019-03-13T01:04:04Z</dc:date>
    </item>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032795#M402885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can connect the outside interface of both ASA and the internet link to a switch, and you can have the ASA running in failover pair.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Oct 2012 10:44:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032795#M402885</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-14T10:44:20Z</dc:date>
    </item>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032796#M402886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kind of thought that was my only option &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Just means having to source some switches now, which may not be that easy, given budget.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I do get them configuration wise, is it just creating a dedicated VLAN for those 3 interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Oct 2012 10:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032796#M402886</guid>
      <dc:creator>jaishaan14</dc:creator>
      <dc:date>2012-10-14T10:48:57Z</dc:date>
    </item>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032797#M402887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since budget is an issue, I would suggest that get the cheapest L2 switch (doesn't need to be L3 switch at all) as all you need is connecting the 3 ports to the same VLAN. Doesn't even have to be a switch with VLAN capabilities (but switch nowadays probably does have that by default). But in any case, you can just plug those 3 ports into the switch without any configuration on the switch as that is how basic you would need the switch to be in your case &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Oct 2012 20:25:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032797#M402887</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-14T20:25:03Z</dc:date>
    </item>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032798#M402888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also you will need to extend that outside /30 to /29 because you will need extra IP for stanby ASA interface...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 07:15:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032798#M402888</guid>
      <dc:creator>alenvasic</dc:creator>
      <dc:date>2012-10-15T07:15:44Z</dc:date>
    </item>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032799#M402889</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes - This appears to be where I was missing the config parrt, hence the quesion on how configure this on a switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I will need a /29 and this is something I dont have and can't have I have been told this today. So without this, is it fair to say this will not work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 09:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032799#M402889</guid>
      <dc:creator>jaishaan14</dc:creator>
      <dc:date>2012-10-15T09:09:21Z</dc:date>
    </item>
    <item>
      <title>2 X ASA's Failover - Only one ISP</title>
      <link>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032800#M402890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can still configure the ASA in failover mode even though you don't have spare ip address for the outside interface.&lt;/P&gt;&lt;P&gt;The only thing that you can't do is monitor the outside interface for failover and you would need to disable monitoring on that outside interface because you don't have a spare ip address.&lt;/P&gt;&lt;P&gt;However, all other interfaces can still be monitored for failover and also if the ASA has hardware failure, it will failover to the standby ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Oct 2012 11:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/2-x-asa-s-failover-only-one-isp/m-p/2032800#M402890</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-15T11:10:07Z</dc:date>
    </item>
  </channel>
</rss>

